, 'bridge\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5}, @IFLA_BR_MCAST_SNOOPING={0x5}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@remote}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r6, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) ioctl$HDIO_GETGEO(r6, 0x301, &(0x7f00000000c0)) splice(r0, 0x0, r2, 0x0, 0x100000001, 0x2) 06:48:42 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x4, 0x0) setpgid(0x0, r3) 06:48:42 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:48:42 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) [ 979.933381] overlayfs: unrecognized mount option "lower" or missing value 06:48:42 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lower']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000640)='security.capability\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', 0x0, 0x40020, 0x0) rmdir(&(0x7f0000000580)='./bus/file0\x00') 06:48:42 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:48:42 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:48:43 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000640)='security.capability\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', 0x0, 0x40020, 0x0) rmdir(&(0x7f0000000580)='./bus/file0\x00') [ 980.241227] overlayfs: unrecognized mount option "lower" or missing value 06:48:43 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) [ 980.526192] overlayfs: overlapping upperdir path 06:48:43 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:48:43 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:48:43 executing program 5: syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000000)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) 06:48:43 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000640)='security.capability\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', 0x0, 0x40020, 0x0) rmdir(&(0x7f0000000580)='./bus/file0\x00') [ 980.821333] overlayfs: overlapping upperdir path 06:48:45 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)={{0x1b, 0x3d, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x127c, 0x11, 0x300, 0x70bd28, 0x25dfdbff, {0x10}, [@typed={0x14, 0x73, 0x0, 0x0, @ipv6=@private0={0xfc, 0x0, [], 0x1}}, @generic="2f4daee35b3b8df2", @nested={0x156, 0x43, 0x0, 0x1, [@typed={0x8, 0x6, 0x0, 0x0, @fd=r2}, @generic="5f5228716b4deaae99ade9157d5189c6acaeab9bc82d5ffeff3073cb91cd8cb04d0a3b8827f49114c6a55b7ad4ace24ee7d8ae9e469ce9c21ae86f24706ead137f7b19cc1c655156d49783fcc18541b237f8f9551fe1f5c9edf1f25088d74ab568683a090963d57ab1d5afb5e8f0ee342f519953bd654be7ec1e42973700537a1aa0ac9e17920bf12d9b6ab29788b5667a069983c08e7eebf18289f18af85b55db48f0e820b81fa4daf6e628f3aadade34e130664f53d5f258ca04349977cb620e26b55e77c05a1a525b5b691661626de4d2cb8846fea85c8332b40b43375c", @generic="b3859a277ca06e139e1d04ce0de919c3c50a7b1a935d08ed1c384ac20f7eec6e84d4d9e568a6f53b8bb742bad5354027f95d61de503c57b98afa84cbbe024369f214e1aa31f1ec", @typed={0x4, 0x7f}, @typed={0x4, 0x8f}, @typed={0x14, 0x2f, 0x0, 0x0, @ipv6=@private0}, @typed={0x8, 0x45, 0x0, 0x0, @uid=r4}]}, @generic="d2246025fcd923cfbcd39d518ebb11c52a2f0766c3cda37d75dc491f00b14cf180c4402f05709f3f3b898c21047cdacd3dd80f428328c9872bbf134a48be1e1c3e9e3e34f8a343c1f4f25687212532b937c5653d25b4b462f8afd04d4f4de2ffb76d2bda35a5d02b893425", @nested={0x72, 0x5f, 0x0, 0x1, [@generic="6d3900d363fb935d6be134773580a56a207098c9cfccbe9efccde855c58cbce0720c277c39f400fee1b88c574002f47fe7704541645bfbc4928cc2e1138e6dc035090089b8822901b53fdd6c8600dfc5a48b36c6da795e3be47f0fd2bf1d458535cf1119b1fe0778003abf28ac60"]}, @nested={0x1014, 0x1d, 0x0, 0x1, [@typed={0x4, 0x20}, @typed={0x1004, 0x5, 0x0, 0x0, @binary="487a4e7c2268bfd4f71410761ef8fbfcac597d909c183d0aee7b47c93ae92616e64010799e5f5f195b97b6547bbdc47b7f0c01a652d0d86bd535428d080b35f0ac9e20188fa9eb4d295f2daf5d3dc07f348af18a5440a9d0fcdeae587714df2170ed4dad9e9c0150644bf2be4dc968654d73e878034f26457e992f61e2bf2b033d7674693a0c296fdf73e15ee268254a8f65bdcab55ac764758d6e9c2b07d9f1498e1257078344c4669ebe073db755035831e2a0068827ebd9229fdca292b749f0856603fab95b13e785c16e48e784425edd6d63a83cce53f322d169ec4e5c7d55b971aff6d7f3cbbb31bc4e29c7993b50dd4f752496f3c2119a37bf2fd9ff87641885463108b55e215e8a243ac92655efabca12a9369700184b65feb0d222840a168264c25aaaa5fd91073167b4c97255d967a4380b7918be402ce83972552778472ab8bb181a8d98845ed5c9ba28bf5b7ef3cd7345ba561f4ec053ac3761903b082743190f516efb2be6151b44b75c974c366dae50e9f3d1288c22c4bd69a7a1d7ff097c7f29f38357a971e50a89b22ffc8abfb1f92b45ae7db2155685abe73e82bc44ebda8d809b3bf2acc1dfbb3beaf85e5fa75566437cd3ca983ce287818c8c5635315af6ae3ccfd5162d1000f149c3e9629657253c485fba4113b308f5da27ac392247389b3b48e75d26cdc169a5d2f365b0f5b9ac571371be43a8ae09809242aa71e8288084f3adc52df00e0887edd1087033bdf43c8de58b03ff6eb28bb6854370e51a1710ea0b83443607f29524c7806b3a5ae565253e67dfdad3c104996e6b6c231fd9e979678b55a74bf00f2f9e462a1a31d5f7e2be309f25b2703aaafb15363319b26a30c4df4ca7330de9b998c45b57193fe942f521fe415b9d9ca7c5d4cc0e69458a887d07df8839e8b4a27d52da54ebff29c6e5b17d1bfb35514f141a689c4655a5dc2d0f531704e072300c118595ab895f4a936ac0a0012c2838a6fdfca9a6ca8e6e921762a448d5f47504598557a074486b31b7d558143d68be2d236ec0c704b029be9da939fd985b97f26293e9abae29aae41364ffbf0af7b72afbe9f4ba1f4a161aaf7598ab063a6332483298d401a224cf5058e539ff8eeef1cbc1cc46a579fdfb2e738841cc8ff91a2e803f380d39e154f7d1a0b45dab06d4be575f0516162174672e7815239f540f92015fe5317320399664542eaf099476d04edf7952338207f8fac57ba21c04bca54bcd3331fdd02e74b16f2c3e246c1d5b1e06fc16d1f1735cd5c8b4b177044cfee045262885b670b67a34afb130de5b386bf4e28383889baf6ca5db57b4441d885f22f365a3652fd946b5a740e999742620d603a6b5465faeaf78fd98785fa5554de69c78f31b9057d5cb4ceaadf37f81d9af4b23ccf1dd16c25f0b4339f27dde1d9a067582623f142355203b1a18dbdd3c206a47e91c56a6f2203baa035517d1504f3736f315af5792fd1a3892919964a3284710d1773afc6059d783c377508823e7088f04343f0fe17b7e1bf43c333c76b9db7356213f7ac59209592f9f6b84b4110b5d2a88dfb710dd8296b5e2fe817b29df692420e66786735db69dda9ce7030cd4b5e0190d0af868770759a2482d8a66e5441c085372aab961c163ecec889579eb613c0f585336a889b94be570b921001e10a1ec42c65ec525bfe1cf2486529cc9da6542b83ad41e161501b05953bb78d55d9568447c817ac291f9815ed07d3a16ede9aa675ef00a169a403e337263b72b2600702270e00fb4018c2a4659d6c4ae75e9b2a35b31be955c934e0ce57b63efac51af71922c2836926c27296172e7aaca927c861746f44c63e2aa53147af71ac6a5862d11fbdad30eae97ea1ebb439d907c022f0f5474963f41f09bbf48eaebb8b9c2d1e948df14d9b3e69ec7262167041e3a34a47a849d0110599a54786e30567444375550bce4bdf9e82a311a4f2b818df4703e4cc072eca48ea65eb34ab24db3dc4880933a35070073d1c86dc2731e26700025135f160dc737aa44e89b900282b07787cc4bcc290d5a78721806329130da83a61b8c752e53589f7365cbeefd5c6c3bb2004fc0331abe55a521efaad22ec4ddf6ebadb8e6fd17dc7cd67951e7de5c063c26a5bc8d9e8c3c14b88ae0b1dd71279da490c0e5e0e863b14db94832fd85610f010d1549a0b0d66b086ec993118189b747d4681f2ce04d4a37768e5f10f12b358f448dc5c388ffa1fa166f0de135de03dd48c480022d19c3cd07676a815919f16f60b7d031beceb8594f606e1af8d7f53e681a2ff28fc4dae89069512074e027c4b52ea156282beba4b0a5246b239bc9536af4774e934ccd5a6160fdf9c7f0d19723433663f516c945bcdab782f2eb29fc1256294334b047814836c93f65ebc5b71db846ac33bc5f55f3f9ba8a616787644ee1810b0bdcf39bf86f56b21741091a79431209f03fa3803981cf176a77341b78561ad562ebe00b0634c7da813788af4d6e1cd2ea9f72f6c2da8df737b03de5b05e07720f465d14d69a819e1f388563ca4fa2b4056eb64e1793ae74b6c0352e172217fafa0492e4ddcc5ffb56fe0a320a6662a18ab0cb844e63770a784f1c40a6decd03f6fb6259263d707e04a5be12914951ab4886f0887c7c511c25b54bb004bc4a1f3ea4491c49fbb11e8c8b041d75fb87571bf037c2925afbcea78b271b1119114baa3ca6e2be774aab993597a42678a20e38b10811f8f1dc0028d745462e638426feb45fb43175937954db330810ec090fe1fbd669e94c5404740a6549551ec8a0468835ce86496dfec2b7b843480cdb6a363cf643c77afd4b23558ec98d65e7a1b04ef3ed328734ab5fea0b6e5080578da72a58a37f255a37dba64be7c65a36547d2f880e86c45d3e6fbe7c89b1d96b62ea815f644668cb5c21c65312d8f9a3fa5378d4823c15f01bb068c085ef4a3cd550a025818fb0fa24d84ceab8eaf164797e078744d53642d410b476c1fc337d5a3f0bb3ed39d71ae1a5a24a4ed377293a0ffad4a9d0ae7ad67d34b658c54d5dfbf6a9adb8e6dc0d33a744d3d885952867a46528ad50f26becfadd1b6ba9d6dc994a4b37bd52cb5980899c13e069a77acf28fc7f1078627336191a46a5feff9443f4b70eaf14a0908c51491a9c2340de98d4bce367d23a6dc9e59ccf1a78f675f1cb312ce673abb5919a8c0a2238bf5a6eb7049758a3c474c43bf5edb20dc3c8ddb77a94afc7ea0a269689e71dc579c38b3eeeaca1d94965c023a05e699f0c076a10dd857b07404fbea6f623cb6a33e5773ede1d57d39d1be29e2be1cd55eb03933af7f90e030b2d5a92e48439dc09209ec130ac2cb6568b7b5c60fc372607c44f19f1fd491f632e79844e9a262004a58ca09d1f8a87ba753a192a05159d752b2ea8c548eb3d7e233096b362ce7bdc4858ff888e8b8446d76331b276de3ee836b3186fea7611c8fce33c161dc14a76dad394ada45dfac2495e2647aea52abb53c2561884fb8cca7f98eb65ca4a62481fd2e83ed357aac6be1c1756668f97aa97f9890b7f76c1ce0914550cb8e0348942202d7214ea5dbe564ec73230319adbce9320bf158f4a7fc49c9b813b1c1591e9c791172ec6245b645e02c992f809ce89a587155896ed2e4dd9ca88eab38868ad4ef246ab0cc5753f11765e3a6cd7469d1bb43521e4d2d0e83e372df56e323c8cb3e22de42c9537b78c459e53d4b93397c7c91ad32b51108d6622a747c2925d5b427ea1ff840e7ca19d3700d74b008b66900dff0165f2521797016d3cdd0e41707fa77d4885012d99d39957395219b7b298f8250a1d3c7e6ab0b01b6a61d0a361b5ba9fb4bfac539c0d98b2d81af5c7d019de479ade3515a4ef007196821c54f562bd2ac254aa06a0fdcda2bd9098bf44157c95f7ba34b7f96660eb2eec25c0123b5fb1b8cf682cbb03f1717861b710238c6c642f66b6b73edfebda129ad814abf78fa0cf8ef1bdb6deb7e227391baad5de7fa0c64366b5e7b5a71c65b638e8675d626b7c2bd05af732769aa362aafe5979801f2c1eb87b06da9d8080732b32b5541f4b8dc5a94695243325e00232fb19442d77dcac169f5e4d162dbc184e7dbfd5b676bbad75b6d1b1068011e7cf9ac76b1f041d07c55e3b47945bcb427ee503a56f2b56d5030e35b6c2e23a91c811d5aa76a18b4b912e882cb71d91155b395673c9a551c173c7f9c611ac53916894f27ba6b8e9d322dacc205b32d9f81e9b5370b7fdd12298ab50be19058634f847839e280516ffd2cd3737b03070386ce018439e0b217b000c1b2b19d6ca6dd45b732aab4927ca98650ff8190f33c2d791e3b83a11c22a29001565279a7f3c552bd7010f149c5c587156a143812d89823b7dbd1d53f8700925d1ff0b0eacfd61cfe1f069e1e13ef9da6f4d3f2e7ad7ecec1e87eb940a8add0ecace0cceb11a4efac5d61435dad7456ee331a66f41f5941bc3ab5b5c3d01087afe6017a825c6e6d72246eb0f0ca8dcc2909c3af134994f7ce8bab2ca10e37c0570b1a5cec7a3891c01b7da911029a5eb4d6de3b7506cce55c4b8d75bcd218348bbceca0af24a49f201208d9cd0a3d1012d1b6e596fe6eec3d7701da63df850c4780421327dd984842b616fb863c475b042512b56e3947568c72a1b708a172d6ba0d08fea828af01e791069a9285dfa6abccb4783379a1036112dc96009d41d3472a8abf2292889a8abc100d5eff73fceef16d6bd1c9b904b8d942cd2694663f96e23440012c549c650fa53140d2c28038b32eb3afad1bd730b41a222b14a6ab4dd61beb78f32e80f798aeb1afbc1411beeb5a81f698a2ffaf15576e4c4cc95fb4c9a13cda85da069fa424c219fa4b6ef30a67d7d5e5dae4e3585b1673add03d4f50636dd53de97a8f568dadee9c85e83df0e322541f3d53e7120036756b96f3b108092c4b98268e899f22fb408e4c1e295d1fb872240c708c8b896484a465aa3b2349c7f403e80b62ff6753aad02568b0b0c5fed75fcbe87299b8dc68d66d2aa67043365e7aca64a133dcca6bb1b46b59858ee20ffdec3479242b5bb6a9c25f331ce789b14a02e03b1b8e6b3342bafea55cdda84ea47c3dd1962bfd2f788a38f8c091c5cf214e313e9b69a42d13b149a311f54b4397ea6610aef0575900d39442ea409b5a8ce2d309eb78ac9ec49af7aacf771f17a67c4cbc7b39bad4525c15781164f285bbfb507fb016912401d3deb9d8f1c40572b981d2717954492a9c988ee3cb42a7abf2c903e9f6793a533b773213534b1b53fcbb530e0fde468c7d72851ecdde44090ed9a158556dd3f9b27536cb6f0d4b94e9e2b94f44e6db5105fbf42ad7a204d0918ea4fb3c7a3f12608eb3fed25d01990ba6971e1c1861d2a07c63cb0da2790fe19c03e042c9df033521f174bbc84d2b6026b02eb999ac73f6401846263e06a48d1c5671fdf865e3c9e520fa027e78103630673ce5e23ab84ef27ee7700585d6eccef3f891b23976d38e5e1b75f00f1677daa3e0426255afea7b56bc009d63e299d1f7274982ed38a78f60f7628414fb9043f5e6817939e097e222257e99a19040f708dc8888aa584f3b16d57d46cc3ec0a439c28d3d259a417ac0fe1902e06a1f1e9177b2ca271bbac55bad977aefb373338d1e0c118de10e894d5e0edc4e39e4f44401bfbf9a6a9e3c6defa0b466e708adff08b691baad49774ed7f84983159b8986de016ee116cff8f65c02ad97efc574d70011b0180f4fbfef175ca78afb039b0d24cbfab4f7cade7d46fd61c1a663d8ae0"}, @typed={0x5, 0x10, 0x0, 0x0, @str='\x00'}]}]}, 0x127c}, 0x1, 0x0, 0x0, 0x1}, 0x40080) wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:48:45 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) openat$random(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x2, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5}, @IFLA_BR_MCAST_SNOOPING={0x5}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@remote}, 0x14) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r6, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r6, 0x8905, &(0x7f0000000100)) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x200000, 0x0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r7, 0x400443c9, &(0x7f0000000280)={@none, 0x7f}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x100000001, 0x2) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r8, &(0x7f0000000040)={{0x1b, 0x3d, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000380)={0x6, 0x80000001, 0x5, 0x0, 0x0, [{{}, 0x2}, {{}, 0x4}, {{r7}}, {{r8}}, {{r3}, 0xba}]}) 06:48:45 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:48:45 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000640)='security.capability\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', 0x0, 0x40020, 0x0) rmdir(&(0x7f0000000580)='./bus/file0\x00') 06:48:45 executing program 5: syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000000)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) 06:48:45 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:48:45 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001680)='/proc/tty/drivers\x00', 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000140)={r6}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0)={r6, 0xffff}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000016c0)={r6, 0x4}, 0x8) ptrace$cont(0x7, r0, 0x0, 0x5) 06:48:45 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) [ 983.055910] overlayfs: overlapping upperdir path 06:48:45 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:48:45 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./fil']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000640)='security.capability\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', 0x0, 0x40020, 0x0) rmdir(&(0x7f0000000580)='./bus/file0\x00') 06:48:46 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:48:46 executing program 3: setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(0xffffffffffffffff, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) [ 983.303484] overlayfs: failed to resolve './fil': -2 06:48:46 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./fil']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000640)='security.capability\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', 0x0, 0x40020, 0x0) rmdir(&(0x7f0000000580)='./bus/file0\x00') [ 983.464525] overlayfs: failed to resolve './fil': -2 06:48:46 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5}, @IFLA_BR_MCAST_SNOOPING={0x5}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@remote}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x100000001, 0x2) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r6, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) write$ppp(r6, &(0x7f00000000c0)="97d87830b728cb7406af0280f5847d0a4b90258b9842c373342646ca2968", 0x1e) 06:48:46 executing program 3: setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(0xffffffffffffffff, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:48:46 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./fil']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000640)='security.capability\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', 0x0, 0x40020, 0x0) rmdir(&(0x7f0000000580)='./bus/file0\x00') 06:48:46 executing program 5: syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000000)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) 06:48:46 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 983.886528] overlayfs: failed to resolve './fil': -2 06:48:48 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000640)='security.capability\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', 0x0, 0x40020, 0x0) rmdir(&(0x7f0000000580)='./bus/file0\x00') 06:48:48 executing program 3: setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(0xffffffffffffffff, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:48:48 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:48:48 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ip6gre={{0xb, 0x1, 'ip6gre\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_ENCAP_SPORT={0x6, 0x10, 0x4e21}]}}}]}, 0x3c}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@remote}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x100000001, 0x2) 06:48:48 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:48:48 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) tkill(0x0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:48:48 executing program 3: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) [ 986.153593] overlayfs: failed to resolve './file': -2 06:48:49 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:48:49 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000640)='security.capability\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', 0x0, 0x40020, 0x0) rmdir(&(0x7f0000000580)='./bus/file0\x00') 06:48:49 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="6653070000053c27bc337600000001002e52779c405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2000000000000", 0x5f}], 0x4, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x902, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f0000000140)=""/81) sendto$x25(r1, &(0x7f00000001c0)="daa5892478bec51c54d7a4953a00327251e9d0d1a9ea167e7ee1935827985d06c704baf30a1a58e21a8a37c7db96756bf993642a882323e3b41a97d077c4cf67ba32b579b5411cb4466e29f92fd67e4134c04cd32751b1e7f4440a3d27bf8d29b46ecbaf81278cd365a25c822ef89ce9be5eedc421a041a5dee39f108cdd17c9d6ecf4b353ecd3c88ecebf41b4876cff06", 0x91, 0x20000080, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup(r2) r3 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400202) ptrace$cont(0x18, r0, 0x0, 0x0) 06:48:49 executing program 3: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:48:49 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:48:49 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) syz_open_dev$ptys(0xc, 0x3, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000040)={{0x1b, 0x3d, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:48:49 executing program 3: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) [ 986.487500] overlayfs: failed to resolve './file': -2 06:48:49 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000640)='security.capability\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', 0x0, 0x40020, 0x0) rmdir(&(0x7f0000000580)='./bus/file0\x00') [ 986.704113] overlayfs: failed to resolve './file': -2 06:48:49 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5}, @IFLA_BR_MCAST_SNOOPING={0x5}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@remote}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x100000001, 0x2) r6 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000100)='wireguard\x00') sendmsg$WG_CMD_GET_DEVICE(r4, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r6, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x4008004) 06:48:49 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:48:49 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:48:49 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:48:49 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(0x0, &(0x7f0000000640)='security.capability\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', 0x0, 0x40020, 0x0) rmdir(&(0x7f0000000580)='./bus/file0\x00') 06:48:49 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) [ 986.994659] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4997 comm=syz-executor.0 06:48:49 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) [ 987.115273] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 06:48:50 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(0x0, &(0x7f0000000640)='security.capability\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', 0x0, 0x40020, 0x0) rmdir(&(0x7f0000000580)='./bus/file0\x00') 06:48:50 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) [ 987.393608] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 06:48:52 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:48:52 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:48:52 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(0x0, &(0x7f0000000640)='security.capability\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', 0x0, 0x40020, 0x0) rmdir(&(0x7f0000000580)='./bus/file0\x00') 06:48:52 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) pwritev(r1, &(0x7f0000000500)=[{&(0x7f00000000c0)="d2c86b477e05d877842b6960308b0556b71cf271fa040268c905d5d62716cb056db0a510412fe497", 0x28}, {&(0x7f0000000240)="d014bf0dfdfa39882d3d7ee149def64cbf1b8495b3f1ecdcb51aa578f730b82270dd2022959a3b9638aefb53bbd6ff3603850865391dc3f4cab27e8927f1aac317441676696f90e0244bf489537de076a2e8a13fb28166093697ca0568caa225f7645836", 0x64}, {&(0x7f00000002c0)="0199b0610f30b788603e90c829996f5f21aa91890fa9bd3267c7ffebe60662d58d6100de22bd0d5d95ed8580fd00b83162fc1080237424f7f290d4063293edfc4d3c8c9c5c8eb1deee45f38c46556c815f61732db831e60340f49fc5813e483d1328a4dbe07cfde7610152c861826bae4b86405c91d44cc9190fde01619b", 0x7e}, {&(0x7f0000000340)="b7209064fb7046c70e2ef7041930509767ca808d05d09419813c77db2e95acaa01ffa5e600ef7e5408cfa39c50d9b4638876d31010ad09ffcc5af22f6f63f08462d8ecc14692693aa0e8e10476401cd92b8f0f9c6d56d60adb2d37a7a94cab358c5e08626feda59acf31e8c24662adad2b9bb4b136e4da4097b5e9c66ee15dea57630e1c0da04fc92d1291e2837d343927c94687f2ca39ce1464514bd79b96562c5906e771ef131ae7de35e5eeb9806d66da31954b88826345f00575827ec27cf2219c186638972b18d69e2f9b5f78b59d9bbe1207ff85163404a8a99a17d0e85f65873c7373fe3778730554477c97ffd7f279362260f638", 0xf8}, {&(0x7f0000000100)="f9e61dd89d", 0x5}, {&(0x7f0000000440)="a2acabc6b6ef4f8cb2721f115366fdcb8363a09a08a6bc94c1112f57ba3713f629d1fcd952e196b7ac684b2cb86eb774dd273b0227540cda3e18ca1c05cca68e9e797b8b7c154c921a0138cf370368b0644671fbc96a2cee37bb92328dd32f917765732bad32f1f93c1559f1bc76bb42a04b945176af8f3fe5bd80ebdaeba97cfd8f2d319a5c1b4b9db85bbe1204fcdb054cc6c2bfa74e34277d", 0x9a}], 0x6, 0x20) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5}, @IFLA_BR_MCAST_SNOOPING={0x5}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@remote}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) setsockopt$TIPC_MCAST_BROADCAST(r1, 0x10f, 0x85) splice(r0, 0x0, r2, 0x0, 0x100000001, 0x2) 06:48:52 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:48:52 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:48:52 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r1) ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f0000000040)) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000), 0x4) r2 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3d) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ioctl$KDADDIO(r0, 0x4b34, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r2, 0x0, 0x0) 06:48:52 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) [ 989.531633] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 06:48:52 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', 0x0, 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', 0x0, 0x40020, 0x0) rmdir(&(0x7f0000000580)='./bus/file0\x00') 06:48:52 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:48:52 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200), 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:48:52 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200), 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:48:52 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200), 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:48:52 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', 0x0, 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', 0x0, 0x40020, 0x0) rmdir(&(0x7f0000000580)='./bus/file0\x00') [ 989.799221] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 06:48:52 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) [ 990.005173] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 06:48:53 executing program 0: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="445c0000100001040000000000002b5efe559f54", @ANYRES32=r5, @ANYBLOB="0000000000000000240012800b00010062726964676500001400028005001900000000000500170000000000"], 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@remote}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x100000001, 0x2) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r6, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) ioctl$VIDIOC_ENUM_FMT(r6, 0xc0405602, &(0x7f00000000c0)={0x9, 0x7, 0x0, "19b4e181ac3ecd29a996aff86ab1cb6f1ce5a8c7425bdc6a7846c2e2722b0a1f", 0x13051011}) 06:48:53 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:48:53 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:48:55 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:48:55 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', 0x0, 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', 0x0, 0x40020, 0x0) rmdir(&(0x7f0000000580)='./bus/file0\x00') 06:48:55 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:48:55 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000240)={0xfffffff8, 0x1, 0x4}) getsockname$packet(r4, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="4400000010000100", @ANYRES32=r5, @ANYBLOB="0000000000000000240012800b00010062726964676500001400028005001900000000000500170000000000"], 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@remote}, 0x14) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x5e5d00, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000380)='/dev/full\x00', 0x101040, 0x0) ioctl$TIOCSRS485(r7, 0x542f, &(0x7f00000003c0)={0x9, 0xbec, 0x4}) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r8, &(0x7f0000000040)={{0x1b, 0x3d, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) readv(r8, &(0x7f0000000340)=[{&(0x7f0000000280)=""/185, 0xb9}], 0x1) ioctl$DRM_IOCTL_MODE_OBJ_SETPROPERTY(r6, 0xc01864ba, &(0x7f0000000100)={0x2, 0xfff, 0x800}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x100000001, 0x2) 06:48:55 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x19}, {0x0}, {0x0}, {&(0x7f0000000080)="66d9790dcec5bc1a67a582530700001b0c993b053c27bc33760036394008b4aef12f00ffff1500ae47a825d868002702000000010000805acf4f8f36460234532479ae415bfd983f79becc99614507a4eb8b140de404180bab762ccd52667ada508a6ffe6ad0676f8f9fc0ebf8b0b16d6e2c59957ab364884b3c5d05692e664ebf68e6faa523825f024fd6142134b611e931e7d62ead037cd2157df6b20000000000265f1841f6da2f602303d335739eac9c96ef047583384790a8fefcafa7b1aa84ea50104bde426992aca8ee70c3ed2d804f68a4d3a0d875237b4348c2bf9c354953a553ec5348c0da06efa4620c4da1f239a419984d3ab11dbf8878c8959f8e80d18924a38638e6f83e5305de61f3696f8cbd73896167ae9a46666269f9ee58d82b59c3918207b2f6157045ebd2e6debe0a0c63b35abb18", 0x91}], 0x49, 0x7) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x7) r3 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r3) ioctl$DRM_IOCTL_GET_CAP(r3, 0xc010640c, &(0x7f0000000000)={0x3}) ptrace$cont(0x20, r0, 0x0, 0x0) 06:48:55 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 992.638009] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. [ 992.653240] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. 06:48:55 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000640)='security.capability\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, 0x0, 0x0, 0x40020, 0x0) rmdir(&(0x7f0000000580)='./bus/file0\x00') 06:48:55 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:48:55 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r0) iopl(0x6d) r1 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000000)=0xffffff35, 0xfffffffffffffce5) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x7, &(0x7f0000000080)=0x1, 0x4) clone(0x440e2300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6648070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d0100e47f5acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e6668e6faa53367f05f4ad61c2134b62f11e931e7d62ead037cd2157df6b20000", 0x8a}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x100000) tkill(r2, 0x3d) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x7, &(0x7f0000000080)) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r2, 0x0, 0x0) [ 992.799511] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. 06:48:55 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) [ 992.918195] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 06:48:55 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x14c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x11c, 0x2, [@TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14, 0x1, {0x0, 0x0, 0x7ff, 0x1a}}]}}]}, 0x14c}}, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000640)={&(0x7f00000004c0)=ANY=[@ANYBLOB="70010000", @ANYRES16=0x0, @ANYBLOB="000326bd7000fddbdf251100000014000180080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="0c00018008000100", @ANYRES32=0x0, @ANYBLOB="400001801400020073797a5f74756e00000000000000000008000300030000000800030002000000080003000000000008000300010000000800030003000000540001801400020076657468305f746f5f6272696467650008000100", @ANYRES32=0x0, @ANYBLOB="14000200766574683000000000030000000000000800030003000000080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="54000180080003000300000014000200697036677265746170300000000000001400020073797a6b616c6c65723000000000000008000100", @ANYRES32=0x0, @ANYBLOB="080003007c9ad37608000100", @ANYRES32=0x0, @ANYBLOB="080003000300000020000180140002006e657464657673696d3000000000000008000100", @ANYRES32=0x0, @ANYBLOB="2800018008000100", @ANYRES32=0x0, @ANYBLOB="1400020076657468305f746f5f7465616d00000008000100", @ANYRES32=r2, @ANYBLOB="0c0001800800030001000000"], 0x170}, 0x1, 0x0, 0x0, 0x20000801}, 0x4040000) write$binfmt_elf64(r1, &(0x7f0000000040)={{0x1b, 0x3d, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000f6, 0x40, 0x0, 0x0, 0x10}, [{0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}]}, 0x78) dup(r1) wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x1000000000000, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:48:55 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000640)='security.capability\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, 0x0, 0x0, 0x40020, 0x0) rmdir(&(0x7f0000000580)='./bus/file0\x00') [ 993.175043] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 06:48:56 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:48:56 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:48:56 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r3}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0)={r3, 0xffff}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000)={r3, 0x5}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000080)={0x5, 0x2, 0xc003, 0x7ff, 0x83d, 0x101, 0x4, 0x1, r4}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:48:56 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000640)='security.capability\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, 0x0, 0x0, 0x40020, 0x0) rmdir(&(0x7f0000000580)='./bus/file0\x00') 06:48:56 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5}, @IFLA_BR_MCAST_SNOOPING={0x5}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@remote}, 0x14) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000240)) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x100000001, 0x2) 06:48:56 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:48:56 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:48:56 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:48:56 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) [ 993.570670] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 06:48:56 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000640)='security.capability\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', 0x0, 0x0, 0x0) rmdir(&(0x7f0000000580)='./bus/file0\x00') 06:48:56 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:48:56 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:48:56 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:48:56 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) [ 993.913527] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 06:48:59 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:48:59 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:48:59 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000640)='security.capability\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', 0x0, 0x0, 0x0) rmdir(&(0x7f0000000580)='./bus/file0\x00') 06:48:59 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r4) ioctl$KVM_SET_XSAVE(r4, 0x5000aea5, &(0x7f0000000700)={[0x20000000, 0x1, 0xbde, 0xfffffff7, 0x42, 0xb4, 0x2, 0x1, 0x0, 0x6, 0x0, 0x3, 0x0, 0x2, 0x9, 0x9, 0x3, 0x7be, 0x8000, 0x7ff, 0xdd5, 0xaef5, 0x423, 0x2, 0x4, 0x7fff, 0x5, 0x101, 0x10001, 0xf36ae05, 0x5, 0x2, 0x1f, 0x9000000, 0x5, 0xa05, 0xf2, 0x3ff, 0xef, 0x3, 0x80000000, 0x9, 0xfff, 0x4, 0x8, 0x5, 0x0, 0x81, 0x3f, 0xffffffff, 0x3, 0x7ff, 0x3, 0x7fffffff, 0x2, 0xb6, 0x8, 0x9, 0x9, 0x3b17, 0x1, 0x5, 0x6, 0x0, 0x7f, 0x5, 0x0, 0x3, 0x5, 0x200, 0x9, 0x2, 0x2, 0x98b, 0x8000, 0xf8000000, 0x400, 0x2, 0x5e4, 0x7, 0x0, 0x8, 0x5, 0x4087, 0x2, 0x4, 0x5, 0x7, 0x3e8, 0x0, 0xfffffffb, 0x4, 0x6, 0x4, 0x100, 0x1, 0x7fff, 0x933, 0x20, 0xb924, 0x5, 0x400, 0x99, 0x8, 0x9, 0xff, 0x1, 0x8, 0x4, 0x5, 0x5, 0x8c, 0xfffffffa, 0x10001, 0x7, 0x5, 0xffffffff, 0x13, 0x9, 0x2, 0x1, 0x7f, 0x3ff, 0x1000, 0x6, 0x4, 0x4, 0x80000001, 0x1, 0x400, 0x4, 0xbfc2, 0x101, 0x8001, 0x7, 0x7e70, 0x8, 0x1, 0x8000, 0x8, 0x6, 0x1000, 0x7fd, 0xee, 0x10000, 0x0, 0xfffffffb, 0x7, 0x4, 0xdf6, 0x7f, 0x4, 0x6, 0x4, 0x1b, 0x5, 0x1, 0x400, 0x800, 0x9, 0x7, 0x8, 0x0, 0x97, 0x7, 0x1, 0x7fffffff, 0x8, 0x4, 0x56, 0x1, 0x9, 0x8, 0x1, 0x2, 0x0, 0x8001, 0x7, 0x49400000, 0x8, 0xfffffff9, 0x10000, 0xfff, 0x7, 0x4, 0xbd2, 0x6, 0x9, 0x8d2, 0x3, 0x3, 0xffffffff, 0x8, 0x0, 0x1, 0x9, 0x2, 0x9, 0x73, 0x3, 0x9, 0x5edc, 0x8, 0x7, 0x13, 0x37, 0x2ee2, 0x8a3b, 0x8, 0x1f, 0x9, 0x7fff, 0x8001, 0x9, 0x3f, 0x9, 0x7000, 0x8, 0xffffffff, 0x10000, 0x5, 0x40, 0x1, 0x800, 0x2, 0x100, 0x9, 0x1, 0x7, 0x7, 0x6c, 0xff, 0xfff, 0x5, 0x0, 0xfffff22f, 0xff, 0x20, 0x200, 0x0, 0x200, 0x2, 0x5, 0xffff, 0x9dc, 0x6, 0x10001, 0x18e38000, 0x4, 0x9, 0x4, 0x6, 0xffffc05a, 0x68c, 0x4, 0x28c0000, 0x7, 0x7, 0x7fff, 0x0, 0x7fffffff, 0x101, 0x4f17, 0x3, 0x3ff, 0x3, 0xbf7, 0x0, 0x4, 0xfff, 0x8, 0x6, 0x5, 0x7, 0x2, 0x7ff, 0xf51, 0xa1a2, 0x3b, 0x83fe, 0x5, 0x8001, 0x3, 0x10000, 0x6, 0x2, 0x3f, 0xfffffffc, 0x6, 0x6, 0x0, 0x1, 0x8001, 0x1000, 0xffffffff, 0xf3, 0x60c1, 0x3, 0x4a06, 0x0, 0x1, 0x4, 0xba53, 0x0, 0x9, 0xffffffff, 0x4, 0x9, 0x8, 0x4, 0x5, 0x8000, 0xfffffffc, 0x10, 0x4, 0x4, 0x1ff, 0x8, 0xfff, 0x2, 0x6, 0x1, 0x4, 0x4, 0x6, 0x20000, 0x3, 0x1, 0x100, 0x5, 0x0, 0x10000, 0x80000, 0x996, 0x1, 0x5, 0x81, 0x0, 0x81, 0xc48, 0x6fb, 0x8, 0x4, 0x45, 0x14, 0x1, 0x7, 0xfed, 0x101, 0xffffffff, 0x7, 0x2, 0x0, 0x400, 0xfff, 0x1, 0x6b7c3ea3, 0x0, 0xb85, 0x1000, 0xfff, 0xfffffffd, 0xe2, 0x0, 0x6, 0x1, 0x1, 0x5, 0x3f, 0x800, 0xffffffc1, 0x101, 0x4, 0x3f, 0x1, 0x9, 0x101, 0x6, 0x0, 0x3f, 0x2, 0x7, 0x9, 0x10000, 0x3, 0x7ff, 0x5, 0x4, 0xa9b2, 0x10001, 0x4, 0x8, 0x8, 0x5, 0xfffffffc, 0x1, 0x7, 0x8, 0x80, 0x7, 0x5a2f, 0x800, 0x0, 0xffffffff, 0x2, 0x6, 0x8, 0x1ff, 0x2, 0x1448, 0x7f, 0x10000, 0x38db, 0x401, 0xd67, 0x8, 0x5, 0x40, 0x6, 0x26b7, 0x1, 0x3, 0x7, 0x2000000, 0x200, 0x9, 0x1ff, 0x9, 0x7, 0x2, 0x2a, 0x1, 0x9, 0x5, 0x0, 0x8001, 0x1, 0xfffffb0a, 0xfffeffff, 0x101, 0x9, 0xc8f2, 0x1, 0x2, 0x8, 0x3, 0x1, 0x9, 0x7, 0x8, 0x9, 0x5, 0x5, 0x7, 0x40, 0x6, 0x4a, 0x4bf, 0x0, 0x9, 0x1, 0x6, 0x4, 0x5c1cf2de, 0x1ff, 0xff, 0x1, 0x1000, 0x7fff, 0x7ff8000, 0xff, 0x7f, 0x8, 0x9, 0x1000, 0x8, 0x3, 0x8, 0x8, 0x6, 0x0, 0x9, 0x6, 0x9, 0x80000000, 0xfffffffb, 0x0, 0x633, 0x1, 0x2, 0x1f, 0x80000001, 0x78c, 0xb7, 0xbf99, 0x9, 0x8, 0x7, 0x4ba4, 0x5, 0x9, 0x100, 0x8000, 0x2, 0x4, 0x7, 0x9, 0x1, 0x6, 0x3ff, 0x80000000, 0x1c, 0x0, 0x5, 0xca844600, 0x1, 0x2, 0x9, 0x5, 0x8000, 0xfffffffc, 0x6d87, 0xfffffffd, 0xfffc0000, 0x3f, 0x4, 0x2, 0x1, 0xea, 0x3, 0x9, 0x1, 0x2, 0x100, 0x9, 0x8, 0x8, 0x2, 0x80, 0x5, 0x98, 0x7, 0x2, 0x1c5b6f62, 0x6, 0x22c0, 0x3, 0x1c000, 0xa458, 0x1, 0x1, 0x5, 0x6, 0x7, 0x9, 0x85, 0x6, 0x1, 0x8, 0x7fffffff, 0xd9, 0x1, 0xfffffff9, 0x6, 0x10001, 0x10001, 0x2, 0x1, 0xffffffff, 0x3, 0x9, 0x6, 0x1aa1, 0xe7a7, 0xfff, 0x7f, 0x7ff, 0x8000, 0x80000000, 0x7, 0xffffff88, 0x1ff, 0x67, 0x8ba, 0xef69, 0x0, 0x1f, 0x1, 0x3, 0x200, 0xfffffff7, 0x4, 0x3, 0x7fff, 0xcdf, 0x373, 0x4, 0x8, 0x81, 0xad, 0xfff, 0x12b, 0x8001, 0x7, 0x80000000, 0x800, 0x92, 0x0, 0x88, 0x0, 0x80000001, 0x0, 0x401, 0x5, 0x1, 0x3, 0x4, 0x6, 0x5, 0xfd9, 0x10000, 0x4, 0x5, 0xfff, 0x0, 0x7ff, 0x8, 0x0, 0x3b77, 0x8, 0x8, 0x0, 0x80000000, 0x6, 0x3, 0x7, 0x8, 0x5, 0x401, 0x2, 0xffffb582, 0x3, 0x6, 0x0, 0x5, 0x2, 0x5c, 0x8, 0x7, 0x9, 0x0, 0x101, 0x100, 0x1, 0x8, 0x10000, 0x4, 0x0, 0xd24b, 0x2e, 0x400, 0x0, 0x0, 0x8a, 0x8, 0x0, 0x1ff, 0x6, 0xfffffffc, 0x0, 0x1d000000, 0x8, 0x29, 0x800, 0xf73, 0x5, 0x4de, 0xe2, 0x1, 0x8, 0x7, 0x8000, 0x8, 0x8, 0x5, 0x6, 0x8001, 0x6, 0x80000001, 0x0, 0x4, 0x1, 0x3, 0x17, 0x10000, 0x5, 0x1, 0x0, 0x9, 0x2, 0x10000, 0x5, 0x2, 0x0, 0x3ff, 0x6d, 0xfffffbff, 0x9, 0x2, 0x14, 0xde, 0x6e0, 0x100, 0x9, 0x7, 0x3, 0x80000000, 0x2, 0xd2, 0x200, 0x8, 0x5, 0xa3, 0x2, 0x0, 0x5, 0x401, 0xff, 0xffff, 0x80000001, 0x8000, 0x5, 0x7, 0x6, 0x5fb, 0x1, 0x6, 0x8, 0x1, 0x5, 0x800, 0x48a21261, 0x9, 0x5, 0xfffeffff, 0x0, 0xcb, 0x5, 0x0, 0x101, 0x3, 0x0, 0xd7, 0x4, 0x0, 0x3, 0x2, 0x8, 0xffffffff, 0x4, 0x9cc, 0x81, 0x1, 0x5b, 0x4, 0x1, 0x5, 0x5, 0x7, 0x0, 0x200, 0x7, 0x5, 0x16, 0x800, 0x81, 0xffffffff, 0x100, 0x7, 0x1000, 0x5, 0x0, 0x0, 0x1f, 0x46, 0x8d04, 0xffff, 0x4, 0x7fffffff, 0x1f, 0x2, 0x8, 0x0, 0x10001, 0x1, 0x8, 0x5, 0x6, 0x5, 0x6, 0x6, 0x5, 0xec, 0xffff83a1, 0x100, 0x800, 0xffffff7f, 0x6, 0x0, 0xfffffffd, 0x100, 0x3, 0xfff, 0x3, 0x8, 0x6, 0x5, 0xffff, 0x6, 0x77c, 0x6, 0xfd6, 0x1, 0x101, 0x1, 0x4, 0x1, 0x8, 0xb7529c74, 0xfffffffb, 0x8001, 0x2, 0x20b, 0xfffff773, 0x32, 0x4a, 0x2, 0x6, 0xf31e, 0x4, 0x7fffffff, 0x9, 0x3, 0x6, 0xffff8001, 0x9, 0x80, 0x5, 0x3, 0x3, 0x6, 0x7fc, 0x159b2528, 0x5, 0x100000, 0x4, 0x4, 0x1, 0x0, 0x4, 0xffffffff, 0x9, 0x0, 0x7, 0x7ff, 0x2, 0xcb6a, 0x7, 0x0, 0x4, 0x1f, 0x31c6, 0x7, 0x90, 0x80000000, 0x6, 0x7a5, 0x4, 0x1000, 0x81, 0x8, 0x7fff, 0x7f, 0x8, 0x1, 0x2202, 0x3, 0x0, 0x1cb8, 0x1f, 0x0, 0x10000, 0x80000000, 0x0, 0x1, 0x7, 0x9, 0x5, 0x1ea, 0x7ff, 0x2, 0x8, 0x401, 0x2, 0x2, 0xffff, 0x5, 0x3, 0x7, 0x81, 0x1, 0x81, 0x0, 0x4, 0x80000000, 0x1f, 0x800, 0x7, 0x39d2, 0x0, 0x683d, 0xfff, 0x3f, 0x1, 0x400, 0x2, 0xd9, 0xfff, 0x1, 0x7, 0x3, 0xffffffff, 0x3, 0x2, 0x80000000, 0x7, 0x1, 0x7, 0xe97, 0x8, 0x3, 0x3, 0x3ff, 0x4, 0x7, 0xb60, 0x8, 0x8001, 0x3, 0x5, 0x1, 0x8001, 0x3, 0x1ff, 0x0, 0x81, 0x5, 0x2, 0xffffdcfc, 0x800, 0x7f8, 0x709, 0x401, 0x3ff, 0x2, 0x5, 0x2, 0x9, 0x2, 0x5, 0xd7c4, 0x7ff, 0x6, 0x5, 0x8001, 0x1a, 0xbc, 0x1, 0xffffffff, 0x0, 0x8, 0x9, 0x629, 0x40, 0x270b, 0x6, 0x3d071fa8, 0x80000001, 0x5, 0x8, 0x7, 0x8, 0xc6e, 0x1ff, 0x3, 0x1, 0x101, 0x5, 0x0, 0x800, 0xeee9, 0x1f, 0x1ff, 0xf1b, 0x9, 0x6, 0x9, 0xffffffff, 0x7, 0x800, 0x0, 0x40, 0xd6, 0x0, 0x1f, 0x1000, 0x7fffffff, 0x7, 0x3, 0x200, 0x4df, 0x5718, 0x7e5, 0x600000]}) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="44e8000000040000000000010000000000000000001b67d4a223", @ANYRES32=r6, @ANYBLOB="0000000000000000240012800b00010062726964676500001400028005001900000000000500170000000000"], 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@remote}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x100000001, 0x2) 06:48:59 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000000)={0x0, 'ip6erspan0\x00', {0x2}, 0x4}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0, 0x4c}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3d) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = dup(r2) r4 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r4) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, &(0x7f0000000040)) inotify_init1(0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r1, 0x0, 0x0) 06:48:59 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:48:59 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) [ 996.525743] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 06:48:59 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:48:59 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:48:59 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000640)='security.capability\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', 0x0, 0x0, 0x0) rmdir(&(0x7f0000000580)='./bus/file0\x00') [ 996.625932] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=32768 sclass=netlink_route_socket pid=5225 comm=syz-executor.0 06:48:59 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:48:59 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:48:59 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:48:59 executing program 5: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:48:59 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) [ 996.915102] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 06:49:00 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f00000000c0)={'tunl0\x00', {0x2, 0x4e20, @rand_addr=0x64010102}}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="44000000100001041100"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000240012800b00010062726964676500001400028005001900000000000500170000000000"], 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@remote}, 0x14) ioctl$SIOCAX25OPTRT(r4, 0x89e7, &(0x7f0000000100)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x2, 0x20}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x100000001, 0x2) 06:49:00 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:49:00 executing program 5: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:00 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000640)='security.capability\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', 0x0, 0x40020, 0x0) rmdir(0x0) 06:49:00 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:49:00 executing program 5: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:00 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) [ 997.804129] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 06:49:02 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:49:02 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:02 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000640)='security.capability\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', 0x0, 0x40020, 0x0) rmdir(0x0) 06:49:02 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) fallocate(r0, 0x40, 0x2, 0xe1b) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5}, @IFLA_BR_MCAST_SNOOPING={0x5}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@remote}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x100000001, 0x2) futimesat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={{0x0, 0x2710}}) 06:49:02 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:49:02 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000500)='fdinfo\x00') fchdir(r1) sendto$inet(0xffffffffffffffff, &(0x7f0000000400)="c7d18f34d6ce439479e422a8ca2b4ade838e56539f3622b68fa29c9c941279ad2b423229b2bb7d98aeb273018feb89afdffeaf81b4777f3830e6cd74f0268c1cb0e399b7a625bc6e0841353af8d889a32336ad88b57038d022cd382730e997a36774d87620a6667e6d534d52cb117403bdd05dca579c1e8c263ff16467f2788fa08d3b5f1a83e7f85530c9bb32f10415131cd1c5b766a93c6a65639263cdc0dc9438edb2e2e5331d6214146d9657c6130d83ba49020f8d18ff7e0a297a2f034ce7462e06571ad06cda70913ccbbcf7ff524324b2715426dab677728c644dda0f1dbc9195961cea23c3b2de870e4f4f4d4fd2b2a3", 0xf4, 0x4040010, &(0x7f0000000080)={0x2, 0x4e22, @broadcast}, 0x10) wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x9, r0, 0x0, 0x8000) r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r2) write$UHID_CREATE(r2, &(0x7f00000002c0)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000540)=""/182, 0xb6, 0x6, 0x9, 0x7, 0x5, 0x9}}, 0x120) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PPPIOCSMAXCID(r4, 0x40047451, &(0x7f00000001c0)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:49:02 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:02 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, 0x0, 0x0) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:49:02 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) [ 999.859787] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 06:49:02 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000640)='security.capability\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', 0x0, 0x40020, 0x0) rmdir(0x0) 06:49:02 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:02 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, 0x0, 0x0) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:49:02 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, 0x0, 0x0) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:49:02 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:02 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040), 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) [ 1000.181314] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 06:49:03 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:03 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) 06:49:05 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_ifreq(r2, 0x8921, &(0x7f0000000000)={'ipvlan0\x00', @ifru_names='veth1_to_batadv\x00'}) ptrace$cont(0x20, r0, 0x0, 0x0) 06:49:05 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040), 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:49:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x3e, &(0x7f0000000080)={@link_local={0x3, 0x80, 0xc2, 0x0, 0x9}, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\t\b\x00', 0x8, 0x3a, 0x0, @remote, @mcast2, {[], @echo_request}}}}}, 0x0) 06:49:05 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r3, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) write$selinux_attr(r3, &(0x7f00000000c0)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5}, @IFLA_BR_MCAST_SNOOPING={0x5}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@remote}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x100000001, 0x2) 06:49:05 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:05 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) 06:49:05 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040), 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:49:05 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:05 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(0xffffffffffffffff, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:49:05 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:05 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x40047452, 0x0) 06:49:05 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, 0x0) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, 0x0) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:08 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(0xffffffffffffffff, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:49:08 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)=""/226, 0xe2) 06:49:08 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r4) write$FUSE_STATFS(r4, &(0x7f00000000c0)={0x60, 0x0, 0x8, {{0x5e5, 0x4, 0x659, 0x3, 0x7f, 0x5, 0x8, 0x8d}}}, 0x60) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5}, @IFLA_BR_MCAST_SNOOPING={0x5}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@remote}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x100000001, 0x2) 06:49:08 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) 06:49:08 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f00000001c0)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xf, r0, 0xffffffffffffffff, &(0x7f0000000100)="62267f0c003f2f535d1224ed98ad513fc746f223026c") r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') r4 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r4) ioctl$KVM_DIRTY_TLB(r4, 0x4010aeaa, &(0x7f0000000180)={0x6, 0x2}) preadv(r1, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0xa9}], 0x1, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r3, 0xc0205649, &(0x7f0000000040)={0x990000, 0x2, 0x931, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x990a61, 0x7, [], @value64=0xa4}}) 06:49:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, 0x0) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:08 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(0xffffffffffffffff, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:49:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=']) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:08 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:49:08 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x32}, 0x0, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x4, 0x0, 0x4}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 06:49:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=']) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:08 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:49:09 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:49:09 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=']) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:09 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x20}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xfffffeb7, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5}, @IFLA_BR_MCAST_SNOOPING={0x5}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@remote}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x100000001, 0x2) 06:49:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) [ 1006.933677] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1006.947351] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 06:49:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:11 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:49:11 executing program 1: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000100)=ANY=[]) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) 06:49:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) 06:49:11 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r1, 0x0, &(0x7f0000000000)="5a9f649ea610eafa54188a42f94251") r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:49:11 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5}, @IFLA_BR_MCAST_SNOOPING={0x5}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@remote}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x100000001, 0x2) socket$inet(0x2, 0x3, 0x3) 06:49:11 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r1, 0x10, 0x70bd25, 0x25dfdbfb, {}, [@FOU_ATTR_TYPE={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040010}, 0x1) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r2, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_NEW_STATION(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000380)={0x48, r3, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@NL80211_ATTR_REASON_CODE={0x6}, @NL80211_ATTR_STA_SUPPORTED_RATES={0x24, 0x13, "1332ecfb2417f23d0936622ba8c701f9427721b64c68c689aa96f317951c9324"}, @NL80211_ATTR_STA_AID={0x6, 0x10, 0x225}]}, 0x48}, 0x1, 0x0, 0x0, 0xc824}, 0x40000) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:49:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) [ 1008.957454] audit: type=1326 audit(1595054951.780:60): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5499 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45f01a code=0x0 06:49:11 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:49:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:11 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:49:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:12 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:49:12 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x149042, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) open(&(0x7f00000000c0)='./bus\x00', 0x143402, 0x0) sendfile(r1, r0, 0x0, 0x0) 06:49:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:12 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:49:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) 06:49:14 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x80, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r1) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000000)=0x5, 0x1) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:49:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:14 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r6) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, 0xffffffffffffffff) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5}, @IFLA_BR_MCAST_SNOOPING={0x5}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@remote}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x100000001, 0x2) 06:49:14 executing program 1: 06:49:14 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:49:14 executing program 4: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) 06:49:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:14 executing program 1: 06:49:15 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, 0x0, 0x0) 06:49:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:15 executing program 1: 06:49:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:17 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x8, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r1, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) sendmsg$SOCK_DESTROY(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000040)={&(0x7f00000002c0)={0x1368, 0x15, 0x200, 0x70bd2d, 0x25dfdbfe, {0x3b, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x1c, 0x1, "1d224e904a3656df586739f8a61c23cff8c0e794a59bc2da"}, @INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "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"}, @INET_DIAG_REQ_BYTECODE={0x36, 0x1, "56298d88a5da6fd6881f038a1602c12ec7d5ee39ae9b88096ba333a2588c69248573117cc8073de2cc78fdab2f62c2a0d42f"}, @INET_DIAG_REQ_BYTECODE={0x44, 0x1, "99ee5c4872f494e7e6c84f3a230c378c4c99d4687906ac9096bbaef85e53c15da4b8c65e9fc4d6c42becda807875b07c832df7b827d97f99c24a1d8988309ebb"}, @INET_DIAG_REQ_BYTECODE={0x58, 0x1, "27f7ed88f9f5099c81aebcc32218a3b7536e46e85bca27a18c7e32f8ed061fd36b4d44a1d75d843ac51f9bc49c507b7a6fc23d05a8f33846ff51cc89de54de1f1b46525bf48eead94f6a6e83a11f5d2d04d968e3"}, @INET_DIAG_REQ_BYTECODE={0x71, 0x1, "bebdfa21000013c1f081f4210623899134913820f545fdfc619e83e304f0c90314421fcbacab2c12c57b08a49434391abfe57e112b6be48bc34d985f6c0ba34c12da5f8e8762ec990c98889fe17d02b9520bd0daa9c6e2a33db6e1dd501e733ac06bbf99e5890ee8659a947ef2"}, @INET_DIAG_REQ_BYTECODE={0x65, 0x1, "a2e3ca17b0232520181b8702592760d4dbecd22c6bbc8869e53a77b42cb8de37c2dbce1bd86ac3cc1e05d8e3454a68b69b4b52b86a656a41d991b295cd5944da5fcac528aa4a61994d7e572d60e80e7a5edd26ebb2468230261710cacfb8816e94"}, @INET_DIAG_REQ_BYTECODE={0x22, 0x1, "2460124517611077fd2b32134a55c3a62f9d16f0db2b0f4f83f1ea37f725"}, @INET_DIAG_REQ_BYTECODE={0xd8, 0x1, "6aafefc91bf41cb0d0ddf746eb3b4fe8006f4ef773b2396fe3b302537f15f8b658746258013b5042d0b62c8a93acbae637390607de7c295d00ec4743e627e80741b8a6d6e13feb47623de8ed49e2c40d7afb39c62b4029c0dc3eb89cb34d1c329bfc0cb35e750966c52e40cc6617d47ecbf97d88022728d98068c103859026020925018df4579857fc6dd9b1aec6f28b5d8a782aeaebdeae01f440abc11880c3801fd0ec818f4f45f2a04c7c40952643bbafbd4813e6fd0ef38c9aa38a090760f22fbbb58c4c535fad0f73999cbc59b6e479f9bc"}, @INET_DIAG_REQ_BYTECODE={0x85, 0x1, "6df47b8f7ad86d6e877ee00e5941248217a79e9cd6c3c19b8f072f2504b1ac0da0e02fb7ceb5ac79fd38f87146122fe4ae0fbefbd7c882277211e1bfab701f17c6521112dcdc6733673bfe9286a4bc2855dab0034fbed5f338fea87cb5c0040ebcd57dccf3b93704c3e45cbc9c45a353483cd1d0013771b03b47f53f6df021cb21"}]}, 0x1368}, 0x1, 0x0, 0x0, 0x48000}, 0x4000) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x81) ptrace$cont(0x9, r0, 0x5, 0x9) 06:49:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:17 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, 0x0, 0x0) 06:49:17 executing program 1: 06:49:17 executing program 4: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) 06:49:17 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r5, @ANYBLOB="00000000e8d79d6e1ca6c790809bf72504da60071fd9e8de2bd92fd4b3"], 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@remote}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r6, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) r8 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r7, 0x84, 0x71, &(0x7f0000000140)={r9}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0)={r9, 0xffff}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r6, 0x84, 0x72, &(0x7f00000000c0)={r9, 0x1, 0x20}, &(0x7f0000000100)=0xc) splice(r0, 0x0, r2, 0x0, 0x100000001, 0x2) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000380)={0xc5, 0x29, 0x1, {0x8ff, [{{0x0, 0x4, 0x3}, 0x1, 0x8, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x7fffffff, 0xe8, 0x7, './file0'}, {{0x10, 0x4, 0xfffffffffffffffe}, 0x5, 0x80, 0x7, './file0'}, {{0x55, 0x3, 0x4}, 0xb2a, 0x6, 0x7, './file0'}, {{0x80, 0x3}, 0x5, 0x3f, 0x7, './file0'}, {{0x4, 0x0, 0x2}, 0x71a2, 0x20, 0x7, './file0'}]}}, 0xc5) 06:49:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:18 executing program 1: [ 1015.159314] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. 06:49:18 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, 0x0, 0x0) 06:49:18 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000080), 0x1a, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x1b, r0, 0x800, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{0x77359400}, {0x77359400}}) r2 = dup(r1) setsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f0000000080)={0x7, "d22ba1"}, 0x6) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140)={r4}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0)={r4, 0xffff}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f00000000c0)={r4, 0x1}, &(0x7f0000000100)=0x8) ptrace$cont(0x20, r0, 0x0, 0x0) 06:49:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:18 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0x0, 0x1, [0xfffc]}, 0xa) 06:49:18 executing program 1: 06:49:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) [ 1015.439338] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. 06:49:18 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0x0, 0x1, [0xfffc]}, 0xa) 06:49:18 executing program 4: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) 06:49:18 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @dev}, 0x4}}, 0x2e) r1 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r1, &(0x7f00000002c0)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x1}}, 0x2e) 06:49:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:18 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ion\x00', 0x8082, 0x0) ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000000240)={0x1, 0x6, 0x3}) close(r2) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x26, 0x5, 0x2) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x24, 0x10, 0x800, 0x70bd26, 0x0, {}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@remote}, 0x14) r6 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r6) accept$inet(r6, &(0x7f0000000080)={0x2, 0x0, @loopback}, &(0x7f0000000100)=0x10) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x100000001, 0x2) 06:49:18 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0x0, 0x1, [0xfffc]}, 0xa) 06:49:21 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = fcntl$getown(r1, 0x9) ptrace$cont(0x18, r3, 0x0, 0x1) 06:49:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:21 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, 0x0) 06:49:21 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff}, 0x8) 06:49:21 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:49:21 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r6) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r6, 0x84, 0x12, &(0x7f00000000c0), &(0x7f0000000100)=0x4) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5}, @IFLA_BR_MCAST_SNOOPING={0x5}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@remote}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x100000001, 0x2) 06:49:21 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff}, 0x8) 06:49:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:21 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) 06:49:21 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff}, 0x8) 06:49:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:21 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0x0]}, 0xa) 06:49:24 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r1, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) ioctl$USBDEVFS_CLAIMINTERFACE(r1, 0x8004550f, &(0x7f0000000000)=0x1) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:49:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:24 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x7, 0x4, 0x408, 0x0, 0x108, 0x0, 0x320, 0x320, 0x320, 0x4, 0x0, {[{{@uncond, 0xc0, 0x108}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x1000, 'syz0\x00'}}}, {{@arp={@multicast2, @multicast2, 0x0, 0x0, 0x0, 0x0, {@mac=@multicast}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'lo\x00'}, 0xc0, 0x108}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x5, 'syz0\x00'}}}, {{@arp={@private, @multicast1, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'team_slave_1\x00', 'rose0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="c4fa40cef900", @loopback, @local}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x458) 06:49:24 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0x0]}, 0xa) 06:49:24 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r5, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000240)={'ip6tnl0\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x29, 0x52, 0x9, 0xffffffff, 0x8, @rand_addr=' \x01\x00', @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x10, 0x781, 0x56d02d81}}) getsockname$packet(r4, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5}, @IFLA_BR_MCAST_SNOOPING={0x5}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@remote}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x100000001, 0x2) 06:49:24 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1021.395167] x_tables: duplicate underflow at hook 1 06:49:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) [ 1021.452504] x_tables: duplicate underflow at hook 1 06:49:24 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0x0]}, 0xa) 06:49:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newtaction={0x48, 0x30, 0x3ed, 0x0, 0x0, {}, [{0x34, 0x1, [@m_skbedit={0x30, 0x1, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) 06:49:24 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x48, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0) 06:49:24 executing program 3: 06:49:27 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x400000000, 0x4) ptrace$setregs(0xffffffffffffffff, r0, 0x9, &(0x7f0000000000)="ac39eb35809398aaba514f48bb2cd5cdaba2558954e340f796b6f89226781f65d7e1b176d8c9056bed93022fcadaecc7e1c7e43018ad5b505ecd40457bc5073b34b97225fdd10eeba872000a05b536adfc786422bb7aef7f680425fcd10b483904d2bc42ac109e4a8abd46eda3c8ec66") r1 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3d) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r1, 0x0, 0x0) 06:49:27 executing program 1: 06:49:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:27 executing program 3: 06:49:27 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r6, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r6, 0x84, 0x15, &(0x7f00000000c0)={0x4}, 0x1) r7 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r7) setsockopt$inet6_group_source_req(r7, 0x29, 0x2e, &(0x7f0000000240)={0x9, {{0xa, 0x4e21, 0x8, @private0, 0x8}}, {{0xa, 0x4e23, 0x80000001, @empty, 0xfff}}}, 0x108) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000240012800b00010062726964676500001400028005007f00000000000000170000000000"], 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@remote}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x100000001, 0x2) 06:49:27 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:49:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:27 executing program 1: 06:49:27 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000000c0)="4c89e7cbcdf54030e978c07aeadc527c85cd813927c721bdf9a5973f7b3002870bbc453d142a0ab601", 0x29}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setresuid(0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f00000003c0)={0x78, 0x0, 0x5, {0x62, 0x5, 0x0, {0x1, 0x301, 0x19f0, 0x9, 0x8, 0x0, 0x7ff, 0x9, 0x2, 0x10000, 0x7f, 0x0, 0xee01, 0xb5, 0x3}}}, 0x78) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000001c0)) preadv(r3, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) sendmsg$AUDIT_SET(r3, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000100)={0x38, 0x3e9, 0x2, 0x70bd28, 0x25dfdbfd, {0x40, 0x1, 0x2, r4, 0x9, 0x8, 0x6, 0x127, 0x0, 0x1}, ["", "", "", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0xc) 06:49:27 executing program 3: [ 1024.513602] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 06:49:27 executing program 1: 06:49:27 executing program 3: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0x10, 0x3, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="4c00000012001f15b9409b849ac00a00a5784002000000000000030038c88cc055c5ac27a6c5b068d0bf46d323456536005ad94a461cdbfee9bdb9423523598451d1ec0cffc8792cd8000000", 0x4c, 0x0, 0x0, 0x0) 06:49:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) [ 1024.660743] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 06:49:27 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x3, 0x3, 0xf000, 0x1000, &(0x7f0000001000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x0, 0x0, 0x25dfdbff}, 0x1c}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:49:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:28 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5}, @IFLA_BR_MCAST_SNOOPING={0x5}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@remote}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x100000001, 0x2) 06:49:28 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:49:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000020004000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:28 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x3, 0x0, 0x0, 0x0, 0x64}, @mpls={[], @ipv4=@udp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x0, 0x64, 0x0, @wg=@response={0x2, 0x0, 0x0, "054a007448169d4622dde6c172e0ec4459787ab7e62f97791e209c8a332e3075", "2da67c3e7cc7d6f68082ebb228ed650e", {"8b634689302e9e24710789ad25a8b088", "c4abc73a93529be3fc385ccb60ef26f8"}}}}}}, 0x82) 06:49:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000020004000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:30 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) 06:49:30 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:49:30 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r5) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000340)={&(0x7f0000000000)='./file0\x00', r5}, 0x10) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r6, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x8e0}, [@IFLA_IFALIAS={0x14, 0x14, 'team_slave_0\x00'}, @IFLA_CARRIER={0x5, 0x21, 0x3}]}, 0x3c}}, 0x40) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@remote}, 0x14) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[@ANYRES32], 0xffffffffffffff67) splice(r0, 0x0, r2, 0x0, 0x100000001, 0x1) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000240)) ioctl$SIOCRSGCAUSE(r8, 0x89e0, &(0x7f0000000100)) 06:49:30 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:49:30 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x20000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)={{0x2, 0x0, 0x0, 0x0, 0x0, 0x60, 0x6e63}, 0x0, 0x0, 0x6624, 0x101, 0x9, 0x6, 0x1, 0x3ff, 0x0, 0x20, 0x0, r0}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000040)={'veth1_to_hsr\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f0000000100)={0x8001, 0xb, 0x4, 0x400, 0x7fff, {0x0, 0xea60}, {0x4, 0x1, 0x9, 0xf7, 0x2, 0xff, "3ba53480"}, 0xf, 0x2, @planes=&(0x7f0000000080)={0x8, 0x8, @fd}, 0x4, 0x0, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) fcntl$getflags(r3, 0x0) 06:49:30 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = semget$private(0x0, 0x3, 0x0) semctl$IPC_RMID(r1, 0x0, 0x0) tkill(r0, 0x3d) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) vmsplice(r2, &(0x7f00000012c0)=[{&(0x7f00000002c0)="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", 0x1000}, {&(0x7f0000000100)="f3b9278e6517016e5827c03f8a309622490bb12d0fb316178174f603818f2aaf5171c2403d5900fe5774914c19949acd0f3338e8feadec9484e547b368b1ee7cdd10ede80afcec8dbfe9ce1abbc2275a7840fac12958b2d3ced77fd9267113daea2f51bc7d598b881c6d74bad18a7f0e161db8196b3b8edfe01a360eeca69e7bdb0a7da8ffb9b9af3e11cc0b8b2f267054c7e4e651b1a670eef605c35362c52fa42b81dddc46fb23a6487ddbd99c12f6802ace409dabed3017fe3ab2cf02ac2eab8d20ed3187cd2fbbd6393a8f47e2c9cf467e8e97f9e38c8bbaf5968d22579138dd626aa3b4d1", 0xe7}], 0x2, 0x1) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x1) ptrace$cont(0x20, r0, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r4, 0x80386433, &(0x7f0000000000)=""/69) 06:49:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000020004000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:30 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) [ 1027.716984] Unknown ioctl 35296 06:49:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,use', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:30 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) 06:49:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,use', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,use', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:31 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) utime(&(0x7f0000000200)='./file1\x00', 0x0) 06:49:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_i', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_i', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:31 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = dup(r0) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000000)) 06:49:31 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x6}]}, 0x10) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r3, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff7f, 0x0, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f0000000000)=""/60, 0x3c, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/meminfo\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000000)="480500001400", 0x6}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x200000000e228, 0x0) [ 1028.653327] netlink: 1292 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1029.368764] netlink: 1292 bytes leftover after parsing attributes in process `syz-executor.1'. 06:49:33 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:49:33 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:49:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_i', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:33 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x91}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x2) recvmmsg(r1, &(0x7f0000001ec0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r4, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa", 0x3c) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r4, 0x0) sendfile(r4, r4, &(0x7f0000000200)=0x4, 0xffa) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000180)='Z\x00') 06:49:33 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(r4, 0x0, 0x29, &(0x7f0000000300)={@broadcast, @broadcast, 0x1, 0x1, [@rand_addr=0x64010102]}, 0x14) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5}, @IFLA_BR_MCAST_SNOOPING={0x5}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@mcast2}, 0x14) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r6 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r6) r7 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_REMOVEDEF(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x4c, r7, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x6}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @dev={0xfe, 0x80, [], 0x3f}}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @rand_addr=0x64010102}]}, 0x4c}}, 0x140) sendmsg$NLBL_MGMT_C_VERSION(r6, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)={0x6c, r7, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x2}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x1a}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x2}, @NLBL_MGMT_A_DOMAIN={0xb, 0x1, 'bridge\x00'}, @NLBL_MGMT_A_DOMAIN={0xb, 0x1, 'bridge\x00'}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x1}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x2}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_CV4DOI={0x8}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20000894}, 0x80c1) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r8, &(0x7f0000000700)={{0x1b, 0x3d, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x2}, [], "", [[], [], [], [], []]}, 0x540) splice(r8, 0x0, r1, 0x0, 0x100000001, 0x3) 06:49:33 executing program 1: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000000), 0x0) dup2(r0, r1) mmap(&(0x7f0000200000/0x400000)=nil, 0x400002, 0x0, 0x2011, r1, 0x0) 06:49:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:33 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(0x0) ioctl$KDFONTOP_COPY(0xffffffffffffffff, 0x4b72, &(0x7f0000000180)={0x3, 0x0, 0x1e, 0x8, 0x0, 0x0}) perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPSET_CMD_TEST(r1, 0x0, 0x804) sendmmsg(r0, &(0x7f0000001980), 0x8c83086635fae290, 0x2000f760) openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x0, 0x0) pipe(0x0) 06:49:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:36 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r3, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x58, 0x8, 0x6, 0x201, 0x0, 0x0, {0x3, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0xc810}, 0x4044061) ptrace$cont(0x20, r0, 0x0, 0x0) 06:49:36 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() ptrace$peeksig(0x4209, r0, 0x0, 0x0) 06:49:36 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:36 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:49:36 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x2, 0x300) r3 = dup(r2) getsockopt$packet_int(r3, 0x107, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x4) 06:49:36 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r1, 0xf507, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5}, @IFLA_BR_MCAST_SNOOPING={0x5}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@remote}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x100000001, 0x2) 06:49:36 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:36 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:36 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 06:49:36 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:36 executing program 3: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f00000000c0)) timer_create(0x0, 0x0, 0x0) tkill(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x204) ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000240)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf\x00\x00', 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0x0) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 06:49:36 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:39 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r0) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@default, @null, 0x8, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}) r1 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3d) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r1, 0x0, 0x0) 06:49:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:39 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5}, @IFLA_BR_MCAST_SNOOPING={0x5}]}}}]}, 0x44}}, 0x20) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@remote}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x100000001, 0x2) 06:49:39 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000640)="6653070000053c27bc337600", 0xc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 06:49:39 executing program 3: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f00000000c0)) timer_create(0x0, 0x0, 0x0) tkill(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x204) ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000240)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf\x00\x00', 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0x0) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 06:49:39 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:49:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:39 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000000)=0x8, 0x4) 06:49:39 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825c56800278dcff47d010000805acf4f9f36462234e92479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab306004b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2b8db57fd590eb35dd450984a1f449a4739a428cf3b8988f7a75348613e5a09", 0xa9}], 0x4, 0x4) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) dup(0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r1, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r2) perf_event_open$cgroup(&(0x7f00000001c0)={0x3, 0x70, 0xc2, 0x40, 0x5, 0xff, 0x0, 0x7, 0x8, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000040)}, 0x2000, 0x3, 0x100, 0x3, 0x0, 0x9, 0x1000}, r2, 0x5, 0xffffffffffffffff, 0x1) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r3, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x9) ptrace$cont(0x20, r0, 0x0, 0x0) 06:49:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000180)="25bca274769e620a2734fa0095e07ca687ecb86a548802a902000000000000004e2fb8b579a782d257146d0e0206e73ba8f4952bedc6760253ef5c69e4b99b4aba5090aa6b2c46b063720209570555ba7ad382143407d886f292243306d57c24df26", 0x62, 0x400}], 0x0, &(0x7f0000000080)) 06:49:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:40 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000000000001000"}) 06:49:40 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:40 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x14c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x11c, 0x2, [@TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14, 0x1, {0x0, 0x0, 0x7ff, 0x1a}}]}}]}, 0x14c}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000300)={'syztnl0\x00', &(0x7f0000000280)={'sit0\x00', r4, 0x29, 0x6, 0x0, 0x0, 0x40, @mcast1, @mcast2, 0x8000, 0x20, 0x9, 0x1f}}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'veth0_virt_wifi\x00', r6}) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r7, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xffffffffffffffdd, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5}, @IFLA_BR_MCAST_SNOOPING={0x5}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@remote}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x100000001, 0x2) r9 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r9) r10 = accept4$phonet_pipe(r9, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x80800) ioctl$sock_SIOCINQ(r10, 0x541b, &(0x7f0000000240)) 06:49:40 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:49:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') preadv(r2, &(0x7f0000000480)=[{&(0x7f0000001800)=""/4096, 0x1000}], 0x1, 0x0) 06:49:40 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:40 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'\x00', 0x7132}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000001c0)={0x0, 0x1, [@multicast]}) 06:49:42 executing program 2: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)=0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3d) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r2, 0x401, 0x0) 06:49:42 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:42 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSPGRP(r0, 0x5410, 0x0) 06:49:42 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5}, @IFLA_BR_MCAST_SNOOPING={0x5}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@remote}, 0x14) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r5, &(0x7f0000000040)={{0x1b, 0x3d, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000380)) write$binfmt_misc(r5, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r1, 0x0, 0x100000001, 0x2) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x1}, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, r7}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @mcast2}, {0x2, 0x0, 0xac141424, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, r7}}, 0x48) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0x400, 0x2, "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", 0x40, 0x8, 0x7, 0x80, 0x2, 0xcc, 0x3}, r7}}, 0x120) 06:49:42 executing program 1: 06:49:42 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:49:42 executing program 1: 06:49:43 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup(r1) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x14c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x11c, 0x2, [@TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14, 0x1, {0x0, 0x0, 0x800, 0x1a}}]}}]}, 0x14c}}, 0x0) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@mcast2, r4}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:49:43 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDFONTOP_COPY(0xffffffffffffffff, 0x4b72, &(0x7f0000000180)={0x3, 0x0, 0x0, 0x8, 0x0, 0x0}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) [ 1040.188974] ptrace attach of "/root/syz-executor.2"[6193] was attempted by "/root/syz-executor.2"[6196] 06:49:43 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:43 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:49:43 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r5, &(0x7f0000000040)={{0x1b, 0x3d, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000001880)=ANY=[@ANYBLOB="31000000100001040000000000fbff000000000097f360c86d3b1c9e77f7a3f1ef2151988db2665ae81554f622d4a896eaf9eac00fef7efe1bfc1cdef4cd1f2198c8c5cacfe9504edbaf17962049e83e050b55cf36d905c288c746af11d5c0d3424982ada58b734dde2511b2656d2fd06397f2c92a353ef182378d2347aa70827039fc8949186f5f1ede12d9d7f4e12235822089c51fb858e6b1110b88b3497e7ad03099b863555b3945659102f191ab85b7681185358e137c1472f6c62a54316bb99852316c378a604f7763988c3153b658bcf29814174219f8cb19bfdbf3ce2bc6452162da47491e3eb891793b9cf26748e626ba4ab5550b6cb92d304410457f", @ANYBLOB="f174c46ba65e01f214e6e207ce63f5978fcc4bb0287ea7be76c399071ca2f12ab523eb591db7c5ab56a43934113dcdc12dd48de29a35c4ff08197e041333dedf12c3476e3121ff5197369c2bc46eb619b4d765a237d1112e725935587d9f0a28f4d509072c14a0fd48fa7c87db9aa2daf44b69b36c1037cdecfb8d47422d29a385e1413d7ae0666d0ddafd1caa8ff46a624f9e4892e952c357ae840ae38ce7e3ae1de46835dc1eb47cb95de3ba07b971131ea228d20be81438d8e3fad212a57a0831d7cff589018a7a63dcfacfae94f8873ee71a63352d534f3e986b1e9e6096f0a0d3157de331977f9ee13e5cb82d23f980f5e015840e5fac1626b53041129c35bfac7810c646b7d31725f7688a0237c853c8bcd67858400f90ec99261a23cbf0baf0305de08b066c667fb049359cbc1dfa8363e214ecb78647ef00c0b09472a2a79f2a5993f808840021b92c7360ad57954ded54cdb1bc5c2e29fdf4329ad3b82ccf089426f363c6000c9bb365b55e1f17a9b29e160d8abd58eafb85f697bfb9e91988d504d9fc98bbe4dd951ddc4139a62a297b80ebbb3c44b302de32573b1a73245e1cd532d471fc3af857c1b2f996148a13399873117da6ef9bd53c3e46945ac912ab4244e59d82f1525af0f0b853df25b9f12b0b22143f839552b560a50310f13198de055eed08a1edc757e3c628f29165c0039b99a805d36f51d9cca01abfab4912803ea7b2de835e3f91908a00cd4cdeccc61e03a96b2c3c398283ce51872fbc8b013e9d62726b34e245b442d02e7282a9997d7d6db44da56b94eaf2c88ab4b0932724313749b050ecdb06101d1689da61ecf89528d67a7534030b51211b00f44c56c0c6a33f35f761eac92a9f04dcf7873ce56a266008293ea48f6a820b70c76a63c2642ef78dfb3953b7c59347cbb3bd9a04e11516c0f81073fcef0581155b4b7bd182f2d9707871944c0c127f165c302e03a42ea655b89762eaa7ce9f1bb727d995bc0cfa2dca3578173292fe0e3523e21030e02ac933808394769a951da09a589819fc115c2d24461fc2f5a259841aeba15c0d7112847aae3a91e30c5ac741dfb8175305e88e770a4ae0bfbce87d55fb94767f95d95570e50b98bbd79c4267cd5199668566fbebce7a0b0c39a292f2b9558edcfadd89d243dba4e2a344f066db30fc1c4ff2a95e98b8e373be6bc935a287d1485dfee191ff783bd0c98f99a1a7a3cbac4dcee200363bd3a5ead8d66ca497d0568fd85c1285b5bae490343ad8134251d0a610515eda61ad65056e53db561b48ab1ef74daccec5596c32712446b6a388e237d0ec6b71205384536f6929fc382db11bd664aa0b680538e288ab832491caa43a42081d4cc009be7852b9ce35635315f6f6b3c0cd37d11bab87e43afcdea8ecc5085e515cc5cd1dc4be98208613d55db0133a607b823a36190075594cc01359486a6a462da7d0a66e1f935fb5f136be42a0becbb551df3b88cf93c099e132f970e83345619d5f78e1918e6d72f065d9e91bb8b04b747e1bfe6a3a70f71843967ee8a5e1b6090496740805f40174d901efbe43822b39d2a21e077d4a734939b0cbbc3e73218978091ca75b5fc0ab4c37d88a076484048d5bd4a763d8ab42fa43c2c4bba1c6c785e85712ddd35590af061d4c7be549cc293719b6017aff8852915c6ee429b2dee270f50dd2103e4bcb5f5cad04f077c2426f8547bbc0eac3db6ce613384f7435070915d910e7698eb82aac6480acadb742152e3fbc1d9099924aa2f22f067792ca18e75e457f3edef4bfacbd19d24e4cca4f32200a14f20905aecd2884cfac8795b94d7631a45df1eebaae0002cc30d47670c125466df572fd31ec0cd636e3e8e3dd4abef275d1cac15cc2a468b6d9d737f495822ce6068bec7635173fffd00e692074828526115425b4a90363531b48ed10f13c4ae4ac19c7deea7e354ecd0bf88f8b9c5c79dfeac9cf89212d237eb94550a55f0f29b15911d19dd475d5de8f11c7fd66991c2e391ef5204c96ff7d6baa292c4878b80451acfff9c7aa149e2c3fe7a2e3eca302d1d1b0903effe3a1eeafac008eaf7ab30af8192d3fae3a2c4a672c475cb45f58bb1a6b454226bd042e1a983d4fb12329bb5f5e3bfec25b0d5a1d4883811b1339d845b142ef9efdccd0fffd8a0ba5fb23c6c02c8f99298af3a2d11dbe9c4a074c1fba218532d39037b2c07742f8f95535289629fdb71e4e8d3a92efc27bf37bd14987f4279fcca46db4038f652ff8ee5479b7876520f5c57ca7f4fcb32ea2b2fadbe99d8a6f77bb810a448221eadcd2e625ae6d1f134990fbecee5c2f859b00d6e3d70a7fa849eba0ac47815e1e5df65a11e33ab8bc668ec1de3226e234cd81191633fbec5684c1495dab103237d6913471d09ddec62d4c0981011e32313c7a2ddd539cbd3d4ad54e70cf5eef202e60ec3c819d6dceb1216c1af7cb545bee6f25ff42d1a335a4323fbaa53bd3ab3560a152fedc2f00e4ed848a1771aa1b2206b4d9c17daab6e40b28379236ff84fc1b9b8c6aa21f261851dcaf41f40a5d1ce347ee261dd99389a04c35115665795c35ca288ca035bd8148c53fbcd55052df62e4ed52438d7d63cb06cf4fc12f7f988415649429e657a6443738cdeaedaaae36cd493963447ef2431147f626c1be4295bb008ab7c50f3e244316c491f8528e3ac4d5df5d6e21df7a64725db08176f29172d314c31655de2dd3848a913f50942ec11c6ea6de21734066f9d2c7a80e1ad30d068d68122c5555cfb27d1f93b75de8e55a2679a041194895f692f35a7c16e994f5bb3d1bf38b17e147ff5afa4b990d4ab50b0abe9af230dbb26b9d2a63859fc937d1e0a5190a83c15181a2a26dc7639ac0481f28c6ff62582eb444b923d4265861d8ba4454cb8238671e341aeb28ffec6d3cfae01f09ba3f8b5b4183bad7d0ee3f07535c87cdb6ebb46159b31ad9b5f0e493d1e35c7a8676e0d7f9240276091d434c8d4250d971262318d3434a92d25c5a15d61985557215363557f692a5d2fd8d75c8fd6e09e5e6e365b4c367c58fb475210fe9999f75d6038d068af2a7c4625affdc148c706db5f761202b75f2c3dbfac73b63e3fa4be2d713efc0373fe8a878a3d4c7d4e7f0e85bf586f64bc115aff7a318d78ae8d75f14359e0a708a440e94c8458cead215358353c278f67ceccc6bff3be665df2cc429c85e795842f41f2ef0c4c72529b40e0dd84ed1f7e59fb6fd32be3629da54e06c61b3da79fefcd56a5d26e5551308e35a4de675f69d0204acfe96f78e2a19f307c60d55494b153b6d0aa9c9924076d53657af9d722afdd03010ab8801ba0d7090f03504e87a7a08eec1c2d2c749ff118e51811547092ae3dfc0f644265c01a8b85a17583f652e5ec6fc35fd32d63121562b40b41376ecc023aa4f5b870f551bf739ca2e1f9c8fb7401657cc6be165b492d9de5969548cb2b59e8d5a7858763c05b8919fc4f908286f24ae930a273184afc2009a6f6e0c31e1dce852ba18f937df82134439e07c1539ae692716ae2bed23a62ef099aa4e19edf136676c6437889333d5386b88efc0e02f1690c492b2b04eba08af0d8603108ed5cee53b658fade1d5815ceccbf2a5446545ea8c7eaa075d8cf46b3861e356fce4fe68ff9ea8ff764da8638ce031f7bfe9198a83a50c60f362c159ef5796cb4778c844bbc21b2841d481132212f434a111b5c493847b5ef23392a2cc4c143b500de989d129a12dc5d20ba5ea6e618cbb99054b0fa99469c7ed7402803f519b9ac1dd5407ec15bd7d98affa8ce3652cc87607d7293dfa0a7d51ede407d48d744a12f9b347f258458b8cfee0cf7372cfff42e0de33e97f9955d8fbdb319656633d453d33e87c3c67b907b9933f416b9aa7a9d9575ba0fedc9c94457a09c895f237489803c78c842f7b2a3020985e0da919ca05c2d7d9192ee9b35f4a2b2f63e9881c93f98a10748ac33e7b3feef62f7bb4629ca3cc2b4eeba367cbcd1d017be9495c3dcfd363debe3dfc9764f57c70781e4271e83a15d42b5338c59edf79ad9df7fbcf7f6aaf6a352851dc199be376c5bb0b40ee6d6fd029018fa579f8c1c9f1676048df9ee764e8c0a50e0ca0c8217e9977f33f9cda0dfc7bac480242ec720d8a52919376289c9c2fd543be4e967abfa5448a6f957dc24c142d35212489b3963c73ff089136ae8bfab255d55e82dd7b350de4c0fd4603e6970da245e9f9565190f587073a349138f36c303b415ff41d5f73426f0a1a9e9392f9bccc0a2c028e45f6056066b1bbf61667c265179980d6088e1503e42c4017095a839a752510c247a6257e1b4e161fe77a5223443357d20d37b09d20bc94244cc4d8ebaefb2810589cb556bbc5622d6db6ab04ad9a17b498b383537eff5102646bed300f43965d6955a9dd4d719d675f28713127cf3a8dcd0d8b94111d5fb8f03000ea9f9ef4059a8af17b53fc1db1fe83eb9245eb670d56ad4bd45e49efc275b510466e841f1d6297dff2dd44da8349230fd4e274e432f7a3dd1439838890fff02e3215e461c2386e884631b1a603209640583418be55a7f138928d0d95a0be8d55212273bd2d891f97b5e99e74c9b9a3b28cb44b8511eb954196b1cf9e5825686fb17a93fb8fde3dc84a5c1fd71c2b42f448af6f59cb054ccd2e9d60bc3847034cca3aa40ecbe801425cf53d72cca4073a000de8f50f05288458679ae86bf7e35684ba9a9694184b6b991a5d234e2b0657182d1995cfba31f411f6baa1ffc1b231b5cd438c4efd30b64adf032ecd2c958c868e1cedaf286f1881b767a0861abe739d608ab8c2aa600616a586a722f76c70efe0cf1aa868372dbda7a2e7c018c9500994c0d5b069947d1e383c072cbf0c1906c3defd3e5fd37f1a07b2702dbc0fc1ef4e8f12db2dc72347c4a3b9b1e1db09ca168caa1cce795cf6b601daa892c610381afd0925b5efd1d67af1f55545cc99f6ea43f157a47c5e3390f79aef7601a6f578265910647c29b8bf4e6ccd2e6926bd47f552a0d468ac5dc71e6cec49616318d26306953f04555f654cecb6eb9dd9ab4c172043d9ccc13fa3f9240ada464c244c633985058c30bf8df9d2dcd8281e97e4afb8f6075bbb75b3b8f0b648e7d262452fa8dbc6bf915ac3b2b0b8668418484e4d1994dd13339a77201a3727af2f02ab9fde35564ded33cfce8687016de2b7d0b75dc6fa5bfe27d33aaaf4e6cf581eea09df72451e8ee8830acf5576c4cefea4ab756d63ede7fb1d8a3f6c98ac3d294a5a3c669309b1cc8ba419cf562d40e9be881ddfe8b95c3464235caae2e1c6a9690a9145a6bff5b0f3d3b3d92b7e595524810b60d301c42f1f69b46b0a5613087b0a6154ee846f3b786b7ae41285d688695c5951b44191623b47de6cbd5c9b3ca2a8b78b0f5dafde0f6e228c8289b9983190b9ad877796e26cfbecab4441bffb1e0a44a9627082abde17c3ddae8cd20070d275241b4722e18e2b52f84447d9992adf3f9634cfa517948bd51cf83c3082d29efbad2894ed2fbb7febf7bbb24e52ed5c1801961f6f29d8eaedbf3f62023ceaa0afe35ddaa655cdb73a7d6a58f29d52674b751165f41885f689d6fa3ee7853880d999a4392f84a325099108a7799c4131fa729d1938c7fe4c576b012533cc45370a64d6ab8a69342b2b348ec9caa073774bc840efd002bb0b46531653d1a67883b2f97cd47d9c52da94cca27b88ed16f93275f4501ffc6c27967477245cd6e67848c1286e9e76ede89936f3d47425187c388719d7895506f5f9bf48c7a9b808378567f1e62144f755dab720036226aa91b3f02731adf5c871114a00d22a09296a946e2fb72128e7e8862ef5cb5d", @ANYRESOCT=r5], 0x44}, 0x1, 0x0, 0x0, 0x200048de}, 0x4000024) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@remote}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x100000001, 0x2) 06:49:43 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x2, 0x1, 0x1f, 0x0, 0x400000000}, 0x20) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) 06:49:44 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/5, 0x5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x12, &(0x7f0000000240)="f7f249b9740c9e02007f00000000000032a5"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1041.155917] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 06:49:45 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt(r0, 0x6, 0x3, 0x0, &(0x7f0000000000)) 06:49:45 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:49:45 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:45 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5}, @IFLA_BR_MCAST_SNOOPING={0x5}]}}}]}, 0x44}}, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r6) ioctl$RTC_AIE_OFF(r6, 0x7002) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@remote}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r7 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r7) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f0000000700)=@security={'security\x00', 0xe, 0x4, 0x428, 0xffffffff, 0xd0, 0x230, 0xd0, 0xffffffff, 0xffffffff, 0x358, 0x358, 0x358, 0xffffffff, 0x4, &(0x7f00000000c0), {[{{@ipv6={@ipv4={[], [], @local}, @local, [0xff, 0xffffff00, 0xff000000, 0x1fe], [0xffffff00, 0xffffff00, 0xffffff00], 'bond_slave_0\x00', 'veth1_to_batadv\x00', {}, {0xff}, 0xd6, 0x1, 0x0, 0x21}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x1}}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90, 'srh\x00'}, {0x88, 0x1, 0x3, 0x1f, 0xf5b0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @dev={0xfe, 0x80, [], 0x35}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [0x0, 0x0, 0x0, 0xff000000], [0xffffffff, 0xffffffff, 0xff, 0xffffff00], [0xff, 0xff, 0x0, 0xffffff00], 0x401, 0xd1a}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x8, 0x5, 0x718}}}, {{@ipv6={@remote, @ipv4={[], [], @empty}, [0x0, 0xff000000, 0xff000000], [0xffffff00, 0x0, 0x994a2a0118d0f158], 'lo\x00', 'macvlan0\x00', {0x80}, {0xff}, 0x1d, 0x8, 0x7}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x4d6, 0x4d4], 0x7, 0x81, 0x2}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x21, 0x8}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x6, 0x6c3f}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x488) splice(r0, 0x0, r2, 0x0, 0x100000001, 0x2) 06:49:45 executing program 3: 06:49:46 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x1ff, &(0x7f0000000080)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) sendmsg$NFNL_MSG_CTHELPER_GET(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x1, 0x9, 0x5, 0x0, 0x0, {0x6, 0x0, 0x3}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8814}, 0x8000) 06:49:46 executing program 3: 06:49:46 executing program 3: 06:49:46 executing program 3: 06:49:46 executing program 3: 06:49:46 executing program 3: 06:49:47 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:49:47 executing program 1: 06:49:47 executing program 3: 06:49:47 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) 06:49:47 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x14c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x11c, 0x2, [@TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14, 0x1, {0x0, 0x0, 0x7ff, 0x1a}}]}}]}, 0x14c}}, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r9 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r9, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x14c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x11c, 0x2, [@TCA_CHOKE_STAB={0x104, 0x2, "514722036d202a1e640138a53fbabaa71ee164cb9c9e09992b73824cc09d2dc44511ffe2d79ca2dcb539f7ed9ef9b8132c31696ce6d04246097cef71db191444a5d364191a5434db9dc7c039b5e791224811144e0f1b72869a34b9fcad9efdedb875394895c66173909b06e8c8ba0851029db019fa4357f578d995efde753d5d87c5da4838f496157735a70926d3b454441df3fb911c21d5ba9b428c35d82894560a0a36cf2bf37460097b40c42bf9f6ddfb599b0d3eaa6ec273c1bde7f452a7531ad33cb3438c31907285ca20042be90d5e2b9bb631c72f614e5c3b5d9ef258a46ad8f9469dd07275dd550b84eb54016ed117ca7ee0c12ee31811adaab9b78a"}, @TCA_CHOKE_PARMS={0x14, 0x1, {0x0, 0x0, 0x7ff, 0x1a}}]}}]}, 0x14c}}, 0x0) sendmsg$NL80211_CMD_NEW_MPATH(r4, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="4f4c29bd7000fcdbdf25170000000a001a00aaaaaaaaaabb00000a000600a4bcda32d813000008000300", @ANYRES32=r5, @ANYBLOB="0a000600c750ccf135a3000008000100ffffffff0c0099000600000000000000090099000700000003000000080001000000000008000300", @ANYRES32=r8, @ANYBLOB="0a001a00aaaaaaaaaabb0000b65448ea8433d4ce75c30cc963d7dcc84d48e68bf0a3c7cb6daf697fce22cb0b0e67cd9f89bacefcd6266e1c766679fc94a3e9443f59de5f4d080e891b28a094d0d3bb66560b086f6f0b2e2c2f"], 0x7c}, 0x1, 0x0, 0x0, 0x408d1}, 0x2004c801) getsockname$packet(r4, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r10}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5}, @IFLA_BR_MCAST_SNOOPING={0x5}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@remote}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x100000001, 0x2) 06:49:47 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) 06:49:49 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/22, 0x16) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r1, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e24, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, &(0x7f0000000080)=0x84) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f00000001c0)={r2, 0x1, 0xffffffff, 0x2}, &(0x7f00000002c0)=0x10) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:49:49 executing program 3: 06:49:49 executing program 1: 06:49:49 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) 06:49:49 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:49:49 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r4) connect$ax25(r4, &(0x7f00000000c0)={{0x3, @null, 0x4}, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000240012800b00010062726905006500001400028005001900000000000500170000000000"], 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@remote}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x100000001, 0x2) 06:49:49 executing program 5: 06:49:49 executing program 3: 06:49:49 executing program 1: 06:49:49 executing program 1: 06:49:49 executing program 5: 06:49:49 executing program 3: 06:49:52 executing program 1: 06:49:52 executing program 5: 06:49:52 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x24, &(0x7f0000000100), &(0x7f0000000040)=0x1e0) 06:49:52 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5}, @IFLA_BR_MCAST_SNOOPING={0x5}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@remote}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x100000001, 0x2) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x75e7}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000240)={0x1f, 0x2, 0x8004, 0x8, 0x1, 0xfffffffe, 0x800, 0x932, r6}, 0x20) 06:49:52 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000040)) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r4, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000000)=0x0) ptrace$cont(0x20, r5, 0x400000, 0x0) 06:49:52 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:49:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000280)=""/207, 0xcf}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)=""/136, 0x88}], 0x1, 0x0, 0xb}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000440)=""/225, 0xe1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e0055d) shutdown(r2, 0x0) r4 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400001803c1, 0x0) ppoll(&(0x7f0000000000)=[{}, {r4}], 0x2, 0x0, 0x0, 0x0) shutdown(r3, 0x0) 06:49:52 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:49:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000004c0)=[{&(0x7f0000000280)=""/112, 0x70}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/2, 0x2}, {0x0}], 0x2}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r2, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r4, &(0x7f0000001980)=[{&(0x7f0000000200)=""/95, 0x5f}, {0x0}], 0x2) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00541) shutdown(r4, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r5, 0x0) shutdown(r3, 0x0) 06:49:52 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r3, 0x0, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchown(r4, 0x0, r6) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000002cc0)=[{&(0x7f0000000000)={0x18, 0x1a, 0x800, 0x70bd28, 0x25dfdbfb, "", [@typed={0x8, 0x2a, 0x0, 0x0, @fd=r1}]}, 0x18}, {&(0x7f00000002c0)={0x250, 0x18, 0x8, 0x70bd26, 0x25dfdbff, "", [@typed={0xc, 0x7b, 0x0, 0x0, @u64=0x6}, @generic="c854f223e3f2f90336d2c6495cc6a37083abae76917ed025874fc0d1e97a72bf7c3878031d39968e4bfba1b3700bfc324a935f70046bb4d2fa735755560cce125827575bcd30000d4c20fff101ff59de87f7a5608b", @generic="31aa1f4a1df689fc47e831ece3716a932c7685122aa2c88df29ba7e8d14ab2fd5f6808048baba06d96612432401ce8e01b7b7d491a1d84bef1066caa02b284104101a1ab414720fdb46a23b0df9dc39949e856977a4870792113afae27caac7b8579893e3f6ca07d975c29e1ca98de8e26e2956fa7033b26c1e40d25cb3500e11446440a875a0ce8cbe5e1150817d8863c96d1da9831675477d08774af623cda83af8aefdb94f12b8ee10b86b024a9e058b2001a0e89c721e6a81633245fc178e4278dd33fbc56b033058de6c3", @typed={0x8, 0x4f, 0x0, 0x0, @ipv4=@loopback}, @nested={0xb7, 0x3, 0x0, 0x1, [@typed={0x8, 0x37, 0x0, 0x0, @fd}, @typed={0xc, 0x2, 0x0, 0x0, @u64=0x8}, @typed={0x8, 0x5c, 0x0, 0x0, @uid}, @typed={0x8, 0x40, 0x0, 0x0, @pid=r0}, @typed={0x8, 0x5f, 0x0, 0x0, @fd=r2}, @typed={0x8, 0x89, 0x0, 0x0, @pid}, @typed={0x8, 0x51, 0x0, 0x0, @pid}, @generic="b740fb144ff7fa26f88cb88610f172f35e884375f234e99b021bbe9ed724d085116cb9d284264d1fe2379c06894bb64d471aa18297c4c5df0ac81b6e2c0216751dc2061075954f2b0f0d62f7ebfca6361ecbb1b70114c7c8eb9025471755af3407ffe677c3579073c93c339df50134", @typed={0x8, 0x22, 0x0, 0x0, @pid=r0}]}, @generic="9f", @nested={0x4e, 0x33, 0x0, 0x1, [@typed={0x8, 0x5, 0x0, 0x0, @fd}, @generic="5c5f4abc11c0", @generic="1533a937915c142eba8e277d0098ed0d953e7eabdfe981cbccb7bba1ab3f5bb78633706e3c86776988f7405953da367d1bf7314d7823a3d08ae4ca25"]}]}, 0x250}, {&(0x7f0000000540)={0x1014, 0x35, 0x8, 0x70bd26, 0x25dfdbfd, "", [@typed={0x1004, 0x2a, 0x0, 0x0, @binary="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"}]}, 0x1014}, {&(0x7f0000001580)={0x142c, 0x31, 0x200, 0x70bd28, 0x25dfdbfc, "", [@nested={0x1145, 0x16, 0x0, 0x1, [@typed={0x4, 0x27}, @generic="89877dcaa386d1daf5d03398844f10e1f6023644ed667b57681ef347db818065698120d93db2f595824228bd3e3ca8452e157babe252e48c9b6ab8ffceecb52082a20e751709fdb6fb6a9dac2e438a50de79921af8cd5d16bac3a90d1c1e72095762bc8ece8951", @typed={0x5, 0x91, 0x0, 0x0, @str='\x00'}, @generic="38def1c9792f0cea5a45d254e120981d776de85b5a613f993b5aa65ea6c214bcb1d450434e4103bb55ddee71df334afac01776082d709f74b2e9699a971458d04b1bba7ec4966b2a8b8640bc3e2e5586bd607e5745559509f6a78a15cef392b01f73e0afcb477b2d49d17af5be863957bf78213809a26b5e7e40a3be189e3a3d3f044d449b77f015cd891c6ef3f3b3c84209c62d2e978b8816d1d834a45020691aecf0979b905712061e134e589cb4597c42773514e19635dec089118a8f0d8be30b5ef82be79768ccf97ffac14e", @generic="0bfd19550234f97af50a194173d3e7464801f52bb4b983eba4bf634623d1343e5268c6b59388e4d6125151930b05c9eb4a093b66584ca78d08eb942db0ad66227215bbab32af130dd1f79fb45076997ade7743734a26b8f0a9482d8bee7a72eb2d3ce44632c953e3f8a831b87a90af64a53d31daea4a9189696d5a08a74b41e165d70c6c6f2c9f58da1dddb1dab18dfb50100c1f5380513e61ab3467a60ff1214eea75554e87b442d0265df0849c2611641320ce3ec3d2b559a2e0affa184da996047fe0c20cc12e795de31c45b57e15d4adbfb865d3742356d9df28af6b5a13ec9d25ae9d7fbed2f7fbf162d43969a9a1eae2099625cfa395f1a044d10451c2d4ffb34a5bfd771ade19fff63f673b04ffcf09e3bc8cbc76449890eb1b69a31bdfcd50050cabbcba2f9125de9e8bf027862ee9471bfd0a05af500446298e47f1a88946e3ab87612239ea3e79ba4b181f21400270cbb5512182e9019d6a4ce037260cbacdc329a04b0ba2158aa2a93e1bf9495a574f8a2b0f71c6318379669b972ea0f6bbe986954f1fb36793a0758320d22e503b795a86e42b2efefe4af829fbe3ab6a6d5eecbbabe5c051f77c62c0c6729238b7590add91314205903b7f5c3d876d40906db276bb1ef33af508ca63696314c9154ced98476e369c1172cb73de932bf2154e6fc91cae6ba7d3ba608bcef39b696c29cac88f4dedb9779c2bf9e1cbdaf38574f5a4104654093f7e0e435510199b2a3b70cb00364d0cf3a907a945ca2cfda06e44a38d4e793ce00b8583900b7768e05d1fb2dbcd7deac293f808339ebc43cadd50dbca8fc1db9353b5715350a1b52e7a14535aa233ac8cebef8c231c3a9605a5c530462b9c2b7470529329381b386f874714440a6ee9385cd6e79183c0ffeedf34603e61c25a3c884251e6a169064e0791149e3ab4e117410798f6358dda83ea8c6758dccae34f74e4720772261fb59317dd65f4134c4072ee4eee0357d86b80acedd53963fa8021eae3027ab9482adbfe3bdf2979fce24049abc84070813942eb4672654ce776c200c7c4ee9f4b46959fae2bc8e2d34ee2ac81d9b869f0b7f4dd0d99b5aadd3e13c23c5ef5eca8324947aafdb226040457ccb8d95a8ffa5d37fc9f445e196952a8281c7df28ae56374e368f9662ea1ec4c66996f2d3025065f1bf1aad6bfe0befcfca2aa1d81c5d9f0adf371bb3006ac97a477465203eb102bf22e3273a129ebf426f38bf2261d5291613b75debc8746dd146d72f68821451a440144d6304d87c44cfe6ebf6d071aece939108e660984cbd034f970e74cb2d668b44d88782d9c635926b93737fda6383caeea41de674e9b551b99142df4e3de3463e8070a9deee9b00947375dae28f5acbc5e9b6be674e6bd8111a3717431b1704d5b93900d9c58c4697ef791abfa93c9d071a1634a326fecfbab70590daa32514b93ec19da4fb1a372f36cf1214ac2d16f3edcbb3b19bd7000c4cb367c15e4bf02c9f1ec1c0ccebb361cee23a5464bd0440e7afa2bdb1e1c07b0a9e49f33d23e0016650e015b4cd7358c0b969d4ed128ab3f978f367ceaf6de6e84110639ce94be3ac5c56f84bbdbfa875fed2e2781f6f2657f8094d3f39d6bbdb8efc68c9635ef8aee1b9d92cc61a478e95e697e64cc1fcfc1c0f3e080cd809d2a0338e56bc8b4c8d269f95d393c23849b2516c7c629c357813405198bf07d42f3cd3ca26b6883d9866c52d8a02f7e53b44c9c7c2bf3796e57f043fac5d1418d08374c8d5c56eb1e21f6a86eb738a4237aaac07cc3c50e870f75a84fa3f0ba9e0bd1149686fa21ac3c84b3be16e1f36dd2900ea1c210b63fa7385a4c3dff91754a455da1f6afa6a9a1d73b5d03a1737b7d13605713209f2b43edcf5c557a84768c6f5de7319142a95a6271eedbe5e0f550f52a35d28069c8f9385ce307ceb1edf5fb4e912bdec261e975cd4a3f2754d35a2c43508079927161c9c9c75173b554175a4b6524213b507fe8d33dfc101b5d489d533b70ff2e56b89007e9f965d0d2a90e65c9995676f58ea17ff0dd22779d1fefdc28925f3970f8d8169002b0827688873641b9f55b37f8ab20f9407f7c6f68111fce04a7dd61960eb32fec0da174dcd692b7c02c374f9ea5780847c43f01fa0f51397796667a842b7a733feb32140bc75c96e4771397003d120ca8c9a9f1d609774dd334e4628aa4d24e14317b079ac673edd525f8be4a442744fc4747c9d3f96d534eb20e4214884b221a85b216ecf14512c8617b32bc508a2721bff97b083869f0b00202e30da595e0dad790504e5e9f5d871e1455e2d3870e867ac21ddf164510639b1d9e1c258e8bba40eb1f09d741280f8342835e7dd59882878fa378bca09635682fb64baac4f15903c1c542e7d0267970159364b9eb54c12ef1db69465d36f244950e85c51e6ae6bb91fcaf2629abbd5099fe35685dd16cfc38e264b6aeb838ab5adbb88d7e1397ab3c345f2f9db603f331cc7d34a17f9091868bd34554f784dffcf9109286f8d5c7616a0432f4bc012c5f38e37d88b3af6270cd3a218e23c0a8ce95cb05579dfd250c9dbf12ace3b6560e6bcfdd7c727d9285305437439fe04f9450af8d3fed163ed44f002087caa939d03038bdf6025bbfa82dc0ac6d08d8d7e98ba8659f2d17db5e044d1ccef0ead2af3f68c064abc2cd4562e05dff626d3e5ebb8e3d20c40e18f00c623cb83cc00944be765882912c2ebb69336a2e5549aeaf86702dd92b1206fd1c12d5a4d22878118a19bc99a0d63af912bb6c1da3a7e3390fccc19df322721ce7d7b8d88915b4a57f83520f5e913a8feb28f376a9254fc1fac8fe2fae4521514f3daf1cd2d974fcdac48bcb7b23b20984d1b26a0db53249ea5c851d9ae561632f9a390fee4dfbd58a9b9082631b4d65815ae15b861b3a9c5811fa0e8a6432d9f854706347181ce0c740ecfe971c799574aedee1b08a94b8a579820d687f1f076206e7ef04cc189e33f5279586b1553fcf5f5259ff6110b3545bb33036ee8dd3b3f51d43527feb6ee9c9ba7148f7c0cd340ec56aa125cf3439e33a0e78dd3dd5e029544ad58866fca800b6811d0c55e2c406d09007efce4c5946c17b9d16df44a85b787cf7b7c4e16cd7fb54fbea0b8206547cc655d42b5c1e30ae9d7377678b47705acaa4c1bb391be253cf246ee48ffbfe1dc93b243253c2a411deca9e7d5a98c36a1c852d68d21f789d96b135d4c4c90cdd46513b092a4884887c257ee5784c6ca2d8e47ecbc6aea448d9dec8d73dcc76f76f0133e2095a4fbafa681eac4914a7838d18d7b539d2c06ecc7a879c153dae03289bf373f79855bfff954359adf4a44c95e5a4bb6035d91a029df906aadba85ade73e4c811afc57b206a4d13c04402530f5b2bc04997d2e467e0985e5a0ed4834003fb4e813aef20586f6e035e8c47baa821f7343a03175fad8c0b636d29176df32a241cb6ac353fa3975be0a5e2e58d9a3940bffe85163dc4d65cbf0d0455c98154cfa0508ad177286bd74810d023226cb127836ac4de94595f41bdc96ca56fbd37e31f77c7580318dd3d5ff1f238b75a894569f1c91a27a30af85ae78d02f2c06534dcee434c52c9a9b833f0d79fb1b06fca4c9343051e29535f77f733b88a457fc7b7da926f413bfb51e5bf14854e8085b6d9628dad5f188ca3ae9872081d2db26799b001d0f01c119cd8ec52eccbd5020ff04dbb24203a23484dde7fa70e594a17eea6bdbaf7b5e7ff5d354514b7482b6eb953ad3f48df3cb8b2941a255dda2a96c8185a92e16ecb127157af7e38cb591fdb15c126edb875e804780d6b286b33b5b0d9b48624c82dac12c573110671bf43c24facd4cac554ed9baf04353e8cfb4af4145a384773b26330730222981b01403e8a194443bf202ca47d1e958dc492805cbd4dffed0d379c169df3c1ef44459de0c8787dda2024331f23f7c2c8be495892c2388b95c5baea3c0242067fe977291648c53ea14db3b53b3945546506849a266bc4f1a291a1baeabf678e832f073b00d2bde53f66aae0e0e0bd324e8aa5b7099b069f8b29b70afd465bdc24a35a1a3ab9289f67a151e661a1f830331d110b3a38d243a145b908c0994b2180f3d816dd9c4a0594d67dbf3c2aab3c84b97c0e7814a2673ab1fee901c73b9db276b2e0cf9ad9c85e5bf56828af06b2a7d4bfcc16746a812683fbcf96f81c59000e0fef16e5b3ce88c2c23356ee6dceef7a558854721528f4351368addfb158449ab7bc938ce73e9f270c11be3e4886629c174fc278793a9db22e248a31c4d93eaebcc6bb60d5adac7a189a0a40b460b41a6861548cfdb720717c04d90208845d02ff095717d9764f6c2279f841570b87d4b8177aa0193c670c24fcc60c5c67c0162e0805ea4a584b02d25e845764d64bba1227b3c82bc0fe1ca309d1d319748cd7d00ea9d2b62e42962111f18a494d9c89d736087e067a68115a85d73841a9e0a2e75d9f7d3df06df4a53100f452d56700ba8ff16f0b8c419027637e51affabd096f557105c1017fc654ac8274cf58ca64de4b90d16bc9e56ff8cd547a9cd188aae3af1ad2988abc49cc48ad159f2bb34b25fd95d4a0aa8370c120699b0225171be80fdb01b15d0731edc5fcc8040f326f307fd5ee1ec8ad6b3a7e686dbd8051bbbcf264839f67f2129b339c989ded4471646c9f6fe7f976d9262b607d51bbd1745d2bb10060c87d755e17b4de374710594cf31db15020ea02cf52edfa64f0278815f6a294e55dfc8738c979e5a2ea2c53978bc653e93865829fe8fb7718541b9058f2ef2b4505e02250c22dc996e233d52f62d1e15d4cf3fc815e133390c93714b3ed7fcebca7c81cc696be1c8ca6b0653d0dc9636fe0820eae90f06782d5046e3bbb62ae554bf2eb7008443b84fd8563c078f178a44d2b37d151f2de51f3fc247f1805b971d26b3655596f4daacfee99b51ee8ed1639d075528de1f8361f1e8b61039ae0d93480012ffe4a14d887de932a61237e69eb0e051aef8d3865b785e44fff1aafb67c24a2d3622d6e2065541088d267cf05c5ebeee1312bb9f19dfb54607b52523e70bb390d7d19cd4b403527fdb19dc62955fd91dd0cf766367be1c816e07f05f0ef47f7148d913580c68d3ed7d76f1bce820f2bacc3fb3ebee099e81952ec9b0196b27e1da928b0d8cd6e84f2ac7eede366775d2729c5354df3e532de877aaa57adb8157679a06b3f189df02c2d8d990a24b3ec198da21a844dbddf6d42f813bcbae2546c32e7553ece8f1796ee838e6e546896f541db5db011d455716a4ba8a6e7e44c48c3dc3c2bee7dd35b87970b34dae3c6bb2d92b0f78b72d5f7549b26de832e76a6528133ce9d20d91b5273a56c1ac4a864ad50f90f96904ee89b66e580e9b263b29c645c90301c6330e0d185789ceb1c7028ddc93fa90f38c0a3a5ff5ac10fb7368f46cbe4a5e92152f64ff2fdc2e07d5976191cf3635c1e36d8b34f243086eb57dad4fc7569ea1148ebce9ecd9d5b82757cfb4eb6d28249313c5a0f83c195aa5e485b982b0352fd55b9c2d394776fd9aa7d277a6baa41cbb0a3addfb561dcd674dc08fc7d5e4d3226fc38caca42af88686374045c66a0b2e6cec172f606acecb592724405b0a0546a3495e14b223d813d68aaffa95a5ee70a861ac9934f77b859220b7240e4e604b8434ba8f49ae365ab5cf66d05630230c1da5653b3fcf6aa5c7a491f57a7f0afe2c1b80a066091dc0697ba0408d30c5b947d01c8f05f0634b0a8e9d4f694f951c6da130b32ab2083b4a57ab550"]}, @generic="4357e4d24175e07588992e43c556a890bb392a36624418887deb03314b24ecd629277ec4107ca38bf2a3d1f6867f59571c3a3236a0dbe4123ab3fb4d3a11629a851af1402ee4a3eb1cb30ae30b1c980b60d56eaf77dc89024d352758b379a70b014350b17d56c44b73bba1d13f7c4e6ad634b2f2bae26c423e785e276312a60228ba1239c416f999f5cbe9a5788956ea90f5063158b0b0d13025", @typed={0x8, 0x55, 0x0, 0x0, @u32=0x7}, @nested={0x22f, 0x58, 0x0, 0x1, [@typed={0x36, 0x6a, 0x0, 0x0, @binary="eda355adaf5adf4cc73685a3532e5e4e74607866e80f37fe95cd6c14865ef1dbd474c5e9b5fe0fedecf8d298eaa24a170b6f"}, @typed={0x8, 0x35, 0x0, 0x0, @u32=0x3}, @generic="a6a3cd60b1231341ce1d3baa8e6e07916c130b033a19f2ce6f3e67a0ddb5c54c561b0bdc4c9d97924344eb2629bdcc9d9a883420df22e63fd705ed95e83d3f40a36acf5e7e1be3e71321060eb157c16d2bc5c342a3aec1986521e425e5072255e6f31e48aaa9c99a09c324ce0af36fe13ed617c00818309d8e06ba9e4994b668b8a763706f4fe144cfc61594ae4011484fc74d32d6b4e4656d518bb190a00b48fc34779cee736a2a640ee7d74ad751e0842c0ee28ff44168285e0ce1217bea1bd5b7b3573dc2c4fcb8e5053518be5350239c25563afc20c16a6724539ea2a9429a", @typed={0xa, 0x96, 0x0, 0x0, @str=':}R{$\x00'}, @generic="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"]}]}, 0x142c}, {&(0x7f00000029c0)=ANY=[@ANYBLOB="d0020000180000022dbd7000fddbdf2500d9df5bb3241c059e8593fd9b62acc1d046c2be84ce549561689ced14cab189d60f7ddc98469763d842875f19ed41f83cf0e5887b8eb8dc6f5f975e91708eedf583447aa283b78b22395d125d43a28b1aaeba3a3035fc2f4ae5bb4cc771070329c336adadb1f2174b19eab930abc026040070004a021c8008008500ac14141d0c00850008000000000000009bb2e60665907aed1f56799a5b7af677d0f7a44e674b2795b3cb5fcd0a5d5aa710693f1852c4f654034221291d0f98700edfd4053b7a73c62b1cf68234e739036ac790c07756e6c4c11c8c8eaede894b9218c3d25521d1548f165b1cefae41af98d07d326a4103ae51c6c6483803a1668cf5337ef1ddc52977350e82f7bacd6e09f3166a76ce11eee86519621fc15430bb9c48b3b344bc041f53f5da57693d5db2fc0854e94d5860a98c6fb10b4d61cd443e7488f07e8a7ed8aa6cf99f0ee3b4383ba663ac6581cd848399b9df486c3e1765f61912c97936a1b351adff7a1b57ec286e8bf9f67cae53496785c7b1fb473699478bdbb4bf676be59850b0747007d9ce55d1f10fb7c6ce77d800757167502669d4dd53ae5cb2f3262051b18756ba0fd820368b5601bbc38d88110a31300444ae43c06816949b0aeae17bea81249156acd4296815f09ed66e829f12e3501c6d071d7e712f2db61a0e881faee0a72e47f75dbc5247c129b72ee9dbda80b2a03aa0b0711a6977d55850b3101421bfcfb44b3ba5ec5083878f787a213b45e256dbf4c78b56e68d8f39f2c3d848ed5f10df695ee1c711ba23fde23344017c7daf2af44409e9c47a060fbb4baf0259d26d0cd4958d23ae66c212b6e188fec865e85bdb403f625a800fa1e6fe9b4407ee7d23b1455e0b8ce5da1df1cf7399ff65de6ca1e2da0f3eeac2b4f64615e5f5639b2f7e0cfd2fe51ce8f718079ebc68b8e6c3f1ea2ea113114d0a1b301805824b0c0035000200"/720], 0x2d0}, {&(0x7f0000000100)={0xb0, 0x23, 0x300, 0x70bd2a, 0x25dfdbfd, "", [@typed={0x8, 0x58, 0x0, 0x0, @fd}, @typed={0x8, 0x55, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x13}}, @generic="e4110f57010b70fee4a0521baae7522f56f1a3fae186d1138b5d26a684cf3c95dab0d2c91a91058bdeac6868d6a95b442469e8fc62874c3794bcf537e6546fa6c8f98dd93542441c3d25ac5a3a10e40863", @typed={0x8, 0x91, 0x0, 0x0, @u32=0x12d}, @typed={0x8, 0x1a, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x34}}, @generic="af8fe90f6a3238d417d1de6c43e43f48e4c615ed8892ff7bdb85237c6ba1008d0795860f8ac36cb2628447d4"]}, 0xb0}, {&(0x7f0000000040)={0x40, 0x2b, 0x0, 0x100, 0x25dfdbfc, "", [@generic="f6246724a5d5a25176cc61c633a19cc5560a7ece06060a9eff66416762421a4b44441861e193852f6faced72b2b5b057"]}, 0x40}], 0x7, &(0x7f0000000080)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r6}}}], 0x20, 0x8080}, 0x800) 06:49:53 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x8081}, 0x0) getsockname$packet(r4, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5}, @IFLA_BR_MCAST_SNOOPING={0x5}]}}}]}, 0x44}}, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r6) ioctl$BLKREPORTZONE(r6, 0xc0101282, &(0x7f0000000240)=ANY=[@ANYBLOB="09000000000000000400000000000000040000000000000001000000010004000000000000000000053f080000000000000000000000000000000000000000000000000000000000000000000000000009000000000000000100008000000000200000000000000002050203000000000000000000000000000000000000000000000000000000000000000000000000ffffff7f0000000007000000000000000000010000000000050608000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ef0000000000000002000000000000000906068000"/272]) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000040)={@remote}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x100000001, 0xe) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000440)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)=ANY=[@ANYBLOB="4c0000000007010400000000000000000700000108000540000000000907010073797a00010000000000000c00064000000c0006400000000000000009000000000000000000"], 0x4c}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) 06:49:53 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:49:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) dup(0xffffffffffffffff) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xf1) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) socket$nl_generic(0x10, 0x3, 0x10) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000a80)='\xa11\xc2\x1fQ\x88\xebH\xe7\xcf/\x83\xb3+\xc5\xa0\xa6\xbf\x85\xf0;\xea\x8a\xd5b\xb0\xe7=\xf41\xf5\xb4\xb9\aPk\x94csn\x8bu\bHD\x06\f\xccU\x19\xaa\xe0\xed\x85\xb1%\xd8\x82\xaeW\x8764\x93\xb6`\x90\xb1\x1d\xd6\x91\x9a\xf5I:=\xd9\x98\t\x03\x13\xa4f\x13\xeb\x11\xd5\x17J]\x8b\xc18v\xfc\xa9\xcb|\xd4\x1a\x91\x81c\xeb\r|\xdbo\xa8?\xa8\x192\t\x10\x1bhGZ\xc0\xe7\xc3{b\xc0Z\xe5&\r\n\x858\x94V\x9f\xbah\x8f\x91\xa4\x8a\x90\xa7\x10\x85kYh\xb6\x0f\t0-\x9f@\xc2\xbbR.>\xc5;\xceJ\x14QJ0CrCP\x1e\xea\x8b\xc3z\xb8\x7f+\x94LV&\x8e\xce\xecA\xd6\x12#\xdb\x90\xf9\x9d\x03T\x89[G\xa8\xa4\xa9\xa7r\xd8x(\x9dv9\x16\x1dH=\x82?>-\x84R\x11\x94\x17\x01\x03\xc4\xa3\xb3?\xecyq\x86Y'], 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 06:49:53 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:49:53 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:49:53 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:49:53 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r5, 0x0, r5) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:49:53 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:49:53 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:49:53 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:49:53 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:49:55 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3d) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$cont(0x20, 0x0, 0x0, 0x0) 06:49:55 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:49:55 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:49:56 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000640)='security.capability\x00', 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', 0x0, 0x40020, 0x0) rmdir(&(0x7f0000000580)='./bus/file0\x00') 06:49:56 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000f90f00700000a2000000253caa860f011b", @ANYRES32=r5, @ANYBLOB="0000000000000000240012800b00010062726964676500001400028005001900000000000500170000000000"], 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@remote}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r9 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r9, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000049c0)=@newchain={0x41d4, 0x64, 0x10, 0x70bd25, 0x25dfdbfd, {0x0, 0x0, 0x0, r5, {0x6, 0x1}, {0xfff1, 0xf}, {0x8, 0xfff2}}, [@filter_kind_options=@f_flower={{0xb, 0x1, 'flower\x00'}, {0x60, 0x2, [@TCA_FLOWER_KEY_ENC_IP_TTL_MASK={0x5, 0x53, 0x81}, @TCA_FLOWER_KEY_ENC_IPV6_DST={0x14, 0x21, @dev={0xfe, 0x80, [], 0x31}}, @TCA_FLOWER_INDEV={0x14, 0x2, 'batadv0\x00'}, @TCA_FLOWER_KEY_CVLAN_ID={0x6, 0x4d, 0x385}, @TCA_FLOWER_KEY_IPV4_DST_MASK={0x8}, @TCA_FLOWER_KEY_SCTP_DST_MASK={0x6}, @TCA_FLOWER_KEY_ETH_DST={0xa, 0x4, @dev={[], 0x3a}}, @TCA_FLOWER_KEY_ARP_SIP_MASK={0x8, 0x3a, 0xff}]}}, @filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3684, 0x2, [@TCA_BASIC_EMATCHES={0x10f4, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x4}}, @TCA_EMATCH_TREE_LIST={0x10e0, 0x2, 0x0, 0x1, [@TCF_EM_CMP={0x18, 0x1, 0x0, 0x0, {{0x81, 0x1, 0x8000}, {0x81, 0x44, 0x2, 0x9, 0x9, 0x1}}}, @TCF_EM_CONTAINER={0x48, 0x2, 0x0, 0x0, {{0x6, 0x0, 0x3}, "b41dd04ee61bc90c6edb06ff88fd4d1aeda1016e9aa0bdf11633418c1327348ddb33c592dbd797abfc907a25d13417a9f353628834538e00b5"}}, @TCF_EM_CMP={0x18, 0x2, 0x0, 0x0, {{0x44e, 0x1, 0x5}, {0xfffff000, 0x9, 0x2, 0x4, 0x5, 0x2, 0x1}}}, @TCF_EM_CANID={0x14, 0x2, 0x0, 0x0, {{0xc76, 0x7, 0xd49e}, {{0x3, 0x0, 0x1, 0x1}, {0x4, 0x1, 0x1, 0x1}}}}, @TCF_EM_CONTAINER={0x100c, 0x1, 0x0, 0x0, {{0xe7, 0x0, 0x3f}, "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"}}, @TCF_EM_META={0x44, 0x1, 0x0, 0x0, {{0x8b, 0x4, 0x20e3}, [@TCA_EM_META_HDR={0xc, 0x1, {{0x6, 0xff}, {0xf001, 0x5}}}, @TCA_EM_META_HDR={0xc, 0x1, {{0x9, 0xd5, 0x2}, {0x6, 0x7f, 0x2}}}, @TCA_EM_META_HDR={0xc, 0x1, {{0xfbff, 0x6, 0x1}, {0x2, 0x4, 0x1}}}, @TCA_EM_META_RVALUE={0x14, 0x3, [@TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_INT=0x9, @TCF_META_TYPE_INT=0x2, @TCF_META_TYPE_INT=0x8]}]}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xa05}}]}, @TCA_BASIC_CLASSID={0x8, 0x1, {0x3, 0x4}}, @TCA_BASIC_ACT={0x2d0, 0x3, [@m_tunnel_key={0xf8, 0x10, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x88, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{0x20, 0x3, 0x8, 0x401, 0x8}, 0x1}}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6, 0x9, 0x4e22}, @TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0x5, @remote}, @TCA_TUNNEL_KEY_ENC_KEY_ID={0x8, 0x7, 0x6}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6, 0x9, 0x4e23}, @TCA_TUNNEL_KEY_ENC_KEY_ID={0x8, 0x7, 0x17f3}, @TCA_TUNNEL_KEY_ENC_KEY_ID={0x8, 0x7, 0x1}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{0x4, 0x8, 0x3, 0x3, 0x8}, 0x1}}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6, 0x9, 0x4e24}, @TCA_TUNNEL_KEY_NO_CSUM={0x5}]}, {0x41, 0x6, "7157ccd1176ddd9e84b0e6b4461bb8ca009a33281140c1009e64bc3be510c904dfb1437d7854d17fa820b13cff7353b18af4f1ce499c0319cb1e92c31f"}, {0xc}, {0xc, 0x8, {0x3}}}}, @m_connmark={0x1d4, 0xd, 0x0, 0x0, {{0xd, 0x1, 'connmark\x00'}, {0xac, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x4, 0xca52, 0x1, 0x8, 0x5}, 0x5}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x7bf, 0x3, 0x0, 0x1, 0x9}, 0x8}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x8, 0xfff, 0xb0bf501e94ba3be3, 0x6, 0x7f}, 0x1ff}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x0, 0x2, 0x5, 0x10000, 0x8001}, 0x6}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xfffffff7, 0x7fff, 0x2, 0x4, 0x9}, 0x9ad}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x1000, 0x10001, 0x20000000, 0x726a4079, 0x5}, 0x4}}]}, {0xf9, 0x6, "2308000e37bda7d1cb158abe2d26ad47be6ef9e45aceff562fdd1169353d8bc9ae726c3a2172f21f4b9b1e0f7699487f71615f1508e4e0da8889b70e3521eb21606fbe69d83bfa0d9ec3e5898ffa9912720631303dcff84eb47be4379f14d66b6250b84c7d1b5b24f2b79be395a8b35d19fa8b8191a1c391f705766d9e5d3e14312431d3a493c5b59de2f4aecf23fff8b520508c881a4dfcf50a97859137ba555218671596de48ad981425e4960e059721c17e9f9c59d02703406145dd6f288939c848a97a76dbfbd1313274ea363ce230a084866ec07bf75c62224dcf8bc4841d4979b05150772a645408cae09f6ed1bb93cd9604"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}]}, @TCA_BASIC_ACT={0x22a0, 0x3, [@m_ipt={0xb0, 0x18, 0x0, 0x0, {{0x8, 0x1, 'ipt\x00'}, {0x5c, 0x2, 0x0, 0x1, [@TCA_IPT_HOOK={0x8, 0x2, 0x2}, @TCA_IPT_INDEX={0x8, 0x3, 0x3}, @TCA_IPT_TABLE={0x24, 0x1, 'nat\x00'}, @TCA_IPT_TABLE={0x24, 0x1, 'security\x00'}]}, {0x2d, 0x6, "7411cb62e9907d7914ec487a3e64f83e41b443cf822d1207ed91f52cec7e6a49485567740d0a486d84"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1, 0x2}}}}, @m_police={0x1e70, 0x1d, 0x0, 0x0, {{0xb, 0x1, 'police\x00'}, {0x1d9c, 0x2, 0x0, 0x1, [[@TCA_POLICE_AVRATE={0x8, 0x4, 0x925a}, @TCA_POLICE_RESULT={0x8, 0x5, 0x3}], [@TCA_POLICE_RATE64={0xc, 0x8, 0xdc00000000000000}], [@TCA_POLICE_AVRATE={0x8, 0x4, 0x7fff}], [@TCA_POLICE_AVRATE={0x8, 0x4, 0xb0b8}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x100000001}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x53f}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x7, 0xffff8001, 0x2, 0xd5, 0x7f, 0x100, 0x40, 0x1, 0x1, 0x0, 0x9, 0x4, 0x0, 0x4, 0x3ff, 0x40b, 0x3, 0x0, 0x1, 0x3f, 0x200, 0x1, 0x31, 0x8000, 0x7f, 0x7, 0x7ff, 0x1, 0x1ff, 0x9, 0x5, 0x9, 0x101, 0x9, 0x461c, 0x8000, 0x400, 0x9c, 0xc45, 0x7, 0x5, 0x10001, 0x3, 0x7cf, 0x8, 0x53aa, 0x10000, 0x1000, 0xffffffff, 0x7, 0x1, 0x400, 0xa4, 0x1f, 0xfb, 0x205, 0x4, 0x7, 0x8001, 0xfff, 0x8, 0x1, 0x80000000, 0x2, 0xfad, 0x1, 0xfffffffc, 0x7, 0xbe, 0xbe94, 0xff, 0x7fffffff, 0x5, 0x80, 0x2, 0x78f4, 0x4892, 0x800, 0x3ff, 0x82f, 0x94d7, 0x5, 0x8, 0x7, 0x4, 0xfffffff9, 0x1, 0xfffffffb, 0x3f, 0x101, 0x5, 0x1, 0x8001, 0x2, 0xab0, 0x3f, 0x5, 0x7f, 0x1, 0x5, 0xf440, 0x5, 0x7ff, 0x1f, 0x401, 0x169e, 0x89f, 0x65, 0x7f, 0xffffffff, 0xfffffffe, 0x8, 0x0, 0x4, 0x6, 0x2, 0x400, 0x0, 0x8, 0x7, 0x0, 0x20, 0x0, 0x6, 0x8001, 0x7, 0x1, 0x2da, 0x1000, 0x9, 0x401, 0x600000, 0xd0e, 0x138aa22, 0x8, 0xff, 0x0, 0x46, 0xfff, 0x3, 0x8001, 0x1000, 0x237, 0x3, 0xfffffffd, 0x3, 0x0, 0x1f, 0x7fff, 0x8001, 0x200, 0x945, 0x101, 0xfffffff9, 0x80000000, 0x30f, 0x8, 0x188, 0x8b, 0x6b2, 0x5, 0x2, 0x5, 0xfff, 0x3ff, 0x6, 0x2, 0x15827168, 0x713, 0xa54, 0x3f, 0x100, 0x1, 0x8, 0x5, 0x7fff, 0x20, 0x401, 0x3f, 0x2, 0x0, 0x11d7c4f1, 0x3, 0xaf76, 0x4, 0x7f, 0x3a, 0x7f, 0x5, 0x8, 0x6, 0x49e, 0x9, 0x3, 0x2, 0x1, 0x74, 0x6, 0x400, 0x1, 0xb5, 0x6d7, 0x3, 0x1f, 0x7, 0x8, 0xed0, 0x401, 0x0, 0x9, 0xffff8000, 0xd4f, 0x401, 0x7f, 0xf16e, 0x3, 0x80000001, 0x2, 0x1f, 0x10001, 0x2, 0x370, 0x2, 0x3ff, 0x2, 0x1, 0x6, 0xe800, 0x6, 0xff, 0x1f, 0x9, 0xfffff585, 0x3f, 0x7, 0x9, 0x0, 0x4, 0x4, 0x10001, 0x9, 0x1e7, 0x0, 0x0, 0x3, 0x6, 0x401, 0x84, 0x1, 0xff, 0xffff, 0xfffffffa, 0x8, 0x9, 0x9, 0x3ff]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x1d, 0x6, 0xffff, 0xffffff7f, 0x6, 0x2, 0x0, 0x8ac, 0x80, 0x0, 0xd, 0x0, 0x19cc, 0x0, 0x5, 0x7, 0x0, 0x8, 0x1, 0x1, 0x0, 0x3, 0x3, 0x3, 0x1, 0x6, 0x6, 0x7fff, 0x6, 0x40, 0x7, 0x2, 0x7f, 0x101, 0x86, 0x8, 0x2, 0x0, 0x0, 0x4, 0x5, 0x1, 0x7, 0x1, 0x80000001, 0xa827, 0x1, 0x2, 0x8, 0xa4, 0x0, 0x3, 0xa848, 0xfffffffa, 0x35, 0x63c8, 0x8000, 0x8, 0x81, 0x200, 0x80000000, 0x7, 0x3fe, 0x2, 0x0, 0x0, 0xf6f8, 0x2, 0x8, 0x6, 0x3, 0x8, 0x9, 0xeec, 0x9, 0x8000, 0x8, 0x10001, 0x8, 0x3, 0x6, 0x8001, 0xb6ad, 0x9, 0x5, 0x7ff, 0x0, 0x2, 0x60c00000, 0x7df, 0x1, 0x3, 0x7, 0x8000, 0x1000, 0x1, 0x8, 0xffffffff, 0x3, 0x6, 0x8, 0x80, 0x80000000, 0x3, 0x7f, 0x7, 0x1, 0x1000, 0x3ff, 0x8, 0x2, 0x100, 0x6, 0x0, 0x0, 0x0, 0x80, 0x8, 0x1, 0x5, 0x1935, 0x4, 0x9, 0xb084, 0x3ff, 0xfffffffc, 0x1, 0x9, 0xffffffff, 0xb52b, 0xfffff44c, 0x6c42, 0xe34, 0x5, 0x7, 0x0, 0x9, 0x200, 0x401, 0xfffff800, 0x200, 0x59c2, 0x8fa2, 0x4, 0x0, 0x101, 0x7, 0x81, 0xa7, 0x79e, 0x8, 0xffffffff, 0x8, 0x9, 0x3, 0x9, 0x3, 0xfffffd3d, 0x0, 0x8000, 0x0, 0x4, 0x3000000, 0x7, 0xffffffff, 0x9, 0x3, 0x1, 0x5, 0x1, 0x8, 0x7, 0x0, 0x49c, 0x4, 0x0, 0xffff, 0x3f, 0x4f, 0x31f5, 0x800, 0xf9, 0x7, 0x80000000, 0x200800, 0x9fd1, 0xaa, 0x8, 0x5, 0x1000, 0x401, 0x7, 0x7fff, 0x6, 0x9, 0x40, 0x80, 0x0, 0xfffff001, 0x10001, 0x4, 0x8, 0x7f, 0x81, 0x1ff, 0x2, 0x0, 0x4, 0x8, 0x3, 0x3, 0x9, 0x7, 0xffffffff, 0x80, 0x8, 0x2, 0x80, 0x80000000, 0x5, 0xfffffffd, 0x3, 0x1, 0x3, 0x1, 0x3ff, 0x6, 0x2, 0x6be, 0x4, 0x8, 0x4, 0xffffffff, 0xffffffff, 0x3, 0x6, 0x38, 0x1, 0x250590bc, 0x0, 0x0, 0x7fffffff, 0x12, 0x9c, 0x7, 0x1ff, 0xffffffff, 0x66, 0xffff8000, 0x8, 0xe7f8, 0x5, 0xffffff7f, 0x401, 0x1ff]}], [@TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x5}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x6}, @TCA_POLICE_TBF={0x3c, 0x1, {0x20, 0x7, 0x200, 0x1, 0x8, {0x1, 0x0, 0xc7, 0x7, 0x40, 0x2c7}, {0xf6, 0x1, 0x80, 0x5, 0x5, 0x8}, 0x9, 0x3f, 0x10000}}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x8}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x8}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x37, 0x3, 0x0, 0x9, 0x10001, 0x11df, 0x6, 0x26fd, 0x80000001, 0xb4f3, 0xe2, 0x8, 0xff, 0x4, 0x8, 0x10001, 0x9, 0x100, 0xffffffff, 0x9, 0x5, 0x2, 0x3, 0x55, 0x5, 0x80000000, 0xffffff21, 0x9, 0x20, 0x200, 0x3, 0x1, 0x10001, 0x100, 0x13, 0x7, 0x80000000, 0x4b73, 0xa29, 0x1, 0x1f, 0x3ff, 0xffff, 0x200, 0x9, 0xffffffff, 0x5, 0x6, 0xffffffff, 0x80000000, 0x43d9, 0x401, 0x1, 0x8, 0x7, 0x7ff, 0x100, 0x7, 0x1, 0x4, 0x5, 0x9, 0x2, 0x8, 0x4, 0x0, 0x7, 0x1f, 0x380, 0xfffffffc, 0x7, 0x7, 0x8d9, 0x9, 0x8001, 0x3, 0x6, 0xef, 0x2a, 0x7fff, 0x1, 0x1, 0xb6b, 0x1, 0x6, 0x5, 0x0, 0x7, 0x1, 0x9, 0x3ff, 0x40, 0xb2b, 0x8000, 0x5, 0xfff, 0x6, 0x9, 0x40, 0x8000, 0x4, 0xdcc, 0x1, 0x800, 0x5, 0xffffffc1, 0x2, 0x7f, 0x7aff, 0x3, 0x1, 0x2, 0x1000, 0x5, 0x2b2, 0x0, 0x7, 0x4, 0x7, 0x9, 0x10001, 0x80, 0x3f, 0x5f27dbd4, 0x3, 0x3, 0x10001, 0xffffff77, 0x0, 0x6, 0x3, 0x6, 0x800, 0x6, 0x2, 0x40, 0xffffffff, 0x80000000, 0x5, 0x101, 0x200, 0x5, 0x4, 0x8, 0x6, 0x0, 0x705e9ddc, 0x8, 0x9, 0x7f, 0x10001, 0x5, 0x1, 0x2, 0x6a8910f1, 0x800, 0xfffffffb, 0x3, 0x2e, 0x2, 0x0, 0xc40, 0x7, 0x1, 0x0, 0xfffffffc, 0x7, 0x0, 0x5, 0xc58, 0xfffffffd, 0x8, 0x0, 0x3, 0x7, 0x0, 0x2, 0x4, 0x10001, 0xfffb, 0x74fd, 0x2, 0x1, 0x20, 0x5c, 0x5, 0x9c, 0x0, 0x400, 0x7, 0x3, 0x400, 0x200, 0x7, 0xffffffc0, 0x6, 0x1000, 0x2, 0x9, 0xffffffff, 0x20, 0x6, 0xfff, 0x3, 0x7, 0x10001, 0x10000, 0x6, 0x5, 0x3bb, 0x7, 0x1ff, 0x80, 0x7f, 0x9, 0x2, 0x5, 0x3ff, 0x7f, 0x4, 0x20, 0x1, 0xcadf, 0x1, 0x1, 0x7, 0x1, 0xfffffffe, 0x3f2, 0x2, 0x1f, 0x1, 0x4, 0x16, 0x1f, 0x1, 0x3, 0xffff, 0x0, 0x1, 0xeee4, 0xfffffffc, 0x1b, 0x6, 0x8001, 0x8, 0x101, 0x92, 0x7ff, 0x3f4fff27, 0x2, 0x1, 0x6, 0x4, 0xfffffff7, 0xffffffff]}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x18000000}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x7, 0x5, 0xfff, 0x7, 0xba, 0x5a, 0x8, 0x9, 0x5ee6, 0xffffffff, 0x44d5, 0x0, 0xd176, 0x0, 0x5, 0xad36, 0x9, 0x20, 0x5, 0x9, 0x7fffffff, 0x9, 0x81, 0x80, 0x0, 0xd9b, 0x0, 0x7, 0x0, 0x7ff, 0x24c1850e, 0x2, 0x400, 0x7, 0x7fffffff, 0xba2a, 0xdd34, 0x8000, 0x200, 0xfffffffa, 0x5, 0x1, 0x0, 0x800, 0x8, 0x7, 0x401, 0x2a, 0x3ff, 0x3, 0x1, 0x80000000, 0x2, 0x9, 0x7fffffff, 0x9, 0x0, 0x50d7a759, 0xfffffff7, 0x1, 0x1ff, 0x6, 0x293e5c14, 0x81, 0xb4, 0x4, 0x7, 0x3, 0x2, 0x1, 0x1, 0x81, 0x6, 0xec6, 0xffffffff, 0x80, 0x5, 0x3, 0x4, 0x2, 0x8, 0x1, 0x6, 0x4, 0xfffffffd, 0x5, 0x0, 0x9, 0x81, 0x800, 0x8, 0x800, 0x1, 0x3f, 0xfff, 0x1, 0xffffff80, 0x1ff, 0x6, 0x3fd25f45, 0x0, 0xb2, 0xfe, 0x3, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x7, 0x2, 0xfffff001, 0x7f, 0xfb1, 0x2, 0x6, 0x1, 0x84c3, 0x80000000, 0x7, 0x3c, 0x2, 0x5, 0x1, 0x8, 0x10001, 0x7f, 0x7, 0xcb, 0x101, 0x327, 0x5, 0xfffffffa, 0x800, 0x0, 0x9, 0x38, 0xe126, 0x8, 0x4, 0x8, 0x6, 0x3, 0x2, 0x1f, 0x0, 0x4, 0x80000001, 0x7fffffff, 0x3f, 0x7, 0x9b6, 0x1, 0xe74, 0x180, 0x9ef7, 0x10000, 0x9, 0x2, 0x7, 0x5, 0x2, 0x1296f49f, 0x6, 0x40, 0x5, 0x2, 0x1, 0x6, 0x10001, 0x10000, 0x8, 0x1, 0x2, 0xf40, 0x9, 0x6, 0x80, 0x7, 0x8, 0x100, 0x7, 0x4, 0x100, 0x27, 0x918f, 0x2, 0x6, 0x5, 0x7, 0xcf34, 0x2, 0x10000, 0x3f, 0x80000001, 0x253, 0x80002, 0x5, 0x10000, 0x10000, 0x8, 0x8001, 0x8, 0xf9, 0x1, 0x400, 0x97db, 0x7, 0x48, 0x381c07af, 0x7ff, 0x6, 0x0, 0x3ff, 0x9, 0xcc, 0x1, 0x2, 0x1a0, 0x7fff, 0x2, 0x7, 0x2b7, 0x5, 0x6, 0xf, 0xdbb, 0x8, 0xfd1, 0x5, 0x80000001, 0x40, 0xffffff8e, 0x5, 0xffffffff, 0x400, 0x81, 0x1, 0x7fff, 0x66e, 0xfe000000, 0x5, 0x9, 0x80, 0x8000, 0x3, 0x5, 0x0, 0x0, 0xd0, 0xd4, 0x1, 0x5, 0x200, 0x7ff]}, @TCA_POLICE_RESULT={0x8, 0x5, 0x7}], [@TCA_POLICE_TBF={0x3c, 0x1, {0xffffffcc, 0x1, 0x6, 0x1, 0x1, {0x40, 0x3, 0x101, 0x1, 0x5, 0x7}, {0x3f, 0x1, 0x1, 0x9, 0x5, 0x2}, 0x401, 0x7, 0x8}}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0xe55, 0xfffffffd, 0x7ff, 0x0, 0x1, 0x1, 0x9, 0xfffffffc, 0x0, 0x9, 0x100, 0x10001, 0xc15dba1, 0x5, 0x8, 0x4, 0x1, 0x7fff, 0x0, 0xffff1ca8, 0xfffffff9, 0xe00, 0xb9e9, 0x5, 0xc40, 0x1, 0x78, 0x9, 0x2, 0xa35, 0x9, 0x7, 0x5, 0x401, 0x65, 0x7ff, 0x6, 0x9, 0x9, 0x3a5, 0x4, 0xbf, 0x9, 0x9, 0x0, 0x697f, 0x7fffffff, 0x1, 0x800, 0x400, 0x8000, 0x9, 0x3f, 0x0, 0x3, 0x4, 0xfffffff8, 0x7fff, 0x3, 0x1, 0x800, 0xc, 0x1, 0x401, 0x9, 0xfff, 0x7, 0x8, 0x4cf4227e, 0x8000, 0xc7, 0x6, 0xffff, 0x2d06, 0x80000001, 0x1000, 0x3, 0x97d, 0x5039, 0x1ff, 0x800, 0x7fffffff, 0x6, 0x401, 0x3, 0x7fffffff, 0x7fffffff, 0x6, 0x100, 0x8001, 0xc7, 0x400, 0x6, 0x1b, 0x0, 0x1, 0x40, 0x800, 0x400, 0x1000, 0x2, 0x52, 0x10001, 0x1, 0xfffffffd, 0xffffffff, 0x6, 0x6, 0x5, 0x80, 0x9, 0x5, 0x7fff, 0x4, 0x400, 0x7, 0x6, 0x81, 0x8, 0x3ff, 0x0, 0x6, 0x3, 0x3ff, 0x6, 0x3, 0x3, 0x7fff, 0x9, 0x5, 0x20000, 0xffffffff, 0x4, 0x5, 0xa752, 0x6, 0x1, 0x7, 0xffffffff, 0x9387, 0x81, 0x7, 0x4595, 0x7ff, 0x0, 0x3, 0x2, 0x7ff, 0x6d4, 0x5, 0xfb2, 0xe9, 0x81, 0x400, 0x8, 0x1, 0x0, 0x10001, 0xf4, 0x29c, 0x9, 0x9, 0x10000, 0xc2, 0x6c2a, 0x8, 0x4, 0x3ff, 0x100, 0x10001, 0x5f9, 0x0, 0x81, 0x5, 0x3, 0x8000, 0x6, 0x4, 0x4, 0x6, 0x9, 0x1, 0xffff, 0x16, 0x7, 0xd6, 0x1, 0x1, 0x5228, 0x1, 0x12a, 0xf0ec, 0x6, 0x6, 0x80, 0x8, 0x0, 0x1, 0x7f, 0x7, 0x10000, 0x2, 0x4, 0x9, 0x1, 0x1, 0x7, 0x401, 0x7, 0xc961, 0x20, 0x1, 0x3, 0x2, 0x2, 0x6, 0x7, 0xfffffffa, 0x913, 0x80000000, 0x2, 0x8, 0x9, 0x1, 0x9, 0x3, 0x0, 0x1, 0x9, 0x9, 0x6a, 0x20, 0x9, 0xc3e1, 0x101, 0x8001, 0x60000, 0x6ce, 0x32, 0x2, 0x2, 0x71e3, 0xff, 0x3, 0x6bf555da, 0x8000, 0x0, 0x2, 0x10000, 0x4, 0x1ff, 0x6, 0x1000, 0x5, 0x6eec765c]}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x5f}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x9}], [@TCA_POLICE_RATE={0x404, 0x2, [0x5, 0x3, 0x8000, 0x6d64, 0x9, 0x7fff, 0x5, 0x80000001, 0x6, 0x7, 0x3, 0x7f, 0x0, 0x4, 0x0, 0x2c3, 0x3, 0x401, 0xfffff800, 0x6, 0x5, 0x7fff, 0x8, 0x1ff, 0xff, 0x6, 0xfffffffc, 0x200, 0x5, 0x842, 0x7ff, 0x2, 0x6, 0x6, 0x5, 0x5, 0x7fffffff, 0x3, 0x7f, 0x7aa4, 0xe4, 0x5, 0xfffffeff, 0x40, 0x80, 0x7ff, 0x0, 0x8, 0x7, 0x400, 0x9, 0x100000, 0xb1a, 0xeaad, 0x491f, 0x4, 0x3, 0x100, 0xffff, 0x20, 0x81, 0x3f, 0x3ff, 0x1000, 0x7f, 0x80, 0x0, 0x1, 0x3ff, 0x5, 0x4, 0x8, 0x5, 0x8, 0x10000, 0x80000001, 0x3ff, 0x80000001, 0x4, 0xda5, 0x40, 0x3, 0x5, 0x5, 0x5de, 0x7b5b379f, 0x1000, 0x2d0, 0x100, 0x72cb, 0x800, 0x9, 0x2, 0x6, 0x7, 0x3, 0xfff, 0x3, 0x71, 0xfffffff7, 0x7fff, 0x8, 0x0, 0x6, 0x9d, 0x10001, 0x47f8, 0x7, 0x6, 0x9, 0x5f, 0x5, 0x7, 0x8, 0x3f, 0x5, 0x101, 0xffffff5e, 0x7d1, 0x3, 0x5, 0x6, 0x7, 0x6, 0x4, 0x20, 0x8, 0x5, 0x6, 0x6, 0xffffff05, 0x0, 0xfffffff9, 0xffffffe3, 0x1, 0x401, 0x0, 0xfffff757, 0x6, 0x7, 0xd36, 0x7ff, 0x5, 0x1, 0x8001, 0x5, 0x2, 0x3, 0x305, 0x8, 0x8, 0xd23, 0x9, 0x2, 0x6, 0x5, 0x3, 0x3, 0x7, 0x431d, 0x0, 0x8, 0x401, 0x7f, 0x8, 0x1f, 0x3, 0x3b, 0x3f, 0x5, 0x326e, 0x5, 0x7, 0x3ff, 0x3, 0x21, 0xab2, 0x0, 0x9, 0x1000, 0xcd, 0x6, 0x6d, 0x3f, 0xffffffc1, 0x80000000, 0xffff3f95, 0x7ff, 0x1000, 0x7, 0x0, 0x6, 0x3eb5, 0x400, 0x7fffffff, 0xc6c, 0x7f, 0x6, 0x2, 0x6, 0x1, 0x3, 0xe1, 0x101, 0x40, 0x0, 0x2d98, 0x40000, 0x6, 0x40, 0x2, 0x4, 0x7, 0x8f, 0x5, 0xb9, 0x1, 0x4, 0x20, 0x1, 0x8000, 0x7, 0xc3d4, 0x6, 0x7, 0x3bd, 0x9, 0x10001, 0x3, 0x130af833, 0xd4, 0x1, 0x6, 0x20, 0x0, 0x1, 0x3, 0x4, 0x1, 0x8fd, 0x1f, 0xffffffff, 0x0, 0x4, 0x4, 0x400, 0xf14c, 0x0, 0x3, 0x0, 0xfffffffd, 0x40, 0x6, 0x3f, 0x2, 0x1]}], [@TCA_POLICE_TBF={0x3c, 0x1, {0x8000, 0x8, 0x400, 0xe4b9, 0x1887, {0x7, 0x2, 0x5, 0xd5a, 0x1, 0x80}, {0x1, 0x1, 0x0, 0x7ff, 0xfffc, 0xe7ba}, 0x9, 0x1, 0xe9c}}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x8000}, @TCA_POLICE_RESULT={0x8, 0x5, 0x1}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x2}], [@TCA_POLICE_RATE={0x404, 0x2, [0x4, 0x0, 0x400, 0x0, 0x9, 0x80000000, 0x7, 0x800, 0x8, 0x1ff, 0x5, 0x0, 0x3, 0xfffffff9, 0x7fffffff, 0x7, 0x64, 0xfffffffa, 0x444, 0xaa, 0x1, 0x1, 0x10000, 0x4, 0xffffffff, 0x2, 0x2, 0xffffff00, 0xfffffffb, 0x1f, 0x5, 0x7, 0x7, 0x81, 0x400, 0x1f, 0x36b, 0xca, 0x2, 0x8, 0x4, 0x8, 0x3f, 0x1, 0x0, 0x3, 0x10001, 0x4, 0x1, 0x6, 0x3ff, 0x6, 0x9, 0x85d0, 0x8001, 0x7d, 0x2, 0x4, 0x7fff, 0x800, 0x1, 0x0, 0xffffffff, 0x20, 0x800, 0xcd43, 0x3f, 0x7, 0x3, 0xfffffe53, 0x9, 0x3, 0x7fffffff, 0x0, 0x1, 0x6dfba18, 0x8, 0x3, 0x3ff, 0x2, 0x9, 0x7ff, 0x58d, 0x800, 0xf75, 0x4, 0x4, 0x80000001, 0x1, 0xffff, 0x37, 0xb922, 0x1, 0xffff8000, 0x2, 0xe66, 0x6, 0x6, 0x0, 0x9, 0x8, 0x1, 0x60e2, 0xfffffffe, 0xf543, 0xfffffffd, 0x3f, 0x3, 0x20, 0x7e1b, 0x0, 0x7fff, 0x20, 0x5, 0x1, 0x4, 0x2968ad32, 0x3ff80000, 0xffffffff, 0x20, 0xfffffffa, 0x3, 0x2, 0xfffffe01, 0x2, 0x9, 0x4, 0xffffffff, 0x2, 0x3, 0xff, 0x9, 0x1c000, 0x1ff, 0x4, 0x3, 0x1, 0x9, 0xc36, 0x7, 0x7, 0xaa, 0x0, 0x6, 0x2, 0x7, 0x7, 0x1, 0x101, 0x80000000, 0x5, 0x1ff, 0x9, 0xffff, 0x2, 0x3, 0x3, 0x0, 0x5, 0x1, 0xdf, 0x6, 0x4, 0x8, 0x8001, 0x7, 0x9, 0x4, 0x8001, 0x9, 0x2, 0x1f, 0x2, 0x2, 0x7, 0x6, 0xeb1, 0xfffffffd, 0x5, 0x9, 0xffff8001, 0x5, 0x8, 0x4, 0x101, 0x7f, 0x58000000, 0x2, 0xfc, 0x8, 0x0, 0xfffffff9, 0x9, 0x100, 0xdc, 0x4, 0x3f, 0x400, 0x7fff, 0x19, 0xffffffff, 0x1, 0x3ff, 0x4, 0x7f, 0x3, 0x4, 0x7, 0x4, 0x5, 0x668, 0x1, 0x1f, 0x4c3, 0x9, 0x4, 0x8, 0x300c7afd, 0x6, 0x8, 0x3, 0x3, 0x7, 0xfb1e, 0x0, 0x80000001, 0x71e7, 0xaf, 0x8001, 0x9, 0x6, 0x0, 0x1, 0xe4, 0x3, 0x2, 0x81, 0x7ff, 0x1, 0x81, 0x3, 0x7, 0x0, 0x20, 0x7, 0x9, 0x6, 0x7, 0x2, 0xfff, 0x80000001, 0xffff38e3, 0x3, 0x4, 0x1, 0x4]}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x9}, @TCA_POLICE_RESULT={0x8, 0x5, 0x7}]]}, {0xa9, 0x6, "b2837c6af329d9e6f7ab0a51c27eb0dba8684f2c4311b6a0aac484bde1749b779fa142a274ed181dba0c736b8ec8163342864983044944868bef36de50ae3e55365c4d9cd47fa2d2e2d80d877d978e08479e1a909f4eaa887b804979f6bb10f6994803719e5c53314089df0539b35644c1537452ff3221e9b442ddb58fc2edff2dfeb190d52c1395dbfb3c03e8d880b589b10fd3a26e56410b4800b0bad745211c034c3412"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_ipt={0xc4, 0x18, 0x0, 0x0, {{0x8, 0x1, 'ipt\x00'}, {0xc, 0x2, 0x0, 0x1, [@TCA_IPT_INDEX={0x8, 0x3, 0x20}]}, {0x92, 0x6, "c826ab606a39eb3a20fe00f965fc208eee1df45ac60b51dc713a4e05f86d2d97e82806e1e7db580fb4254f4a343046501903167c9ce6196f244dfd599aa0b40031ac7d18e7873880421f14b7311a79781ae61e91f15b44ba9d0230ec6dab6e485b7568e7dee2b5c4358ece7a20feee8c47f715f815f914920362ce7ce8715ae3f0cda916c2f285566decceaf3541"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x6, 0x3}}}}, @m_nat={0x1c8, 0x3, 0x0, 0x0, {{0x8, 0x1, 'nat\x00'}, {0x11c, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0x81, 0xffffffff, 0x0, 0x7fffffff, 0xf7}, @local, @loopback}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x80000000, 0x3, 0x0, 0x3, 0x6}, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, 0xffffffff, 0x1}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x8, 0xc1, 0x20000000, 0x9, 0x8000800}, @multicast1, @dev={0xac, 0x14, 0x14, 0x20}, 0xff, 0x1}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x735, 0x40, 0x0, 0x27, 0x40}, @dev={0xac, 0x14, 0x14, 0x1e}, @loopback, 0xffffffff}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x3, 0x5, 0x4, 0xa45d, 0x6}, @multicast1, @loopback, 0xff000000, 0x1}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x95, 0x3, 0x4, 0x100, 0x800}, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xff, 0x1}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x7, 0x49862cfe, 0x10000000, 0x400, 0xfffffbff}, @multicast2, @broadcast, 0xffffff00}}]}, {0x87, 0x6, "01a3fa418ab042043cea4ab0179144391cbe68f9316f1f3724cac34fe174a168329738f662981ea0c51782485dcd44081757d4d8891e3616e4fb0fe6ca3a5a2108e42e8857572bd7055772a351413947b88e681bdb106246acbaff2475833ddb0b1c7ba98ba81cd6dfe04039a5d78015e61816a95ff4d3ff1619069cbd8b6b50d00eb5"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1, 0x3}}}}, @m_ctinfo={0xf0, 0x3, 0x0, 0x0, {{0xb, 0x1, 'ctinfo\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_CTINFO_PARMS_DSCP_STATEMASK={0x8, 0x6, 0x400}, @TCA_CTINFO_ACT={0x18, 0x3, {0x0, 0x7, 0x1, 0xffffffff, 0x7fff}}]}, {0xa1, 0x6, "3a579d70ab9cc97c3d0ef55c00c2c44e440b3a1b9c2dc0f3329b41b62ed8d9737a10022d768433a78c995ec2f2078a7521256552e6a0c439f65ba6d37f4469d834c13c938eb60d981de1ffc2da12c542f51d2de2cf94f59d3fec515cd01be32b848df4bc83f46ab6386a70b28a430eba3501ad8eb7f533de487eb802e6bb686ec8ecdf66b91f26b13e5e37fbf43bb8d00e037e44d750a53289fe9f012d"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1, 0x2}}}}]}, @TCA_BASIC_EMATCHES={0x14, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x9}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x9f}}]}]}}, @filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0xa98, 0x2, [@TCA_RSVP_PINFO={0x20, 0x4, {{0xffffffff, 0x80000000, 0x8}, {0x0, 0x7, 0xffffffc1}, 0x5e, 0x6, 0x7}}, @TCA_RSVP_SRC={0x14, 0x3, @private2={0xfc, 0x2, [], 0x1}}, @TCA_RSVP_ACT={0x150, 0x6, [@m_skbedit={0xfc, 0x5, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x14, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_MARK={0x8, 0x5, 0x5}, @TCA_SKBEDIT_MARK={0x8, 0x5, 0x5}]}, {0xbd, 0x6, "e111d8e9d963f00921a4e04b19cd428f4bd84c9dd88bbaa817f6413a2ddb0c121f2015cf3e0b4dc82e8674a064a222aa7a3284f9508e02585e667680741a9a055c2e864a343c34fd283d081337c01a2b529ccc1ee9487f3271ad17b787f6595948056c4ce9b0095b182a4bcbf9d9d3ab3058a85c9a6e0d903d874ec2b5fdef0723b4fe14f1ae7b69ebc038c595a891b482b32c9091db3ea0a6ae2ecdcb8bd3f0f8665331643bfa2ea8aed0c538e9a206eef5f86ea8f86497ee"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2}}}}, @m_connmark={0x50, 0xb, 0x0, 0x0, {{0xd, 0x1, 'connmark\x00'}, {0x20, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x20, 0x1000, 0x1, 0x5, 0x401}, 0x7}}]}, {0x4}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}]}, @TCA_RSVP_DST={0x14, 0x2, @private1}, @TCA_RSVP_CLASSID={0x8, 0x1, {0x2, 0xc}}, @TCA_RSVP_ACT={0x8f4, 0x6, [@m_vlan={0xa0, 0x18, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4}, {0x71, 0x6, "eb0b8bce8882d34ef54b6af2f8fc5ae0c934571d631cc0cc6f32573db900f49c0f22c870975b4d83d461aadb0846738b4748de3b937e4fa0ff87623ef65d5b91fd1a95723b7f8370a4d36d53bbc3da608b87714ab98d8fb22aa31861d6dc394d9b613ccd8a85cca72169e909fa"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3, 0x3}}}}, @m_mirred={0x1a8, 0x12, 0x0, 0x0, {{0xb, 0x1, 'mirred\x00'}, {0xc4, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x3ff, 0xfff, 0x3, 0xfffffff9, 0xa}, 0x2}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x6, 0x10001, 0x8, 0x4, 0x1}, 0x3, r5}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x401, 0x100, 0x20000000, 0x2, 0x7}, 0x1, r5}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0xfffffff8, 0x2, 0x20000000, 0x10000, 0x2}, 0x2}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x2, 0x7ff, 0x1, 0x2, 0xfffff777}, 0x3, r5}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x6, 0x9, 0x7, 0x8, 0xffffffff}, 0x3, r5}}]}, {0xba, 0x6, "6ccd0f05897504c7ae8c49bebdae3739ac336bd62580a35df5abc90c31883bb62cfa998d628681d5d69524be2161e00d2c6e4d0413006466b215c6b4282c9c714727fcdaeb2852c92d0ef53bc5916ea5bf48771d66025bb0b501ab31691a5d03622ef9f148c98ebe4bb95c9ec70fc84a9b84e0887f6080fede42065de78fcf080c9c4651daab98200fc5a451353820d9dc84eeded2dfd2dd9002bcd07b2dae73fe97cd038cdeaad323bf1b16198668772c69782d321b"}, {0xc}, {0xc, 0x8, {0x0, 0x2}}}}, @m_skbedit={0x58, 0x2, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x2c, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18, 0x2, {0x5, 0x1000, 0x3, 0x153, 0x8}}, @TCA_SKBEDIT_MARK={0x8, 0x5, 0x5}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0xfff1, 0x9}}]}, {0x4}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3}}}}, @m_ife={0x98, 0x16, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x4c, 0x2, 0x0, 0x1, [@TCA_IFE_SMAC={0xa, 0x4, @local}, @TCA_IFE_METALST={0x18, 0x6, [@IFE_META_SKBMARK={0x4, 0x1, @void}, @IFE_META_PRIO={0x8, 0x3, @val=0x8f}, @IFE_META_SKBMARK={0x8, 0x1, @val=0xdfa4}]}, @TCA_IFE_SMAC={0xa, 0x4, @local}, @TCA_IFE_METALST={0xc, 0x6, [@IFE_META_TCINDEX={0x6, 0x5, @val=0xfec8}]}, @TCA_IFE_DMAC={0xa, 0x3, @dev={[], 0xf}}]}, {0x28, 0x6, "20b5d4e4dddbf18675c017554e31d08bb9d924d9b59351eac596af8a879a13987fc425b7"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x3, 0x1}}}}, @m_nat={0xe8, 0x5, 0x0, 0x0, {{0x8, 0x1, 'nat\x00'}, {0x2c, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0xff, 0xfffffff8, 0x5, 0x730, 0x4}, @dev={0xac, 0x14, 0x14, 0xb}, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x1}}]}, {0x96, 0x6, "a6184de6ba64257c9e96bd0f96a6ebbf882c73cd13d0b4126247132266a6f3f6b5c7e666020c21f13b30e8716d5b7800245a847070a38f1cef2c63b86bbedf6f30378a319bcb05e33ee3682cf24be036a23c776c49bf688fd3ede7d316217e220f357ef34e5196635d3403a5ae3607e2bbde05b0667f4ce9023df62c1a949379fa66516b791d61acfaf6cbdcb25c7f5620bc"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3, 0x1}}}}, @m_nat={0x15c, 0x1e, 0x0, 0x0, {{0x8, 0x1, 'nat\x00'}, {0x54, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0x9f, 0x6, 0xf8f8448f7f330edc, 0x7, 0x7}, @loopback, @multicast2, 0xffffff00}}, @TCA_NAT_PARMS={0x28, 0x1, {{0xca, 0xe06, 0x7, 0x2, 0xfffffff9}, @loopback, @dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x1}}]}, {0xe2, 0x6, "b3e1830553efedc129f2cefc4e684247a97e9f8e6fcdd8f141c467329f7b8cf99d4930cd3332a8df30ef6ce1a3e9970e7616ffa54216971f6b83a85cc62a3f8b016f73527968b35f809add819d4c1d4af5af51659a8114e6fd3125becec8e337fb9df436c656dfedb685cdb0cbb0b98d4e06cce1d31755217275a0c961826072886206971ffb2fe8d0cfefbc7e3fb50515c2cf497877a1f46111c1549457561d68fdd36d6cb33060f7014e67db01dba679ac0a2d6ba099aff7c23b3abadfdc8e02dce02c6c0bf1e211629c3f5c460bbe8ba7bcc74c433e3f7c2fb0ad4381"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x3}}}}, @m_mpls={0x60, 0x10, 0x0, 0x0, {{0x9, 0x1, 'mpls\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_MPLS_TTL={0x5, 0x7, 0x74}, @TCA_MPLS_PROTO={0x6, 0x4, 0xf7}, @TCA_MPLS_TTL={0x5, 0x7, 0x1}, @TCA_MPLS_LABEL={0x8, 0x5, 0xce6f9}, @TCA_MPLS_PROTO={0x6, 0x4, 0xf8}, @TCA_MPLS_PROTO={0x6, 0x4, 0xf7}]}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0x1}}}}, @m_ipt={0x230, 0x5, 0x0, 0x0, {{0x8, 0x1, 'ipt\x00'}, {0x158, 0x2, 0x0, 0x1, [@TCA_IPT_HOOK={0x8}, @TCA_IPT_HOOK={0x8, 0x2, 0x4}, @TCA_IPT_TARG={0x118, 0x6, {0x4, 'security\x00', 0x4, 0x4, "dd644fb780aeebea96636324d8e5d1910df2f819438e5d5bfd9a68cc345b428397e7ffe4e5991654d0034b50d4bac9295209bb244e009fceca2a169bac26aa1ea5ebfa4c1b800f557abfeb146afae1d9bef669673f99291c770b27a9674ea8397d4d0e0286d2b714b8815893f02d8887e90464474487dad99e81103a077bf4ebc2dfaf566f8b2e59a577ed1a4bc31ada6ac2ef93a8a2aa9ff66fec43b51a93e21c3ac7d3e83c43a09d23005c0a015efff1a49eab22b70a841305bc8a49a63d9ec71fb8182f35525215eaa878a3aefc66686a1ffd040333240bd7f907b1104153d43dd60c1f74cc72b0c4968559e5"}}, @TCA_IPT_INDEX={0x8, 0x3, 0x7}, @TCA_IPT_TABLE={0x24, 0x1, 'raw\x00'}]}, {0xb3, 0x6, "a1407f766a6c38353a560fc6f41f03221d8063e6e6878b9a2a7bb8d38716daa2c3c9fc1cab62c97b3ce48a7db5f838b16166460c9fb7d69a6b4c03a29af842c639640305b49099748e124e1a0b3066408ea3729e78524d2c58c89a5ad8db0c5e45691b40a3c98239934a01fea0fbb888c9e26261b9f098adc49fe20f99ea8643c18d4f4565805b485c7d45ba711b728cf2d71ebc48ffefda15263c7a983d5ac7668644ced37a25f9c3706b6e8411ea"}, {0xc}, {0xc, 0x8, {0x2, 0x3}}}}, @m_mirred={0xe4, 0x4, 0x0, 0x0, {{0xb, 0x1, 'mirred\x00'}, {0x84, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x3, 0x1899, 0x0, 0x10001, 0x3}, 0x4, r5}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x4, 0xdb9, 0x20000000, 0x6, 0x1}, 0x1, r5}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x9, 0x4, 0x5, 0x101, 0x8f}, 0x3}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0xfd2, 0xfffff914, 0xffffffffffffffff, 0x0, 0x1}, 0x3}}]}, {0x37, 0x6, "edbfc5f177b5bcc65e66c5529fe933ede6773c36c71a0bdc0e7e8eace074174cbd1a5b5a9fca282a97d8673282e23bd97d4568"}, {0xc}, {0xc, 0x8, {0x1, 0x2}}}}]}]}}, @TCA_CHAIN={0x8, 0xb, 0x9}, @TCA_RATE={0x6, 0x5, {0xff, 0x3}}]}, 0x41d4}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r4, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x240}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x30, 0x0, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x40800}, 0x4004051) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r6, 0x84, 0x71, &(0x7f0000000140)={r8}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0)={r8, 0x8}, &(0x7f0000000100)=0x8) splice(r0, 0x0, r2, 0x0, 0x100000001, 0x2) ioctl$sock_bt_cmtp_CMTPCONNADD(r9, 0x400443c8, &(0x7f0000000380)) 06:49:56 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:49:56 executing program 5: pipe(&(0x7f0000000200)) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x7ff, 0x0) socket$inet(0xa, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x2000000000002) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r1, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x14c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x11c, 0x2, [@TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14, 0x1, {0x0, 0x0, 0x7ff, 0x1a}}]}}]}, 0x14c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=@deltclass={0x24, 0x29, 0x800, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, r3, {0xc, 0xf}, {0x6, 0xd}, {0x8}}}, 0x24}, 0x1, 0x0, 0x0, 0x840}, 0x40004) socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x20040011) getsockname$packet(r5, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) 06:49:56 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x10102080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)="3cdffb0eab3b05928137beeff651d119e7dfa4a80f5199da401969d5cd247eabd3df5d5582bc5ac353204160b4906409786f1f3de8076d47f75a9b51f775751dd7b7d4964247f9413a3fb2a1b8d27b2bab5a168bc6c3d985e3465b160627047aa7d054f1579d5553059898dd89e6eb3129ce91af1aca0c2a461a6f42f8ce05c67d2bb60b5d7a928d1ac98386ea67ac5c4cdfa8fc0ed4e72f99b39983017dd5d38cbfd586c776fefbba8dd07d9ca9f9abc5") r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:49:56 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:49:56 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:49:56 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r1) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000100)={'broute\x00', 0x0, 0x4, 0x59, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000040)=""/89}, &(0x7f0000000180)=0x78) wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1053.737041] overlayfs: overlapping lowerdir path 06:49:56 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:49:56 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:49:56 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$can_raw(0x1d, 0x3, 0x1) accept(r3, &(0x7f00000002c0)=@ethernet, &(0x7f0000000340)=0x80) close(r2) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="4400b55acce57e1e07f500"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000240012800b00010062726964676500001400028005001900000000000500170000000000"], 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@remote}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@ll={0x11, 0x11, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80) getsockname$packet(r7, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r9 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r9, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=@newqdisc={0x17c, 0x24, 0x100, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {}, {0xffff, 0xffff}}, [@TCA_STAB={0x158, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x9, 0x0, 0x447d, 0x1, 0x2, 0x9, 0x2, 0xa}}, {0x18, 0x2, [0x4, 0xc9, 0x5, 0x0, 0x0, 0x754b, 0x90e, 0xffc0, 0x9, 0x8]}}, {{0x1c, 0x1, {0x6, 0xfe, 0xf2ef, 0x0, 0x1, 0x1f, 0x2, 0x2}}, {0x8, 0x2, [0x20, 0x0]}}, {{0x1c, 0x1, {0xca, 0x90, 0x9f4e, 0xfffff000, 0x0, 0xffffffff, 0x10000, 0x2}}, {0x8, 0x2, [0x1f, 0x100]}}, {{0x1c, 0x1, {0xff, 0x10, 0x7, 0x4, 0x2, 0x7, 0x80800, 0x4}}, {0xc, 0x2, [0x6, 0x3, 0x46c, 0x40]}}, {{0x1c, 0x1, {0x65, 0x7, 0x100, 0x9, 0x0, 0x408, 0x8, 0x6}}, {0x10, 0x2, [0x6, 0x0, 0xae70, 0x96d9, 0x1, 0x837]}}, {{0x1c, 0x1, {0x8, 0x2, 0x6ec9, 0x81, 0x2, 0x4, 0x3f, 0x3}}, {0xa, 0x2, [0x1d, 0x7, 0x7]}}, {{0x1c, 0x1, {0x40, 0x2, 0x0, 0xa74, 0x0, 0x1, 0x5, 0x9}}, {0x16, 0x2, [0x7, 0x400, 0x53, 0x4b, 0xd459, 0x7284, 0x2, 0x4, 0x2]}}, {{0x1c, 0x1, {0x2, 0xff, 0x200, 0x7fff, 0xa00554c713815775, 0x7, 0x9b8d, 0x4}}, {0xc, 0x2, [0x8, 0x1, 0x68, 0x7]}}]}]}, 0x17c}}, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0xd) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=@gettfilter={0x24, 0x2e, 0x400, 0x70bd2d, 0x25dfdbfc, {0x0, 0x0, 0x0, r8, {0xb, 0xffff}, {0xc, 0x9}, {0x6, 0x5}}}, 0x24}, 0x1, 0x0, 0x0, 0x20000801}, 0x48001) splice(r0, 0x0, r2, 0x0, 0x100000001, 0x2) 06:49:57 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:49:57 executing program 3: setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(0xffffffffffffffff, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:49:57 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r3, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_DEL(r3, 0x0, 0x484, &(0x7f00000000c0)={0x2c, @private=0xa010101, 0x4e21, 0x2, 'wlc\x00', 0x4, 0x6, 0x2}, 0x2c) close(r2) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r5, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x20481}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5}, @IFLA_BR_MCAST_SNOOPING={0x5}]}}}]}, 0x44}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@remote}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x100000001, 0x2) 06:49:57 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:49:57 executing program 5: pipe(&(0x7f0000000200)) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x7ff, 0x0) socket$inet(0xa, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x2000000000002) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r1, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x14c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x11c, 0x2, [@TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14, 0x1, {0x0, 0x0, 0x7ff, 0x1a}}]}}]}, 0x14c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)=@deltclass={0x24, 0x29, 0x800, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, r3, {0xc, 0xf}, {0x6, 0xd}, {0x8}}}, 0x24}, 0x1, 0x0, 0x0, 0x840}, 0x40004) socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x20040011) getsockname$packet(r5, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) 06:49:57 executing program 3: setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(0xffffffffffffffff, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:49:57 executing program 3: setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(0xffffffffffffffff, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:49:57 executing program 3: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:49:59 executing program 1: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) flistxattr(r1, &(0x7f0000000040)=""/18, 0x12) bind$packet(r0, &(0x7f0000000200)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$KDGETLED(r3, 0x4b31, &(0x7f00000000c0)) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 06:49:59 executing program 3: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:49:59 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='Cgroup_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000002900)=""/165, 0xa5}], 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mknod$loop(&(0x7f00000001c0)='./file0/file1\x00', 0x0, 0xffffffffffffffff) read$FUSE(r0, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) read$FUSE(r0, &(0x7f0000001780), 0x1000) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$llc(r3, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) connect$llc(r3, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x10) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) sendmmsg(r3, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(0x0, 0x1004000000013) 06:49:59 executing program 0 (fault-call:4 fault-nth:0): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:49:59 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:49:59 executing program 2: r0 = gettid() ptrace$setopts(0x4206, r0, 0x8000000000, 0x40) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x3}, &(0x7f0000000040)=0x8) tkill(r1, 0x3d) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x5, &(0x7f00000002c0)="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") r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x1f, r1, 0x4386, 0x7f) [ 1056.888493] encrypted_key: keylen parameter is missing [ 1056.893379] FAULT_INJECTION: forcing a failure. [ 1056.893379] name failslab, interval 1, probability 0, space 0, times 0 [ 1056.944801] CPU: 0 PID: 6583 Comm: syz-executor.0 Not tainted 4.19.133-syzkaller #0 [ 1056.952626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1056.961988] Call Trace: [ 1056.964589] dump_stack+0x1fc/0x2fe [ 1056.968270] should_fail.cold+0xa/0x14 [ 1056.972169] ? setup_fault_attr+0x200/0x200 [ 1056.976495] ? lock_acquire+0x170/0x3c0 [ 1056.980480] __should_failslab+0x115/0x180 [ 1056.984720] should_failslab+0x5/0xf [ 1056.988453] kmem_cache_alloc+0x277/0x370 [ 1056.992607] getname_flags+0xce/0x590 [ 1056.996421] do_sys_open+0x26c/0x520 [ 1057.000140] ? filp_open+0x70/0x70 [ 1057.003691] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1057.009060] ? trace_hardirqs_off_caller+0x69/0x210 [ 1057.014081] ? do_syscall_64+0x21/0x620 [ 1057.018061] do_syscall_64+0xf9/0x620 [ 1057.021869] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1057.027056] RIP: 0033:0x45c1d9 [ 1057.030254] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1057.049277] RSP: 002b:00007fb8c32e0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 1057.055375] ptrace attach of "/root/syz-executor.2"[6605] was attempted by "/root/syz-executor.2"[6606] [ 1057.056987] RAX: ffffffffffffffda RBX: 000000000001fe00 RCX: 000000000045c1d9 [ 1057.056996] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 1057.057005] RBP: 00007fb8c32e0ca0 R08: 0000000000000000 R09: 0000000000000000 06:49:59 executing program 1: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) flistxattr(r1, &(0x7f0000000040)=""/18, 0x12) bind$packet(r0, &(0x7f0000000200)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$KDGETLED(r3, 0x4b31, &(0x7f00000000c0)) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) [ 1057.057013] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1057.057021] R13: 00007ffc869b24af R14: 00007fb8c32e19c0 R15: 000000000078bf0c 06:49:59 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() fchdir(0xffffffffffffffff) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="2400000024000b0f00000000ffdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="eb0f000000943400002c6700469708b45983a03b64e1a04dceb97cd85f3f36dec085b4c873eff5bc50d0109a6bf8b0ae5218144e1bd11dc51da34a9a4d02a4bdc482b76d605516e9c1606228dab62a5883f6531d4a2a991449300f4536ac629594ec02eaf0487fd5dfedf93ee1c319f75de879a1ced1d4953127571749e6194d0c204a3128f0f4d881f5047a6194c1fa57c686d954fdd90af7"], 0x24}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6_vti0\x00', r2, 0x29, 0x9, 0x8, 0x0, 0x2, @private0={0xfc, 0x0, [], 0x1}, @local, 0x7, 0x10, 0x0, 0x9}}) wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:49:59 executing program 3: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:50:00 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:50:00 executing program 1: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) flistxattr(r1, &(0x7f0000000040)=""/18, 0x12) bind$packet(r0, &(0x7f0000000200)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$KDGETLED(r3, 0x4b31, &(0x7f00000000c0)) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) [ 1057.202627] encrypted_key: keylen parameter is missing 06:50:00 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:50:00 executing program 1: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) flistxattr(r1, &(0x7f0000000040)=""/18, 0x12) bind$packet(r0, &(0x7f0000000200)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$KDGETLED(r3, 0x4b31, &(0x7f00000000c0)) [ 1057.293104] encrypted_key: keylen parameter is missing 06:50:00 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x2, 0x0) [ 1057.401222] encrypted_key: keylen parameter is missing 06:50:00 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='Cgroup_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000002900)=""/165, 0xa5}], 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mknod$loop(&(0x7f00000001c0)='./file0/file1\x00', 0x0, 0xffffffffffffffff) read$FUSE(r0, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) read$FUSE(r0, &(0x7f0000001780), 0x1000) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$llc(r3, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) connect$llc(r3, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x10) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) sendmmsg(r3, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(0x0, 0x1004000000013) 06:50:00 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:50:00 executing program 1: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) flistxattr(r1, &(0x7f0000000040)=""/18, 0x12) bind$packet(r0, &(0x7f0000000200)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) 06:50:00 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:50:00 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1057.767809] encrypted_key: keylen parameter is missing 06:50:03 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r1, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$setopts(0x4200, 0x0, 0xfffffffffffffffc, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xf, r0, 0xd5, &(0x7f0000000480)="62f8162c2ac893e77747f7eacf1df2a4cf62c2a7c7c653ec7a26ce1d3efe07003b6dc4360ba92adbedf20e2077a8ba1af15e31efb8b0b4073d59e3850ce67cc3aa856057211a772a14fc4be2920831f4c374446cfd0057925f5fffd8959c48659a6f08e0c29bd43e89a7f2368733080edf86683bdad5e5c9cc68c9e4fb763f0000a3b14300040a14f21e5547e34b0b4e21498bd5275bee5637f85fd986faadaf3edc8759777297be38d51ac4a4c21b738700412646962aedd2e6a4ae607c05013e8aecc853d4e0ce68f82f5dda9236fa2dee8c") r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:50:03 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:50:03 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:50:03 executing program 1: socket(0x200000000000011, 0x3, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00'}) flistxattr(r0, &(0x7f0000000040)=""/18, 0x12) 06:50:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x4, 0x0) 06:50:03 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='Cgroup_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000002900)=""/165, 0xa5}], 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mknod$loop(&(0x7f00000001c0)='./file0/file1\x00', 0x0, 0xffffffffffffffff) read$FUSE(r0, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) read$FUSE(r0, &(0x7f0000001780), 0x1000) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$llc(r3, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) connect$llc(r3, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x10) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) sendmmsg(r3, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(0x0, 0x1004000000013) [ 1060.248378] encrypted_key: keylen parameter is missing 06:50:03 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:50:03 executing program 1: socket(0x200000000000011, 0x3, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00'}) flistxattr(r0, &(0x7f0000000040)=""/18, 0x12) 06:50:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x300, 0x0) 06:50:03 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) [ 1060.428969] encrypted_key: keylen parameter is missing 06:50:03 executing program 1: socket(0x200000000000011, 0x3, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00'}) 06:50:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3f00, 0x0) 06:50:03 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:50:03 executing program 1: socket(0x200000000000011, 0x3, 0x0) socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1060.586350] encrypted_key: keylen parameter is missing 06:50:03 executing program 1: socket(0x200000000000011, 0x3, 0x0) socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1060.730271] encrypted_key: keylen parameter is missing 06:50:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x6b6b6b, 0x0) [ 1060.869480] encrypted_key: insufficient parameters specified 06:50:03 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='Cgroup_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000002900)=""/165, 0xa5}], 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mknod$loop(&(0x7f00000001c0)='./file0/file1\x00', 0x0, 0xffffffffffffffff) read$FUSE(r0, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) read$FUSE(r0, &(0x7f0000001780), 0x1000) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$llc(r3, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) connect$llc(r3, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x10) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) sendmmsg(r3, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) 06:50:03 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:50:03 executing program 1: socket(0x200000000000011, 0x3, 0x0) socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x1000000, 0x0) 06:50:03 executing program 2: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) syncfs(r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000a00)={&(0x7f0000000800)={0x1dc, 0x0, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [{{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0x140, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x1dc}, 0x1, 0x0, 0x0, 0x400c811}, 0x4000) r1 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad067ea8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x3) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3d) ptrace$cont(0x18, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f00000005c0)=[{&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/92, 0x5c}, {&(0x7f0000000380)=""/79, 0x4f}, {&(0x7f0000000400)=""/141, 0x8d}, {&(0x7f00000004c0)=""/227, 0xe3}, {&(0x7f0000000280)}], 0x6, &(0x7f00000007c0)=[{&(0x7f0000000640)=""/64, 0x40}, {&(0x7f0000000680)=""/207, 0xcf}, {&(0x7f0000000780)=""/59, 0x3b}], 0x3, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000100)="97b28806033b3d8d0b0375e7b81b2523b242592569da1cd1004ae0bf729d24a25cb934d9671fac99e3d85ce4507dcdc6325b3e10010a59ad0b5826180397b6dfe7b4ec9805c28e051a4ff80a7139a041b9c83524864429dec8c81cbc2fbc4e35ec1dd2a00a87feae112c2a4ca5b77c9107e86a1bedf8817d4bab7e84a561ca0dd9dad4f87a668d9407d213a3aeb0138ad896a0248bb7f382d26cc11f2c79") r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = getpid() ptrace$cont(0x7, r3, 0x6a, 0x0) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r4}, 0x10) ptrace$cont(0x20, r1, 0x0, 0x0) 06:50:03 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:50:04 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) [ 1061.193734] encrypted_key: insufficient parameters specified 06:50:04 executing program 1: socket(0x200000000000011, 0x3, 0x0) socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:04 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r2, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x1, &(0x7f0000000040)=0x47ff, 0x4) r3 = dup(r1) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f0000000000)=0x5, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:50:04 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x2000000, 0x0) 06:50:04 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:50:04 executing program 1: socket(0x200000000000011, 0x3, 0x0) socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1061.328372] encrypted_key: insufficient parameters specified [ 1061.474613] encrypted_key: keylen parameter is missing 06:50:04 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='Cgroup_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000002900)=""/165, 0xa5}], 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mknod$loop(&(0x7f00000001c0)='./file0/file1\x00', 0x0, 0xffffffffffffffff) read$FUSE(r0, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) read$FUSE(r0, &(0x7f0000001780), 0x1000) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$llc(r3, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) connect$llc(r3, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x10) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) sendmmsg(r3, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:50:04 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:50:04 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3000000, 0x0) 06:50:04 executing program 1: socket(0x200000000000011, 0x3, 0x0) socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:04 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:50:04 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) [ 1062.056283] encrypted_key: keylen parameter is missing 06:50:04 executing program 1: socket(0x200000000000011, 0x3, 0x0) socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:05 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) [ 1062.285906] encrypted_key: keylen parameter is missing 06:50:07 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r2) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_START_AP(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x4d4, r3, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@NL80211_ATTR_AKM_SUITES={0x10, 0x4c, [0x0, 0xfac07, 0xfac14]}, @NL80211_ATTR_MAC_ADDRS={0x10, 0xa6, 0x0, 0x1, [{0xa, 0x0, @broadcast}]}, @NL80211_ATTR_PRIVACY={0x4}, @NL80211_ATTR_P2P_OPPPS={0x5, 0xa3, 0x1}, @NL80211_ATTR_CIPHER_SUITE_GROUP={0x8, 0x4a, 0xfac06}, @NL80211_ATTR_TX_RATES={0x460, 0x5a, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x1c, 0x0, [@NL80211_TXRATE_LEGACY={0xf, 0x1, "2da4d040689b796cb5ec8c"}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}]}, @NL80211_BAND_2GHZ={0x20, 0x0, [@NL80211_TXRATE_LEGACY={0x1a, 0x1, "a6f96f0cd7625c5d80dffe630313f87b08de3b37c499"}]}, @NL80211_BAND_2GHZ={0x10c, 0x0, [@NL80211_TXRATE_LEGACY={0x13, 0x1, "5935499dc940fc93ca9298b17deb60"}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x9, 0x8, 0xb7, 0x9, 0x4800, 0x3, 0x4, 0x8]}}, @NL80211_TXRATE_HT={0x3d, 0x2, "274db8610d05b887767c374e563eb3257445066e58f62c8727af0f7aa2721e8da8778a9ae8af66ec75c40565fd4db20e4c7a28a4b92be78d1e"}, @NL80211_TXRATE_LEGACY={0x18, 0x1, "3a86f9d2fffe51f4e5e9f0ebd8e38c2f47ea6032"}, @NL80211_TXRATE_HT={0x25, 0x2, "cf653ca739ee2c6c2f63e61f4305a96bebbbfaa018073696ef53b0a2657e598757"}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x14, 0x1, "a2155ebcd82b072f139962eb6f3b4abd"}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_LEGACY={0x7, 0x1, "dede1a"}, @NL80211_TXRATE_HT={0x32, 0x2, "503bd491d02f7be43aa76c93e2fb9044b82789ad0c8c78339620722fb955af4a9b119d4da3c46dfbdf0645653f9a"}]}, @NL80211_BAND_6GHZ={0xe0, 0x3, [@NL80211_TXRATE_HT={0x25, 0x2, "dc15ab2dbfa1aa4f3cc54bf81d1756f6efd98fe31b77f07e9a0a1ad22ce7e3bbca"}, @NL80211_TXRATE_LEGACY={0x1a, 0x1, "ad82dc18f4c0d54f53700e23f6013f1408ba21a684c8"}, @NL80211_TXRATE_HT={0x3b, 0x2, "eb8dbf1afc1fb9def9a4b2950a0a86afefc752e2540fba0c74a997a721879eb2629dfd5eeb71a7d34696a505bb99e0906ec247d043bd48"}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_HT={0x1c, 0x2, "65922c1528d3023268bf0e1e117fbff85eaece4cf5e80884"}, @NL80211_TXRATE_LEGACY={0x11, 0x1, "33e523216d558a0cedde50b9a1"}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x1f, 0x9, 0x7ff, 0x0, 0x9, 0x4, 0xdce, 0x1]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_2GHZ={0x70, 0x0, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x912e, 0x3, 0xf800, 0x6, 0x4, 0xb12b, 0x1ff, 0x6]}}, @NL80211_TXRATE_HT={0x10, 0x2, "817e4152ed414d6fb1a63ec0"}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x3, 0x7, 0x5, 0x1, 0x2, 0x6, 0x7, 0x3]}}, @NL80211_TXRATE_HT={0x31, 0x2, "eb4a44f404cf6e3fffbf685585d468a9f62a854aca7901a04ee965eecff8f3ccc38ca926ecb8ba50fff1babca6"}]}, @NL80211_BAND_6GHZ={0xd8, 0x3, [@NL80211_TXRATE_LEGACY={0x20, 0x1, "bc5d504d2c4b0271bcdf44b409d2eebb0782475ccbe28537a1167153"}, @NL80211_TXRATE_HT={0x21, 0x2, "c27b45031c356fba709205c5ab8bfbad059b69f30ca4b94feab7ed81a6"}, @NL80211_TXRATE_HT={0x45, 0x2, "88e2304b9e1e898e8b88a986272bcbc4ebe5e3a05ef7a7039e2f79d183b99cf749f9232ef68442f67c9e6c7f4ced16d1cc574d052b9cde3597545ed299a04b3f93"}, @NL80211_TXRATE_HT={0x45, 0x2, "0b5fdc6dfedbb551cf715d361383c2d3a91c8fde9f9106ba6a90ac8326ee878c5071154a0d6574307d95fc821ae9a9a0cad2babe8d26fddf13af00bd49301da48d"}]}, @NL80211_BAND_2GHZ={0x20, 0x0, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x9, 0x4, 0xfff7, 0x800, 0x8, 0x6e05, 0xd9e6, 0x1]}}, @NL80211_TXRATE_LEGACY={0x5, 0x1, "ab"}]}, @NL80211_BAND_5GHZ={0xcc, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0xff7b, 0x8, 0x9, 0x6, 0x3, 0x5, 0x1, 0x2e42]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x7fff, 0x200, 0x7ff, 0x3, 0xb5ec, 0x8, 0x4, 0x9]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_LEGACY={0x22, 0x1, "690b0a60023fd40efe907c28fdbb1653c1fb7db31eaf33d1da696a652b3a"}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x3f, 0x0, 0x7f, 0xa7, 0xdb, 0x4, 0x5e, 0x3]}}, @NL80211_TXRATE_HT={0x3b, 0x2, "ff8b5ef6c559715b4f37b53469ad4ab2cf7be28c89cdf9649e5825d19e03a88b28c648b37ba332816e56fbfb44a93bb8fb6304dfe3d9be"}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x4, 0x5, 0x5e6, 0x1ff, 0x2, 0x1f, 0x400, 0x7]}}, @NL80211_TXRATE_GI={0x5}]}]}, @NL80211_ATTR_CIPHER_SUITES_PAIRWISE={0x2c, 0x49, [0xfac09, 0xfac06, 0xfac0c, 0xfac08, 0xfac0a, 0x147201, 0x147201, 0x147201, 0xfac0b, 0xfac06]}]}, 0x4d4}, 0x1, 0x0, 0x0, 0x8001}, 0x10) r4 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:50:07 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:50:07 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x4000000, 0x0) 06:50:07 executing program 1: socket(0x200000000000011, 0x3, 0x0) socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:07 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='Cgroup_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000002900)=""/165, 0xa5}], 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mknod$loop(&(0x7f00000001c0)='./file0/file1\x00', 0x0, 0xffffffffffffffff) read$FUSE(r0, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) read$FUSE(r0, &(0x7f0000001780), 0x1000) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$llc(r3, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) connect$llc(r3, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x10) sendmmsg(r3, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:50:07 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1064.425985] encrypted_key: keylen parameter is missing 06:50:07 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:50:07 executing program 1: socket(0x200000000000011, 0x3, 0x0) socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:07 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3f000000, 0x0) 06:50:07 executing program 1: socket(0x200000000000011, 0x3, 0x0) socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:07 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) [ 1064.535983] encrypted_key: keylen parameter is missing 06:50:07 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, 0x0, 0x0) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) [ 1064.631146] encrypted_key: keylen parameter is missing 06:50:10 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup(r1) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r3, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) connect$llc(r3, &(0x7f0000000000)={0x1a, 0x303, 0xc0, 0xff, 0x1f, 0x6, @remote}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:50:10 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:50:10 executing program 1: socket(0x200000000000011, 0x3, 0x0) socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:10 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x6b6b6b00, 0x0) 06:50:10 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, 0x0, 0x0) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:50:10 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='Cgroup_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000002900)=""/165, 0xa5}], 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mknod$loop(&(0x7f00000001c0)='./file0/file1\x00', 0x0, 0xffffffffffffffff) read$FUSE(r0, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) read$FUSE(r0, &(0x7f0000001780), 0x1000) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$llc(r3, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r3, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:50:10 executing program 1: socket(0x200000000000011, 0x3, 0x0) socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1067.423895] encrypted_key: keylen parameter is missing 06:50:10 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, 0x0, 0x0) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:50:10 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0xf6ffffff, 0x0) 06:50:10 executing program 1: socket(0x200000000000011, 0x3, 0x0) socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1067.600239] encrypted_key: keylen parameter is missing 06:50:10 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040), 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:50:10 executing program 1: socket(0x200000000000011, 0x3, 0x0) socket$inet6(0xa, 0x80002, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1067.778473] encrypted_key: keylen parameter is missing [ 1068.033365] encrypted_key: keylen parameter is missing 06:50:13 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r1) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x8, @any, 0x2, 0x2}, 0xe) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x7d1a, 0x0) 06:50:13 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040), 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:50:13 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0xfffffff6, 0x0) 06:50:13 executing program 1: socket(0x200000000000011, 0x3, 0x0) socket$inet6(0xa, 0x80002, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:13 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='Cgroup_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000002900)=""/165, 0xa5}], 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mknod$loop(&(0x7f00000001c0)='./file0/file1\x00', 0x0, 0xffffffffffffffff) read$FUSE(r0, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) read$FUSE(r0, &(0x7f0000001780), 0x1000) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r3, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:50:13 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:50:13 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040), 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:50:13 executing program 1: socket(0x200000000000011, 0x3, 0x0) socket$inet6(0xa, 0x80002, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:13 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x1000000000000, 0x0) 06:50:13 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='Cgroup_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000002900)=""/165, 0xa5}], 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mknod$loop(&(0x7f00000001c0)='./file0/file1\x00', 0x0, 0xffffffffffffffff) read$FUSE(r0, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) read$FUSE(r0, &(0x7f0000001780), 0x1000) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r3, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 1070.521705] encrypted_key: keylen parameter is missing 06:50:13 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000001c80)=ANY=[], &(0x7f0000000340)=""/142, 0x42, 0x8e, 0x8}, 0x20) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:50:13 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(0xffffffffffffffff, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:50:13 executing program 1: socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1070.658376] encrypted_key: keylen parameter is missing 06:50:13 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(0xffffffffffffffff, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:50:13 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='Cgroup_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000002900)=""/165, 0xa5}], 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mknod$loop(&(0x7f00000001c0)='./file0/file1\x00', 0x0, 0xffffffffffffffff) read$FUSE(r0, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) read$FUSE(r0, &(0x7f0000001780), 0x1000) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r3, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:50:13 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x6b6b6b00000000, 0x0) 06:50:13 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(0xffffffffffffffff, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) [ 1070.820846] encrypted_key: keylen parameter is missing 06:50:14 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:50:14 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='Cgroup_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000002900)=""/165, 0xa5}], 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mknod$loop(&(0x7f00000001c0)='./file0/file1\x00', 0x0, 0xffffffffffffffff) read$FUSE(r0, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) read$FUSE(r0, &(0x7f0000001780), 0x1000) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r3, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r3, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:50:14 executing program 1: socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:14 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:50:14 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x100000000000000, 0x0) [ 1071.612614] encrypted_key: keylen parameter is missing 06:50:16 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x29, r0, 0x0, 0x7) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000440)=ANY=[@ANYBLOB="4c01000034000b0f670000000000000000000000c96ed4ffe8e2766cd89094873c585290ab22101d25b16323dcf668f80f7ec2fcfc2a519445cb9eee8ed5d54cea204e77c1c6964bd11bda3db05cb0a3e77f33c8cb98029d888cf73b3e04d2e9c571baf1c344446323ff9723a0bf676b4430956dd77c16aad9d0393ed22580430a6986", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000a00010063686f6b650000001c01020004010200514722036d202a1e640138a53fbabaa71ee164cb9c9e09992b73824cc09d2dc44511ffe2d79ca2dcb539f7ed9ef9b8132c31696ce6d04246097cef71db191444a5d364191a5434db9dc7c039b5e791224811144e0f1b72869a34b9fcad9efdedb875394895c66173909b06e8c8ba0851029db019fa4357f578d995efde753d5d87c5da4838f496157735a70926d3b454441df3fb911c21d5ba9b428c35d82894560a0a36cf2bf37460097b40c42bf9f6ddfb599b0d3eaa6ec273c1bde7f452a7531ad33cb3438c31907285ca20042be90d5e2b9bb631c72f614e5c3b5d9ef258ac6ad8f9469dd07275dd550b84eb54016ed117ca7ee0c12ee31811adaab9b78a140001000000000000000000ff0700001a000000"], 0x14c}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'ip6gre0\x00', r4, 0x6, 0x0, 0x6, 0x28, 0x2, @mcast1, @dev={0xfe, 0x80, [], 0x14}, 0x80, 0x20, 0x1, 0x8}}) 06:50:16 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:50:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:16 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x200000000000000, 0x0) 06:50:16 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='Cgroup_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000002900)=""/165, 0xa5}], 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mknod$loop(&(0x7f00000001c0)='./file0/file1\x00', 0x0, 0xffffffffffffffff) read$FUSE(r0, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) read$FUSE(r0, &(0x7f0000001780), 0x1000) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) bind$llc(0xffffffffffffffff, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:50:16 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:50:16 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:16 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) [ 1073.726384] encrypted_key: keylen parameter is missing 06:50:16 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:50:16 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x300000000000000, 0x0) 06:50:16 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:16 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) [ 1073.884811] encrypted_key: keylen parameter is missing [ 1074.019273] encrypted_key: keylen parameter is missing 06:50:19 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x8cbb, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:50:19 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='Cgroup_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000002900)=""/165, 0xa5}], 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mknod$loop(&(0x7f00000001c0)='./file0/file1\x00', 0x0, 0xffffffffffffffff) read$FUSE(r0, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) read$FUSE(r0, &(0x7f0000001780), 0x1000) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) bind$llc(0xffffffffffffffff, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:50:19 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:50:19 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:19 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x400000000000000, 0x0) 06:50:19 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:50:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1076.742304] encrypted_key: keylen parameter is missing 06:50:19 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:50:19 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3f00000000000000, 0x0) 06:50:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:19 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='Cgroup_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000002900)=""/165, 0xa5}], 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mknod$loop(&(0x7f00000001c0)='./file0/file1\x00', 0x0, 0xffffffffffffffff) read$FUSE(r0, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) read$FUSE(r0, &(0x7f0000001780), 0x1000) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) bind$llc(0xffffffffffffffff, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 1076.892830] encrypted_key: keylen parameter is missing 06:50:19 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) [ 1077.008068] encrypted_key: keylen parameter is missing 06:50:22 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='Cgroup_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000002900)=""/165, 0xa5}], 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mknod$loop(&(0x7f00000001c0)='./file0/file1\x00', 0x0, 0xffffffffffffffff) read$FUSE(r0, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) read$FUSE(r0, &(0x7f0000001780), 0x1000) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r3, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r3, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:50:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:22 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000240)={0x0, 0xfff, 0x1, [0xfffc]}, 0xa) 06:50:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0xf6ffffff00000000, 0x0) 06:50:22 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:50:22 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) r3 = dup3(r1, 0xffffffffffffffff, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f4000000", @ANYRES16=0x0, @ANYBLOB="000126bd7000ffdbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=0x0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008b00", @ANYRES32=0x0, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b001f317440664db88a71f70cbd81ef4bb097a4611a92da52b4384215c010ad8dc7771865a4c5c2b0245e72e96a2e722d9567da4cf3c409966fdec13e9aa7865102f19ef62eafc77e4d884be110df82ed652ffaed524f6ae2647066a0f661466512b5d30afd865dfb14e07a", @ANYRES32=r0, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0001000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008a00", @ANYRES32=r3, @ANYBLOB], 0xf4}, 0x1, 0x0, 0x0, 0x10}, 0x4004041) 06:50:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1079.798202] encrypted_key: keylen parameter is missing 06:50:22 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, 0x0, 0x0) 06:50:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x2) 06:50:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1079.942697] encrypted_key: keylen parameter is missing 06:50:22 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, 0x0, 0x0) 06:50:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1080.078014] encrypted_key: keylen parameter is missing 06:50:23 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='Cgroup_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000002900)=""/165, 0xa5}], 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mknod$loop(&(0x7f00000001c0)='./file0/file1\x00', 0x0, 0xffffffffffffffff) read$FUSE(r0, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r3, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r3, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:50:23 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, 0x0, 0x0) 06:50:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x3) 06:50:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1080.197623] encrypted_key: keylen parameter is missing [ 1080.315249] encrypted_key: keylen parameter is missing 06:50:23 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:50:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:25 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0x0, 0x1, [0xfffc]}, 0xa) 06:50:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x4) 06:50:25 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='Cgroup_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000002900)=""/165, 0xa5}], 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mknod$loop(&(0x7f00000001c0)='./file0/file1\x00', 0x0, 0xffffffffffffffff) read$FUSE(r0, &(0x7f0000000780), 0x1000) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r3, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r3, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:50:25 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:50:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) ptrace(0x11, r1) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3d) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r4) ioctl$SG_GET_SCSI_ID(r4, 0x2276, &(0x7f0000000000)) ptrace$cont(0x20, 0x0, 0xfffffffffffffffe, 0x4) 06:50:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x300) [ 1082.963704] encrypted_key: keylen parameter is missing 06:50:25 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240), 0x8) 06:50:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:26 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x4000000, 0x0) [ 1083.129957] encrypted_key: keylen parameter is missing 06:50:26 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='Cgroup_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000002900)=""/165, 0xa5}], 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mknod$loop(&(0x7f00000001c0)='./file0/file1\x00', 0x0, 0xffffffffffffffff) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r3, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r3, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:50:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x3f00) [ 1083.263462] encrypted_key: keylen parameter is missing 06:50:26 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:50:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1083.370821] encrypted_key: keylen parameter is missing [ 1083.505936] encrypted_key: keylen parameter is missing 06:50:26 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:50:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x6b6b6b) 06:50:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:28 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:50:28 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='Cgroup_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000002900)=""/165, 0xa5}], 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r3, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r3, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:50:28 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f00000002c0)={0xfffffffb, 0x0, 0x4, 0x2000, 0x0, {}, {0x3, 0x1, 0x5, 0x0, 0x35, 0x3, "704fd336"}, 0x0, 0x4, @planes=&(0x7f0000000140)={0x400, 0x20, @userptr=0x7, 0x5}, 0x1}) fchdir(r2) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x401, &(0x7f0000000080)=0x2) fchdir(r1) ioctl$vim2m_VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000000000)={0x81, 0x0, 0x7, "a0a116aadb5c52fe9904fac21277b105ba22fb30db56337c33235dc117206318", 0x52424752}) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:50:28 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:50:28 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:50:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x1000000) [ 1086.051899] encrypted_key: keylen parameter is missing 06:50:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:29 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:50:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x2000000) 06:50:29 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='Cgroup_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000002900)=""/165, 0xa5}], 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:50:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:`00000000000000000128\x00'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1086.317878] encrypted_key: keylen parameter is missing [ 1086.491965] encrypted_key: keylen parameter is missing 06:50:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, 0x0, 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x3000000) 06:50:29 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='Cgroup_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000002900)=""/165, 0xa5}], 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 1086.655597] encrypted_key: insufficient parameters specified 06:50:31 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x200000000000000, 0x7) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000000)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:50:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, 0x0, 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x4000000) 06:50:31 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='Cgroup_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000002900)=""/165, 0xa5}], 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:50:31 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:50:31 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:50:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x3f000000) 06:50:31 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r2) sendmsg$nl_netfilter(r2, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000040)={&(0x7f00000002c0)={0x23c4, 0x3, 0x1, 0x201, 0x70bd27, 0x25dfdbfb, {0x5, 0x0, 0x6}, [@generic="597c9bffead2e17f9f5486d20ce71d9c52f1ad86b7d05ff732c075b9615014ceb995d6d3955f0684fe8346e6d822953904a72e5213e88662565632f34e0f772359c46f6fab526fabd0f0bffc3227fed2d0bea871fb802f2d40cdf1760523f7e4a3ba46b3d001162bd9fda7f61bedde1cc01b7952f16ed42653173790708839df029128783b8762e386f7efcd693c08c858c338b3a6a6e2de0f95de5496f87f1b0b2364d9ac1ebf74b4f0eee89b2459d995e9fa8469260bab4d5d37810b75e18efea0c1701cf61e2db596bac32a538988eb7544b19f45768d045c72ddd14a2e21d32995d3ce183080b4e48bad690a61c107355a00fb022ae2443087c458f95a7493a0766cffc2b60a413b95c0f2474e94d2ef33dc5ee5efd19e502a361fd2c83669352dfac21bb90d68639ec04c96683e675319fda1e2a8c6c7089ea9229b0434adcaed5fe77baa10f02fc26d80de8b2d069ce7b1361e00e6744afec95896363bb905210248d3ff1e1b101d5789d333e4718c85aaa6f56997de10d894e264c21f2aaa43aec5ada5fec2a1b5ceb933d534fdbc32fe514bd7375bc713490192ed0128f7b27359eecf7bb0f487ae1896288f28de91ad908b051f5430ea58aeab3e674e6ddf433e2193d658e97b17bd346a7d6a649111f90fd9638312dd0b6c924819302094393fe2b3ddbf0ff1a946bf745f90be665bccd065c647efe08b30213295122eeaa94a9c3a399a6da88fb68d3f6d5f9ab5acdcd14a826538372a8a6e214fef0326a7edadc018627bed9e1fdf89acbd88adfe3e8d7f2b2bd22aee2a14c5b954f016ae4f175995b8ddde368cd0dcc695c04f0235526947933ec9404b9310e4aaa19cd183179e9f3afa1c0bb17532892c678cd8d2a7cb32df91ca7fa89ea1ec7a475f1b09ac79671b25f6b0b6779ec7c759fc57974b0ffc55f49403de30562ff86c2bde51c0f6a8281ac445710064bdbfd168adf4891c0f49a16a8dd1107bcb4a6f9162aea7b6df1cfc2706458dc7ff83c8c0d1b11248e6ee907aeba0f7146c0e92dccd985bf2605a73e04647755aa0dc68d33ae021c1c2739e6388a1c6da8083f49713798b4519b735d77baf8afbc87e0cb353d056478796d2efb405971c3d0d210bd2a2fbfe00191ffc617e14f70cc533b5c6ed643bc474d459bfe94e005cd6525c7b176e0e3410b67f93f88cd5ccefaef112b17afa9dc640a23630e7456f660b2c4fc5eb5cab8229febb889928e3d4dd7efbb772e93df065303cdd7aac9bbe5a614ff48cb534967d51171610dc083f934501feb1734170bacf184bbaac4c91b4b8e4d2425b002b186114e26a5e5dcbdf1d62fd51a66af326e41ddca83c1ec2e1d3b081f3a7382067f9f46105f5ec58d0193857183e94eff590096b08acf2a9c677857e57110a87a35e331e752b112941902d1870934e286ebde2d9347683978edb2d29af9d71b6fa4c7b1fca56025f15a1289e7fab994aa18e8626edf249365e4ff175642da07112eaade86f1586a29f3204e17c5f8212f72a69f3c62d282d596df5a8a042fad4667da07e5eae901b3dad284c7c355523f042b0b52b21e8fad9583cafebb3940b6fd058c46f54a50a1cb80820106ec2e4ba54892aa9e817e6fa846ba8778b4bb9de04501b66266a236c599fdc74b8e106c06b7c2bdbca31f95542951857472c1e4ff05ce92881410ce1b7ed363c8aef3ef558aca8f24e08ff67b1a0799bf0e165103295920e3169854fb9a6584d2586caebe7a29202f16f34b7ec23e5d17f5abae6a5468109cf744ba51e0ed18e5367ff1ca73d6375a4237d5520e1ee0e18bb68ecb42ee33df13654003cd0b646bee71321881e8c9a95a172f17750d0545ec79571a7d413eeed7612f62f0104bd4a1b30ebfd8aa4fddc24187e6cca60d3dcb9f5f33e71de4e670a9001944d166963b59837ef1f6659df3185b25027b49196ec8bfb6cf13bb0f3a0f4ad2c2992f7734a67fa23d5f0e1ad62c615ee5a041f1088e1e01cd29e22b6ad4b9cc071d0e33c001f129dee9e1bc3fcbc7fe8700eeba8c8988653640801a7b9e0eb68f30f13f50d6cc08620432f97e74d38307dd993e70c183db0e046d1d523e57d62691362d8e146964c0f103fa9f0c3e79eae320d81bc031b02fdb36e0b30037ab9ead55912f0148afff1012d556128048af0512d8e7f7f603189a7c1d26f039bb71e3394790ce24d0a90d61f5bb41828b0bdc35d7edf4f0d16e9238187ed718b2acf680ee94ebc267b12ddc0e0963d897bae5816c8d2bf8f1f1cffd00f0666a9ac843af3220427b2d617a555d1fe996c2ebdfcb4db1ab0e5b30ee9bc5c3e4727dbeea65f2be08d1a8192df2efa29ff439ea28dc097e45c51a80b4506684f02f81acfd763a2237f0c490f98cc4ae407b891681112de10669db21c4c4dacde396aa834ed4341ccb9da37098f2aeaa192392817dfc2a8007c3c194b9098d4a1040541518e4855cbc76cc6db8a2ee8bc1d69e90be19eae92bf4be6677636aacd5c1d877b22eaee887c6f982ed87d9f0586450fd1421c85303f04e6e919826f6243e0f1c12cdb1ccc74d80dda7bf6c9d1d7b43b30b92475de1c14e39c9e0789e103d2ce080ae9e348ca36afa8eb14f0bca55eae0fa0e869a435626cfc1cad342b3c5b984d3cac7dc7ef66cc8291a4f38c5b868b9a9353ae8bf1dbe1b954978c26ffd53ce403bb9cef3c38033fa97f5dce30be77ab430427c15234ef9580cca40c1f2f44a260d8dcc7d05adb4c09222a81ce6fc27aa3b31d9717bd7d275effd6dae59b06a8d274c7774856bd19752b7e329189915dc6832fccc725cb73ba82cbde4fbf62bb0e520d0ffb9f120a2c3dfb9ab7f36045709fd037ace33f65fd41dc3458dedbb9ef1d9ecea45d3985833933664d458d9567cbb3860ed0d3a030803680f0ee391ee4372af2f1c6252918b16abc9a735ecb5414e8350925b953ab5119af4f391d4f939205bc746823f3dc48f84dc8a28001168ca5e764cc336217f745f4365e488368b2d87d2e35546e2a710f5d2fc64be97acb2bfd2720f074446414f62812a4be2f0c5f90d8fb6cb8d9b04ba44eaf930042829bebfd522126c1316dcf5a5a8ddfba2c53e4e7cd47cc566163e2969bdd9db828ab9b56ef76db1c1828902a7bf4fd6ec5b7444aedd5237d30fe70471459035dae8f775cfc65a6d6d16ac5596d7837bdf163bde749b7aba2b4acca22ee61f07ba6366a60a3ab5810948cfd92d2c237a913c35043f5f2d7314725e4edea47eccbcd2e056c577986d230186cd1f67a7bd9a8976c6146d963cb1a22c8b9190618e18d38a62f0a11b5c2ec536ec1dbc4ec13aadfafa1d0004482940d37183844feed4224c4075bd09a2a8616546a4f1ea3eb05142256fcfb0ce0b7fccb3945308ba0eee31882141e6df099d3523e218878c59698a0d535fa6b6a0e36ebab64435ee2a4ea7ca4bb980ac062914f761cb89de925ca6521adfb0d3bb2ed122d08692ec723d0884754ca637a8b8ca03d2ee81a4936ef9a022371087f10a58316b51587501d50a9202ca729bb0956fd4583f95cbff99dcbaf5f3b0f2634a09a84d018bc3ce5b3b5f2d6de387847c1cbf96790c1c9576d06c43bf0b57a3a165a6d554d66eac6abda0ec11d51d708220b7ff3921a619344775c2970efb25162aaf6625340fe09755e922dba93e696f971881cd4156aef9c334642143df3bd870a612121358be4e18b92e036fe855fc86615f3f1331c8c10c92141e053d45ded639af8e5856e9f8c23f2299d2b8c1637edba736415c2cae0d4dea73e371f5a556ec59ceddd8cadcba2c58e88a6bc84bd8524c9b3d7f1e7615fe4c8af7552b8af59f1f61dcf2a8f0c2e32550f120580a62471768cd2e0a0a0febd9bc2f4d589e9bc67891862e6753417bbf297b66d9407cd96bb744493b0ad29a48ce481da06ada4add8843bde5ae49b1dd186fc419304faf512afd3e98fc99b8339a33599db295766d70449ea74f3c4f63a170ccda2ca40d56152bb2ca20bf5c8e3e59a81d6786920d8f7f0c8f10aa073c1d047c11c17bb176f9a103262c65ca74ad85c4892611b5fea0c50bba159fcd6f29a24d27fbb1add2458ca484e35248185b86845ab43b5505de0bd004b917c209bc7b383ecc9be591473be2d060bed69cc8d6845afdff006c18b46a2fa7010deef5d002472c91749898801876c5d6d72c6d20b3acabbd6be69c7a11916ac69bab563d9fb680d19a90f9a09d43eb1632b2d61efca014cdf6aa2012cc1c4b82213dc09b38ea9db27deef01ddf97e15094cb55e02c4a37fb231da1957e97e2c52e53c97a4e36b5524c165766e61a9c0064818dfc2ae2ea631035f4077f6b91811ef4d9d1dc1267b66864ef24e80d90ff6e76743971d7326e1f6ebe8a3d87d4b2c216f0da0a4d8d3beed1935b6e966bcba00afd0f67b61b79b8c302bd7f5e518b833868251a30a5e5b83f0acd6a729a81d38c7a7145fe8da28702a8b4391f32944e69ed7907168b6c3a9e377425045c3eea5918a7904e697c021ad5471c7a3649d1a235f73ff3f21670ddbd6f6353e2eb752f32d50beab7d2b386bbf14e669f7f04ea9c5586a0330d1caaf9ce42d29dfceaa9b083737e9cca7128e9508a86161a48dc858ee0601ef0752ceb7c4f6a19897ca5113280ee417a1c4cccc8d8bc420db98d55b1b868129a47be5b10a3e4bdd111b94b2ea5d93c5471bdf35a1fd6ed7f25b582be442555318a88f31211797b8d5acb24272a6aae3e2f09eb1d8c3b4f0cae97f1db02b2441bd9c6b307b5486a6f0b906f0e8a6527d819772551311cd01da8c87ac11897f5cacae3b031466bf809bf2d6bc1c2dcc62c432883a964b9aed9e584fd475b72929b089c3e6b7e59ce9f128cb395966ead2d69ca0d33f335be636af75d84b961ba2ae2fbcbd87d48dff0ce7f380a806605a80521a2b92988e3b05aaec18ffd07ac55a50913507631c8e797507110a03aeb8812faa6d9d30bfa6ff69724e8c2400a826bb854cc30eb44fcb701a319e9ee5f2f6c8de145abf67b277862752379ad8fb612a4dcd53f9e83293a26be096e64257e70e4386ca21ebb597c67e6ead536aad6e56b5e809dfafd1031fbd48f5e58f34bdbaa9bcf2e5cfbaccb1b566d01b82d2c2d2f17baa56d9be3d804781e253abd77397b6c21af980d98b2d50aad453fc763ee60ee0b6bdd1d449f36b495b402fb15f0beeb2f9ce7ed070e98ff47d42a833e81325d6bb705a91d5069be6f1e9de0b1f9b7266bf3430c90a61356bde313aa8c0f0d157bda6ef15e6e6806c53ad4db72ede5b93b36cec4633936a4423b264bbdd71fef0d3bb40ac73cc510177e8aaa23685dcd4c7fa8c6074184d978273ba716265a6edbde3f3ad4b91f3ec5272bbc1cad310f7136673526aefd08e30debf4dffd19ed54a98ed1f046bb47810e3170333ccea61b4bdf1d9813c67c34b9917142196ab28b3f400b96033cfb6a5971f11bffcecbe916b41535ecb78ac4ef7d596878c716eb3947e67841dc5dd74b43323968e9e7f066f76b55612dc6308637c4f525848c10166d792f420df3b08681943911e1cafdd2595c42fa11e4f8bb0944859ef3d10ca9187547d232b019b28268b2386c4fd9a6f61257a55244b12162a9ba78bcceeba45db218210521d1230aebb403245e5698ba7caa16d9292f5d309fa656ae170fa73ed88380a4f8671f01528ee66ac953b6da9df04c3a0c7b9a1115a2cf96b93b964e37d883f51a6fe6c45910e0239e62018c92a5dc1693f826e146af1869197cba16680395d6f78949138409f", @nested={0x109f, 0x1c, 0x0, 0x1, [@generic="488aa97254c402f1c5d04b6a4e884e72c7f9529843cc044858739a0023d2815bdaa63f46cd4549afcd45ba0cc379fc174a34eacb5e66a1cc2d1a46f5edac6ffc784cb0944ee45cf279efa10958c2f2724a4aba635d96de13e2ec1b6f58738f8d8e7215889a4606258f8cf798e3ecea14351ae5510203ab30f5994b53063389fc1d1dfae85e15026e54742e9ea5c2d7069fbded9d335e4de7e83b1f674ed3bb26710fa6eda24f12fca23a5ff1bd0db6edd325846806541ddb3e79445d72c7ffcdc91a24fd3c133c670596ff7fe6a0a992b097ac31f69e5f2bc8ea2deedebeab30d838150581df5af68c102eb010dd2dbdecd02643484c1a4504b8e89a13a4a2922bf84d16b19e0ad0ecae8547bf1bf2fb9cf32ddff73099c9ec5130bf829c20d0e6826bb4fdeab9c12c4c20e59117bed4ce95680919dd3c5d16409724fc93072df50981e99dfd3beb641a394b61a22580df9050e360384610af6bc82246bf863e0b615fdcfa08be9207e2a67ba227293524ae83d58587049791d0e056635c99380c0ab16cdd74715ec57400cf71cb10fdb151419176fc9509ddca2985b18126df6a1b0c3ff57c1f4e4dbfcd14872d0ec38e8b52380bbefeef2237fe8e93dc5c429d676dde574364e76cc6cdc1809dc99af5efa647840011d7d766bb79d50aebbba8da3354bcc38c1a71a40bb0ff30dbbe6086f45637c7c4c38134dbd01ea3702390f5ca8bad2abc14b8f24120a4632b138340203b7c5e33453e968d890a5fe2ab9dad4e59d863c4522dd0ceb8ffd4421e3d2b1379b737d0dadaf6777da7fa564143e3ff5990ab7508fe7dc1d1816b0c9bbe2e4921039b2ea8c4380d033ce5566d0a8802a4a863290be0fad517ab94324d375ef9a3a8fe511705a1e2ca4d248303dc64f4511ace37d2dd4bdda3cf6074e36cf6d60fd37e409f790c6aee7ce1c8894a61e58f75d2ee0ef97fd48147a3f4702a247f6ad5d48f013b682e268717ba9c36a413ed7e12e48e7c19cfe27b7df1925d82b970e203745a81b81ad4f40a9ae7b8f0d8045d876f654b0505613bac118b78957767b209aa7456900b5983bb574dcd077496a549c467fee12698ddd4904349155dd0e0ca06fb8dfd50b3e8a331f42ea73e5d4fb9c538dc3d16732ab4f192434adf44f8388e8d3c5abead76ab041a5753309558112d5deb09a6885bd5b84211692648a5aaf07ac1e617d47524fe38930c45fbbf0d6b1b564980cc1e2ee0f2603767fad5412c165c10ba58b3cb6518cfa312f78d62c07e64268774e10cf85299446d0e2f562b4d137470d937d78d6aedeedf740d0e6aa5b9b357cb91a161a8199a4546c8bbe39e79c2a21a41cee200d189017a73946696e4e1e3d14eb04cde4bba79987483aa755e5d70333f15b6fd9c0eef97e4536139ce81888ca005084b38f9814f00f2914c30758bb6e3618b7ba785d46de3d258f73423a49387917fe6d8203f8055a339e69efc70b9753a172eabb7f4b51445b273c25bbfd151b23e26e4d5eec35d60919d9f98b7eb7e166f996d769f9c088552ff31480bbede526965a14ba9685c1dd5af91c6dac42bcbf94938dbf5d47262bea96c0207bb38a0388178b448c259f353a9b2e4d38a2c00d97ea0ae91405e999459e62bc9ba2df6e9a243e31cc92e5e3d9b74dba42e6f374e3c35999dfeb9a45f2acad445f24443724c99360fe20f3bb72eddc7b693b0e70f6c311c3feda9f1c6c3984fd94daf731b195ecb2caa79c5ab6b37c7ab31f5d1b428423f0b9466ab5587c13b003f93b4f822f3731dc31625f3da453870046d688f52ac1e89f621ef008acc04f7d25ad8d2b6a027f0aa4172d3935f62492baa412eb58beb0dbe933931b6006edfeb3766cc74b16427d6b8889f332bdc2fb3dbeb99f616bcd94c4accc6dca2a4faf2978fa1e82fe5dd51a6b2f9a8903ca28e79369f366d16e24eb22185d390b85fb799bc0f435f96acd59f795e4ca6bcb5f05f69956628b711977c1f2b2fe7c858fd3e1e931dc880f38978ed26d1b4a5d84065321141f5747875db5cbb28a51a64ff04277a5fa55ce143a8aa1e2011e2a9bb16437b0658df32cff07b570e775d94d4c291da6fa49917142fd60822d353a88d18148cebbd70c2ba0c3a431092be3b8d3eee244e6db04e3aeb92f969fb31153817211ee511d2e82bd180caac8d9d0401a6ce10a9edf16451b2048d7a4c6e1f38a03cd8a340a1a1633ea808b875433497dcf7207970058382423daf901370a21e00ed636982a1fc0c2a1ac26eb5b368cfb9e336d2f0980bda3edb19f6522d5add54230a486e0352c023fea92dcc34cf2920f91c7856ad9738f2ec0724d00072d4f2b0eabafa534bc01a51ec20a7658d06a29d907a3b177a6ff80dbccac89eb3d613aeb80093681cfb0ecbed5719bf63b792ce97b28c9eddd593b00b4def7fdf90cbfd71b23b9a3054a567538b22199de15c4ec4f4bba1a18bc2432509f24ae8c0d59c0f7a1e35d976adc42fee4e9d0dd58402b7d0ceda3af1184ad5b7ec36edabc58c2a5ae70aae07df4abdc43d41235a7b8a6db81c21b5f86789aea7744431b4e9b53b41c52ddf0e4378c826ca26bcceacbc56376e6d4b1a29ea133f7f21752969912063b97b99ea2e98c471cc14b035d2f91056dda06412311df508a725b8d6374836e3f0798e2dca3f66e6fb4900b4b526d9aa6f5fae9432f79109901660796b4eaea763646c2a7224a20892afeca93bbe259c1f22290449ba8417fdd61968f23c93a7361563c53cbfea5e6fc2914b65b497e7e671b9c2ae08747d94bc4ddded320405c96fec8ff618849b054f37794cda40d048e770cfce03b3fa47d809fd4bf1b5ecaccd391eaaee730cd24a4826df68b9d8fb12bf5163d495e49326dd72079543ac45474f164dd4737ad25036f1d340ebcfb6c94d57b2fd6bcea6e6fc399df791c6974ef0a673be9726050818f445c325dfdadd410fe44b9b9c7972b4d5e339a813a7312758546cfaa6febbaeb3178de08d1407b6847d2701c0a2e14cc757f1df2129c5cb3692fbca82a5ab275ea548f123d454cb403258bab2551b82a1f18eca1a4c11c2ed3c3bb0074dc4ad3c718bc81eace7e6ae6821b4b67835ceed979e28a83d1c2f531e0b2939cb66a6d34b280e844042f0a2a156b53c8cc99fe66e70fd05eb3932ddc0583640b163e56ed609aa5bb260a7df7bfd3c559b7724292937953b2394a78b21ba245a60d4dfac9adc6bf004273c312b66b93baa86215bd597694d40170ece1c502cafa3f7de6f409f47d04b221ce3c7582162f9b2e001ee44f2276ae71ef3bf06888ee843c8598861ec4c6838d9b3e998c88a70edc9ee90553e4315b453efd31439e939874838d79a0977ede22240a32a24e6dceb67744042e7c898c30f95cf3aeb3f02c63cc852c5a9fb42dfbd32bf41a33ec7d75f1113e08ab750b4630eb9fa7e84d911e92f5e47c53887982becd8507b3028c2ee17ce91ef819a46d215472d9281cb296ba1e6a8f50549a12e60701313d05f843cdd1b820bfefdce70bae1073cb0868d7e550c481b6d6499cd65d55261c75611dd51bc85b10ec01e8a19031e05cf0588215fe84fd3b55e4c98f046a5d221317a3dd1e82e84a20667ec79f015c528fd3cd186106c7f4fbefad9bcd790cec06cf1d5cba245a5103f38b212fc4bf427b2312b2ddc2f143b0edab7ecf67300d066f141144b3d4e981aa15684a15ca59bd5b814a8564a2e3956d406b6c469f8cd1016f950cd1b464ebe3df86f1416a4f73712dc3ab42b119e92e51ac2933a099125ff00d9c0e38c404a338531f15767a947dfcba5d438bf659492c347595497f8f78de6cc68065b6d69aff18059d2f679ebd77606a4ae1e038950ca4f3c49ed356218f1c293c5c91ecb14d8c15c3b96b97c87e2e1260da5e053c80fa2129bba92cb092f6fe3d762677e27870aa0855aaf8c044e4edc84a45ef5a7cdf23ab7d47e05d375b9fd11f711d18da0b7fc6fde9e87d74d89faf6b2c4e5f6098ed0a65252f29d2240f70d726a89f1d89a140dd17f23515fabd54ca15771e6172d1039a08f9fd65a5564726a38d0b666d8a71ace61a5469ddbf0b62e52c056d382ea5a985021f614ea40c0976e5064a32207f0199cc5ee863af015eb9270da21bfc836789eaa1814cb7ea6527c86b0d8dac81cc8f1d5ed58883bad30f47923e66fcabae1d79710ce5cfb137cd419e882975c933ed0803fc5be67727d484f8bef94aa7db9d364524bb6488c76b6c699e599892888f0fb9fe043873cc10cfe8947970200795d91dc98f6c1b1c4f694b6d7c99d912094a3b5398db7a80fea00a9145f5a1bb682727a1b1ddfcc063ea4c7bc151fcd38a0a770755b61f21640b300ee11ca10403e22c3b5680b06f5b09355b0eb960c57d9df70f32f88127ad7035656aeed76d5289101a21c31865a6176fbff1a4c1509a518c13543a53828c88568a7ac7d793cffdbe218860a755934baacd0c398b083958cf27d2457bf1056692a207ab3d5b0858e9aba288095262bcb23ec1d0bbc5e2bd0d645f0fa93e261563d9dcf4dc8ec2fe21602a3c689464a95d0a888cc6f55b690acb924a6294dd2a91f9f460054614fe7798f93d9aec03b8648fb03aa4f75f1e5408dffe25a2a089ce15b78d492b9aeeffb78a126137d0b3f83ba39ee69a9c03d5c826d2e8116598858fe301e348a17218a82a29312167999f22a6d325194a15ae881bfcbfecf908f6e16f85f0d039bb8983208212a11e2558bc14a4c60c9bdc504a4dc76b1e74879a3f8c387509f23e30fe0d606eb7af8ff8b61f7344725612ce04f7fa1d6e5500844ee3ad221940e798d7a32549c49fa56251fa31c5c17c3d7286c137cbd393e2bc43ba06aeb027533ae327432c929994742c534888555d4d7ee468f7421ec9712e250fc56ac4cfd012b2ba96365cbb317bd1644ea1b2a917580f2f25af4dc06a1685292e264bf76ada596fae43e979d364d42a6361af0263d6db47fa8c5403116a708c33a23ee1f09f90b0ba635d6b1b975bb24949c838f9b4884b34e5608f72f26f385f3d04141d10bb87d80ab5630420aef5ac45c050a56e748ea14115b65058886d4eaec24f9f4a59fc94c42b5962a7508a021e7fdff3a99dcba45e2370f6b9d23c44bc6be5a995dfa668d3ba77bff506c9554a7e542d91c9c987f16d67aa213eabc12eac997dc47fd2f4ca8158917c4590d080bc13c7eefe8db256bddfcfa4437eab35c9a39868d91771a726dcd94dcafd1adc1c5e2e626ddbb86ada12df09ef0b2aa5eade7d5790a7816cf82639312fd9c125f5264bf366ed1e28b2e501cbf6994be261a05748e06fd68b42996b2712ceb4266fa4b682ac9edb9f59401c857c8f67ce79f7fc1f8953414cef10b5403c5137f984ebef64eea069e89962dee564408ed81cb65a59deb4a3d95a19dc7d7aebff44887d2ed8a305fa6ce7dff50e151f0af25abec84e67a2298d44de2ae018c312460dd0a3982a58124774a517786eedd32da95edfbb33a03cec3ee779326d6122df586fcb71bcb29e7a49430d4fd818acadebe06cc5cbe30aa958f6f6dcc801c0da78c24805d07c82d1b39a4f82ebdb81b0ca779d5b0f80a06374d3387bc8f834b7d1a5f3e2b69072801bbe7708c9f36224ce4a8f1c6fde3a600a5a0b8519525f9d0bfd9c725f9ac4efb1f8ba7814dcfbea76eccf13969c36d2b8584753c6285f0d6e9f22de0a183baa2f3545aee1296d645db2dfa9b9efcb7e38edb448d8b507cd2bc766d08870a56016603eea5001bbfcc954fe921f84d6b6a3cae", @generic="2f23171341e69890463f199b42061a6a9124b4be34778384159d3e6bb44d9388870aa04ce959386522e8d8066389b6c4c6541380e604458d4bb7fa2804c733aa8379b56a31357f66895ad6ba1d9d87abc9e26f36580770984cd43dd4d63bc35845e7cfe914ed1546d24206fb95f8f3a16b0832a081c91f27530be2b2631901cedea0190be112b16b3eec3d46b9d0aa80da4909d7b3bd3991f642d0"]}, @generic="de078fbec58d5f7df97d7b48b4a30da70fc3679c21c45445546385374f018f55db7fe3ecbbda148f2e4b2880c8ad2616e28b10707fbf58bbf5286f87300abfbf589b27c154d75624a958117e79354036ae29b992f078809edad965f915eb42137b1130548658f3dbd999ba586d53995a563e1c87cfec95f9fa68af4eb33205acf71e00275f41713e0a313f340c1589056fa91f0ee1ef6d7af1d9e45a674ec9445ea3d17635ef4c2cd44d28175b0b3c9704451b10cf20caa31efb7482f44c46a0116a4123e237cf3e1a523d25b88cb4076b92bb6dfa6737dea78fe8a9968425c6cce53cda036ea14bcb553429ea07de01b9360606", @generic="3901dab5dadfa6bcaed0d0058fcf8962789ad70051b8b967ecd39c0d5b1a84be091389ece81535bf1b4f9ce7e8fa298d82618d077e660dbaaa6182f8b89db3e41bc67c7eb03d57307193fceb4e9ce8c680bcb00fe013d041e10c3d44198852bafd254ff9cacf0f5a39066e0381b7ea24ce9af9640c7a62bb00bae9dd218ef01b61065f1e3094d0d98a303f304a68716f4f9bedbd0a3cc6c9dcf2d34cfac2fd3e2822980d83c2986605d72b208c1669fac47c57dc", @nested={0x149, 0x58, 0x0, 0x1, [@generic="9611fc121cf63b60ae178701a8606709bdba3d7a9d5ede6a54d09eb9a7674d6d7c86078ab84013bfa7b87c14a6608a1fb7adf3725f5a4b7ad94ccc412091ba5846f359fb5d948b58b623673b85fcd70e10bcf852618b6f9f1d06280dff67d536b66fae3b1510ff4ebbbcb0fb70605700100f1ee4dcb7a0c84df01db108217d986413f1217f35ec5ac36d640b6908f1d1590d354e5abe327a7b6bafa8872edf0951396b47bd35c41fe89bfb09a7e7cfb47aa197ad6dddb6", @generic="0a25460c2f78311f31b40e0ab8967f9dd699fba37f4aac2ee0e6ddbbe6bb1540b0b009c02c65770b75ee15fb8521781a94a1d11822e780331787b802ce152f91bd10049707d49de151f2be427ae59a41497a138b09165151696a66b650919fcb9f56ee3e5961726c08f1ada30bd6", @typed={0xc, 0x7b, 0x0, 0x0, @u64=0x10000}, @typed={0x14, 0x89, 0x0, 0x0, @ipv6=@empty}]}, @typed={0x8, 0x8, 0x0, 0x0, @u32=0x4}, @typed={0xc, 0x7f, 0x0, 0x0, @u64=0x3f}, @typed={0x8, 0xd, 0x0, 0x0, @ipv4=@remote}]}, 0x23c4}, 0x1, 0x0, 0x0, 0x5}, 0x40) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:50:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, 0x0, 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1089.128214] encrypted_key: insufficient parameters specified 06:50:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:32 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='Cgroup_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000002900)=""/165, 0xa5}], 0x1, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 1089.242773] encrypted_key: insufficient parameters specified 06:50:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x6b6b6b00) [ 1089.319505] encrypted_key: insufficient parameters specified 06:50:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:32 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='Cgroup_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000002900)=""/165, 0xa5}], 0x1, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 1089.421595] encrypted_key: insufficient parameters specified 06:50:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1089.525431] encrypted_key: insufficient parameters specified [ 1089.580102] encrypted_key: insufficient parameters specified 06:50:32 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:50:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0xf6ffffff) 06:50:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1090.170286] encrypted_key: insufficient parameters specified 06:50:35 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:50:35 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='Cgroup_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000002900)=""/165, 0xa5}], 0x1, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:50:35 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:50:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0xfffffff6) 06:50:35 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:50:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:user:'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1092.233072] encrypted_key: insufficient parameters specified 06:50:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x1000000000000) 06:50:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='n'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1092.405024] encrypted_key: keylen parameter is missing 06:50:35 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='Cgroup_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000002900)=""/165, 0xa5}], 0x1, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:50:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='n'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x6b6b6b00000000) [ 1092.519209] encrypted_key: insufficient parameters specified [ 1092.577012] encrypted_key: insufficient parameters specified 06:50:38 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='Cgroup_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000002900)=""/165, 0xa5}], 0x1, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:50:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='n'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:38 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x100000000000000) 06:50:38 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:50:38 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:50:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:38 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) [ 1095.258404] encrypted_key: insufficient parameters specified 06:50:38 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(0xffffffffffffffff, &(0x7f0000000980), 0x1, 0x8000000000000) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000000)={{0x1, 0x4}, 'port1\x00', 0x31, 0x100020, 0x5, 0x6, 0x6, 0x2, 0x9, 0x0, 0x3, 0x7}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000480)={r2, 0xfffffffc}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0)={r2, 0xffff}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000180)={r2, 0x400}, 0x8) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000380)="a4c05b8ebfe0011d91ea21c8bed8979871dea004749ba1dfe039a698d25b0cb136094795863e85704dbad03cf5ab36059b4e84917769fcce46fc5651f4a2de8a90460f20d1dc8b06b6aa6ead015fe973dcf20f7f1ddf9eb4ac7e32ab4d1b25c252a1d851c44bd05af227d7b69ee000c0924f046ec510788194a06f55ad739364f0656ebaf7852065d455264d8fe38b4b240584380db04c74f62872c5e5c80f2f50c839bbe767b0065332fbc3885106ad2ac04f02a0031cef4655d98905f1fec1fc4b6480e786067fea013ea315ab59050a8dde68d14f30ec8204c559e082") r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:50:38 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x200000000000000) 06:50:38 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:50:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:38 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x7f, &(0x7f0000000000)=""/98) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1095.450758] encrypted_key: master key parameter is missing [ 1095.619245] encrypted_key: master key parameter is missing 06:50:38 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='Cgroup_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000002900)=""/165, 0xa5}], 0x1, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:50:38 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:50:38 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x300000000000000) 06:50:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1095.771026] encrypted_key: master key parameter is missing 06:50:39 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x0, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:50:39 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup(r1) r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x6e) ptrace$cont(0x20, r0, 0x0, 0x0) 06:50:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:39 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:50:39 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x400000000000000) 06:50:39 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='Cgroup_id=', @ANYRESDEC=0x0]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r3, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r3, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:50:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:39 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) [ 1096.388093] encrypted_key: master key parameter 'user:' is invalid 06:50:39 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x3f00000000000000) 06:50:39 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:50:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1096.591515] encrypted_key: master key parameter 'user:' is invalid 06:50:39 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) [ 1096.765742] encrypted_key: master key parameter 'user:' is invalid 06:50:40 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x0, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:50:42 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) write$P9_RRENAMEAT(r1, &(0x7f0000000040)={0x7, 0x4b, 0x1}, 0x7) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchown(0xffffffffffffffff, 0x0, r3) setfsgid(r3) ptrace$setregs(0x13, r0, 0x0, &(0x7f0000000100)="1a5e370fd695f54f5883c158acd5dc49b0014327ba3be9a56626b96a9c06ca1d684b5ae318c2986407a90feb33324ca552da28296db7e0d0f9fd601c0bad69936918286b0f4ce371048e8da990fcfd4b7a5db74aef8173f14e9eaa5cee773b373ba9c1cd1b0f2ec45770eb00ea04e4bc7a1d25c55e0153b82b6505ba68ab19645cb4136d4f03f922e2b227ec13dc0abd7e8565e1572de8288e3ce22797aa490353e612a408dfcca4bf6f44407df56285fbbce1d5f17ff70ebb2cbefaa34991debf25413a20f8628a0bfec5f2d556b49b30117bb0") r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:50:42 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:50:42 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:50:42 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0xf6ffffff00000000) 06:50:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:use'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:42 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x0, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:50:42 executing program 3: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:50:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1099.449385] encrypted_key: keylen parameter is missing 06:50:42 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000040)={{0x1b, 0x3d, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)={{0x1b, 0x3d, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="66e43d2bc36a41d50363a12bb6b04ca623fd137f9072fb9752206a2fdc50fe4fec51f80aabc86b32d5e42445653a0307ab", @ANYRESHEX=r0, @ANYRESDEC=r3, @ANYRESDEC=0x0, @ANYBLOB="095400fffffff10500002645964497ef5ad667eb75b55522d972b462144b45b24b408b5c957a6aed0530ed11dcebe69aeefcf67a2cc9d9c6af6c37a726b1357c0c3883e5b921b737532c8ba400fa33334917c7d97887be76e5b383af55cf901802f64d92967704bceddf94ede6483bbcb1bc31c66b0827a3a44411fee25fdada0524318a0466a7afc3d83ccecfc1dcf03ca00c34f2ed1c61bf04da0f1c960c73d1b8c94a450e95eba703f32656365f6f267adcc64c5d604471898d020809b83b48b33e791a69fd35a90dd4efe9686b3cc859a3db483475332c00c7ef73197b99747f9d0d4df27de8bedcef4ba5dba6b8d9ff339a", @ANYBLOB="c30ccc2506ac37c8200cb9de6f16b5faf90af3f36c41247762a39e673bf33d3caaed1fd5f89e3ee94f175c4685fb701a9b71f0f7e733e803ffaf02920a986a8f2dc945"]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r4) write$P9_RFSYNC(r4, &(0x7f0000000100)={0x7, 0x33, 0x1}, 0x7) inotify_add_watch(r4, &(0x7f0000000080)='./file0\x00', 0x17000088) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r5, &(0x7f0000000380)=ANY=[@ANYBLOB="1b3d070700000000000000000000000000000000000000000000000000000000400000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006d7fd408000000000000000000000000c40400000000000000360bc0f3c0f57675237a0f4ab290ea66f23c50b16d9d1deeb6760cba6e7cd68c0c0f46310e623314cff05b9ed7e7ebce3202cbb9a7384f8b25d124e7764a72e9bea03c336e3aa29e78425c60a54fd6f0dd98cd230a6b80ef4a860eb993879d7a41f4e9028278e850894c614ca48816a377c922aae498"], 0x78) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x6, 0x0, @descriptor="09ccb4b3f48f65cb"}}) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r6, &(0x7f0000000040)={{0x1b, 0x3d, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) tee(r5, r6, 0xf0, 0x0) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:50:42 executing program 3: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:50:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:42 executing program 3: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) [ 1099.640533] encrypted_key: keylen parameter is missing [ 1099.723869] encrypted_key: master key parameter 'user' is invalid 06:50:45 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r1) ioctl$SNDRV_PCM_IOCTL_DRAIN(r1, 0x4144, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) process_vm_writev(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/43, 0x2b}], 0x1, &(0x7f00000015c0)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000100)=""/153, 0x99}, {&(0x7f00000002c0)=""/183, 0xb7}, {&(0x7f0000000380)=""/247, 0xf7}, {&(0x7f0000000480)=""/100, 0x64}, {&(0x7f0000001540)=""/93, 0x5d}], 0x6, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000000)) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:50:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:45 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:50:45 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:50:45 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r1, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, &(0x7f00000001c0)={{0x3, 0x0, @identifier="455716cff388eba6560811903ba74402"}}) ioctl$SIOCAX25CTLCON(r1, 0x89e8, &(0x7f0000000240)={@bcast, @default, @default, 0x5, 0x8, 0x1, [@default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:50:45 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) 06:50:45 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:50:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1102.426801] encrypted_key: master key parameter 'user' is invalid 06:50:45 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:50:45 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="18000000", @ANYRES16=r3, @ANYBLOB="00000000000000000000000000000000000041af1c8fdb9ad8bf514ec92f6d99f6ab772777013cc95bb80bea8e38a0ec0304b9464dbc2bf11c656954d45157cb337fb9a54461fd53f369"], 0x18}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x38, r3, 0x80, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x4fa}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x800}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x4947}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x48810}, 0x40) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="66643d448a67f1800d08689222ba8dca7174ba946123c8f6fc127f9d0306a9ad97bbff9d5f43dbe3dc0935b1c131063224f96afe8065e311ff855ae3acbf1611540d8a9f286ea0886e73939f5a45a3529d61e0c1ac2d44a5bb0c0bb9ddb1fe24cfe71f4e4c89b9e9663428723cc5bfabe9615a27c4", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:50:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:45 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) [ 1102.699538] encrypted_key: master key parameter 'user' is invalid [ 1102.810287] encrypted_key: master key parameter 'user:' is invalid 06:50:48 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x8020000000000000, 0x0) tkill(0x0, 0x3d) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$cont(0x20, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r2, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r2, 0xc028564e, &(0x7f0000000000)={0x3, 0x1, [0xe1, 0xfff, 0x1, 0x78cb5bd, 0x2, 0x8, 0x8, 0x3888]}) ioctl$KDMKTONE(r2, 0x4b30, 0x400) 06:50:48 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) 06:50:48 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:50:48 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x8000, 0x2d4) mkdirat(r0, &(0x7f0000000240)='./file0/file0\x00', 0x138) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r3, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', r3, &(0x7f0000000280)='./file0\x00') ioctl$SIOCX25CALLACCPTAPPRV(r2, 0x89e8) write$P9_RLINK(r2, &(0x7f00000001c0)={0x7, 0x47, 0x2}, 0x7) 06:50:48 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:50:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:48 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) [ 1105.479175] encrypted_key: master key parameter 'user:' is invalid 06:50:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:48 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000240)={0x8, 0x4df3, 0x0, 'queue1\x00', 0x1}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000040)={{0x1b, 0x3d, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)={{0x1b, 0x3d, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="666495d534f0d24241c4b2f1843d", @ANYRES32, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=r2, @ANYRESOCT]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) utimes(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)={{}, {r3, r4/1000+60000}}) r5 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r5) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r5, 0x84, 0xc, &(0x7f0000000340), &(0x7f0000000380)=0x4) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f00000001c0)={0xf9}, 0x1) bind$pptp(r0, &(0x7f0000000300)={0x18, 0x2, {0x0, @remote}}, 0x1e) open(&(0x7f0000000000)='./file0\x00', 0x80, 0x64) 06:50:48 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:50:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(0x0, &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 06:50:48 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d305230303030301f0030303030303230303034103030302c757365725f69643dc87fb49d42dc7a006b6327b50c3894ba79305d23662030e74928e8d8100ec00507188a5c2e31c6116020918d6ffa5b61d20289d1cb00870a1b3973c4625516964f770ae4cc996f598f860c70760eae456c8532a6b6c8d93e8c3296ac9879fc9d46a58f356836d6a43abf45f71dc4647f5360e796923e5d436bca148c1df1b22f6b82d38c0f", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) [ 1105.746395] encrypted_key: master key parameter 'user:' is invalid 06:50:48 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:50:49 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) 06:50:49 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r3) sendto$llc(r3, &(0x7f0000000000)="01760a20aef4481ca129f2b17a8281e2cf19dbedaad5ecfa11612bc01083a90b226dfd0bdaa7b050e867f48cd677a66b4b24403cff82a791b344ca5f566af843724becb78aa8884ad72d13", 0x4b, 0x0, &(0x7f0000000080)={0x1a, 0x30c, 0x6, 0x9, 0xff, 0x81, @multicast}, 0x10) 06:50:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(0x0, &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 06:50:49 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:50:49 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="1b3d0707000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000038000000000000b2230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d63b9f20acd4a5ff6c3220bf652e19579481cc6b6676935516969afd004337478a6703fed9183213c5201a66226a5464df469d61dfdb27d461c7da4a7a86a42a337b0e2231b9236b1a8c51b5880ef36db06eba501e2d15727f35154840382e6d70517aee0d3cd0d32b235800"/227], 0x78) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c671a70c437ad270e40ff26720600705f69643d", @ANYRESDEC=r1]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) socketpair(0x21, 0x4, 0x200, &(0x7f0000000100)={0xffffffffffffffff}) bind$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x401, @none, 0x20, 0x1}, 0xe) 06:50:49 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:50:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(0x0, &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 06:50:49 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:50:49 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') ioctl$KVM_GET_IRQCHIP(0xffffffffffffffff, 0xc208ae62, &(0x7f0000000380)={0x0, 0x0, @ioapic}) preadv(r1, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) write$FUSE_GETXATTR(r1, &(0x7f0000000080)={0x18, 0xfffffffffffffff7, 0x5, {0x4}}, 0x18) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:50:49 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, 0x0) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:50:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 06:50:49 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000040)={{0x1b, 0x3d, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000080)=0x1) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:50:50 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, 0x0, 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:50:52 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(r0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x20}, 0x5}, {0xa, 0xffff, 0x1, @ipv4={[], [], @loopback}}, r3}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @mcast2}, {0x2, 0x0, 0xac141424, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, r3}}, 0x48) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x4, r3, 0x30, 0x0, @in6={0xa, 0x4e20, 0x5aee, @remote, 0x40}}}, 0xa0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:50:52 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, 0x0) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:50:52 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:50:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 06:50:52 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_THP_DISABLE(0x29, 0x1) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:50:52 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, 0x0, 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:50:52 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup(r1) write$P9_RSETATTR(r2, &(0x7f0000000000)={0x7, 0x1b, 0x1}, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x6) ptrace$cont(0x20, r0, 0x0, 0x0) 06:50:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 06:50:52 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000040)={{0x1b, 0x3d, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)={{0x1b, 0x3d, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x100000, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYRESHEX=r1, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYRESHEX=r2]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:50:52 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, 0x0) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:50:52 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=']) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:50:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) 06:50:52 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=']) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:50:52 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="2f014295e39d53643d", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:50:52 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:50:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) 06:50:52 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=']) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:50:53 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, 0x0, 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:50:55 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r1, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) r2 = fcntl$getown(0xffffffffffffffff, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f00000002c0)={{0x8, 0x6, 0x1, 0x3, 'syz0\x00', 0x3}, 0x6, 0x30, 0x0, r2, 0x1, 0x8, 'syz0\x00', &(0x7f0000000000)=['$\x00'], 0x2, [], [0x20, 0x20, 0x0, 0x9]}) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:50:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) 06:50:55 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x4440, 0x140) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x7, r0, &(0x7f0000000240)="28f81f6033a6cb3cbf5e1c8711a32bacfe6b3ee758652d88525e92bd7a42a0a613abf8657a7153545f26d3a98c3f480babf9ff459f76ce38efd58032fa841d5784ed0f9e0d199e1ac48221fd45916c08f4f2b36835faec381a780d9b3efe2504f39b", 0x62, 0x17a1, 0x0, 0x2}, &(0x7f00000002c0)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d303030303030303030303030303832303030bbdbe66e302c917365725f69643d9c6ab54325543338027903bab82bde7f121002", @ANYRESDEC=0x0, @ANYBLOB="ac67726f75705f69643d", @ANYRES64=r1]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:50:55 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:50:55 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:50:55 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10005, 0x0) 06:50:55 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:50:55 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x300000000000000) 06:50:55 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r1) sendmsg$sock(r1, &(0x7f00000001c0)={&(0x7f0000000240)=@generic={0x10, "36e9dfcab3e8db29d19480694095ac0e17decfe15a719f0cd9c2eef437e9552e22f629992e6cc7dc065e6fa6be8daae266b325e0093d75bda3666d04885bc9898c1240f8f0c5baf48ddaac1d4205539dfdc93b69f27d6220f40270a9bb1ab116b0b8a37fb8c5871650d38d7d639e75b616b616f6f81982f8cf6c998f0748"}, 0x80, &(0x7f0000000640)=[{&(0x7f00000002c0)="6b3da84ccbce586f84b02eee500b005a198f82c02be010f19a2864f5ab4806ea0d44f4e52a5cadf8645b2f9ab9d637ec34bed2eb09348c35b427bb73eb7fe7d7e7c34720192a0762b6c78b90c5f5c0083c31bff417d0d3fdc3", 0x59}, {&(0x7f0000000340)="abe78ae980f4d601e0bd56c58ee0b4200a2df4d36309a9675bebfa9ecdf3016c4db0a2078ca6db0b1bb850af4a320148000f70f706b34e09c1ded7ab1a305a451a12db2d7ee99cdfb45b853bb7e76b934a9467e207aa9fe587d53b3fcab66ddf05d7b72035b536605a9851e3e3fd77b6d338b5fb230ef99f0c32fb2d015260ef3d78471b8fdfa90ba648284e9dba7f721acf7082b3d6efbafb8cee16ee13661b1ae60030b60759928aaac58a192b83472192325d7e83424b8342742e3da0c8f7085774673e575adcfd70e5335d7004edde67b04476a226d5d2d2f1e4a6c4e2fe0c3a99932a", 0xe5}, {&(0x7f0000000440)="88230c590b6a897f65cac73d366c7a4c0c721e823ad902e3f92041b27517713700aafbe23c561615489046fe01015bd83e68c087902c2c7250d6ae4b15c79fd42c7f448de57ded026acc4d2a3dfbe221776e7dbb51", 0x55}, {&(0x7f00000004c0)="e66a438a503943937252f0f648d991eddaa55f6dca89b9a8285447d89e663317d698a6d42075f9faa7d306a0f4a5ef8087b76062dbb14c043af423b3d2bfbf5aedbd1780ae0bea2371a1b3656e96fe6e071c482876017fb5e568361c85860fae9410f809b01f9ecbc15afb95d57bbd4982ce0ce03af47d1736f018c91274f40dd433d22a4e433e37d95dee917142f366f4d292de5abcb97bd1", 0x99}, {&(0x7f0000000580)="ef78221b9d970a30fc3c2a3c26a6606e47453a9815c350908b445add24f5bd9c6153b967caf224327bdfb9451b64e1a33369c753eef97a5b42f7d79c18119b960ba04cc25d4e7a5342f5e78635eb6025e3c0c6e64988c2e309e7b3a909b8b5f9b5a1f0d98251a434ed841bfc4b7fd13483dd0f558fa7737fbc102e5b64454fb3c12dbe3cd4648fe062a18b99667f1a", 0x8f}], 0x5, &(0x7f0000000080)=[@txtime={{0x18}}], 0x18}, 0x8010) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:50:55 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:50:55 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='Cgroup_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000002900)=""/165, 0xa5}], 0x1, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:50:56 executing program 0: r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x3f, 0x10000) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) setxattr$security_ima(&(0x7f0000000400)='./file0/file1\x00', &(0x7f0000000440)='security.ima\x00', &(0x7f0000000480)=@sha1={0x1, "84005ba5038e52448e9c75d2c64cf2fe3a3193da"}, 0x15, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f61643dd1b5ae3bd0607a2b9350e025dd1d19e16980fb7ea9e5c3bb6b712c5f4a405e9960f6577f49206f84b888c507000000a75030c9ed5939402eca1766da8273bb7df61a5a9e1f9095a708fc35a491a0e28895553abc73cebbb41a90ff2303dabc4b3c0bd1b912296f01d4064e775f3f05950d6b80e5894c8c4d34fcfee968846e09955b29985bbb6dd9ab03130fcb80feea7653450000", @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r5, 0x202002) keyctl$chown(0x4, r5, r3, r4) r6 = request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='/dev/fuse\x00', 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r5, &(0x7f00000001c0)='blacklist\x00', &(0x7f0000000300)=@chain={'key_or_keyring:', r6, ':chain\x00'}) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000380)='trusted.overlay.nlink\x00', &(0x7f00000003c0)={'L-', 0xfe0}, 0x16, 0x0) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r7, 0x202002) keyctl$chown(0x4, r7, 0x0, 0x0) r8 = add_key(&(0x7f0000000640)='dns_resolver\x00', &(0x7f0000000680)={'syz', 0x1}, &(0x7f00000006c0)="18e4e69166caf913ebd3491d766900e328af4b8abf372688df9fc634cffacc0763e1d8af074a03b00dcbc76aadedded6c930333cd15fc0503dd81c3172243b28140d9b3a65c8b5bbfdeb3a9520316a8804e6d4c9390cb0ea6ed424061bd9d8cfcbf54a9d8701de505737703b5947624f3ee06e643a9367da767a395f62f9692c4ceca37c106427db16d396ea40c9eb541fac3d5caac8d38dbac1374f4738b06e0026178ed8a0", 0xa6, r7) keyctl$KEYCTL_MOVE(0x1e, r5, 0x0, r8, 0x1) 06:50:58 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001080)=[{&(0x7f0000000000)="9440a3dfaa4476dd4a03ceb01b"}, {&(0x7f0000000040)="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"}], 0x5, 0xc) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x27) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 06:50:58 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:50:58 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:50:58 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd?', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:50:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:58 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10005, 0x0) 06:50:58 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:50:58 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="fd383d", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r3) ioctl$VIDIOC_ENUMAUDOUT(r3, 0xc0345642, &(0x7f00000001c0)={0x0, "127eaf2b1f1896f593c4147fe4d39b4b9f8540c489e3f52c608589b0ef9e86d6", 0x1}) preadv(r2, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) fanotify_mark(r1, 0x80, 0x1010, r2, &(0x7f0000000080)='./file1\x00') open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:50:58 executing program 1 (fault-call:5 fault-nth:0): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:50:58 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) [ 1115.911416] encrypted_key: master key parameter is missing 06:50:58 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000100)='./file0\x00', 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000040)={{0x1b, 0x3d, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) pkey_alloc(0x0, 0x2) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000040)={r0, 0x8, 0x71, 0x155}) write$nbd(r2, &(0x7f0000000300)={0x67446698, 0x1, 0x4, 0x1, 0x3, "6aabd5c283cd3d7c8af3988805beb1eb45530137d9457b50602668339a682b72386973506b9ca29e013c4dea0500bd0292cebcf66e744c16dda6a69e0f76a66029db15325c50098e97f49704d670353b8fbbf130e9abae603f4534fac8d8df8498db53d0d24d295ad89c73bf4e5a03699253a1266eb7f2727c64ac05deb4c16d79282b9fcdacf351f7a4f15dcba1efdeb125d1577bfc043102b905"}, 0xab) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0800000000000000f69caad81c060cfeb9f340787c443d", @ANYRESHEX=r3, @ANYBLOB="2c726f53746d7664653d30303030303030303030303030303230303034303030302cfcfffe8c6a097573", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3c) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r4, 0x0, 0x0) setpriority(0x1, r4, 0x2) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) [ 1115.965337] FAULT_INJECTION: forcing a failure. [ 1115.965337] name failslab, interval 1, probability 0, space 0, times 0 [ 1115.992119] CPU: 0 PID: 8211 Comm: syz-executor.1 Not tainted 4.19.133-syzkaller #0 [ 1115.999947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1116.009311] Call Trace: [ 1116.011911] dump_stack+0x1fc/0x2fe [ 1116.015554] should_fail.cold+0xa/0x14 [ 1116.019454] ? setup_fault_attr+0x200/0x200 [ 1116.023782] ? lock_acquire+0x170/0x3c0 [ 1116.027769] __should_failslab+0x115/0x180 [ 1116.032012] should_failslab+0x5/0xf [ 1116.035733] __kmalloc_track_caller+0x2a6/0x3c0 [ 1116.040414] ? strndup_user+0x70/0x120 [ 1116.044308] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1116.049079] memdup_user+0x22/0xb0 [ 1116.052623] strndup_user+0x70/0x120 [ 1116.056352] __se_sys_add_key+0x13c/0x430 [ 1116.060506] ? keyring_restriction_gc+0x1b0/0x1b0 [ 1116.065362] ? do_syscall_64+0x4f/0x620 [ 1116.069343] do_syscall_64+0xf9/0x620 [ 1116.073155] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1116.078349] RIP: 0033:0x45c1d9 [ 1116.081543] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1116.100447] RSP: 002b:00007f5a74fd5c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1116.108160] RAX: ffffffffffffffda RBX: 0000000000000740 RCX: 000000000045c1d9 06:50:59 executing program 1 (fault-call:5 fault-nth:1): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1116.115435] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000140 [ 1116.122710] RBP: 00007f5a74fd5ca0 R08: fffffffffffffffe R09: 0000000000000000 [ 1116.129983] R10: 00000000000000ca R11: 0000000000000246 R12: 0000000000000000 [ 1116.137269] R13: 00007fff5b639f9f R14: 00007f5a74fd69c0 R15: 000000000078bf0c [ 1116.208633] FAULT_INJECTION: forcing a failure. [ 1116.208633] name failslab, interval 1, probability 0, space 0, times 0 [ 1116.228276] CPU: 0 PID: 8223 Comm: syz-executor.1 Not tainted 4.19.133-syzkaller #0 [ 1116.236096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1116.245478] Call Trace: [ 1116.248083] dump_stack+0x1fc/0x2fe [ 1116.251728] should_fail.cold+0xa/0x14 [ 1116.255627] ? setup_fault_attr+0x200/0x200 [ 1116.259956] ? lock_acquire+0x170/0x3c0 [ 1116.263942] __should_failslab+0x115/0x180 [ 1116.268172] should_failslab+0x5/0xf [ 1116.271866] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1116.276953] __kmalloc_node+0x38/0x70 [ 1116.280733] kvmalloc_node+0x61/0xf0 [ 1116.284427] __se_sys_add_key+0x21f/0x430 [ 1116.288553] ? keyring_restriction_gc+0x1b0/0x1b0 [ 1116.293377] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1116.298717] ? trace_hardirqs_off_caller+0x69/0x210 [ 1116.303715] ? do_syscall_64+0x21/0x620 [ 1116.307732] do_syscall_64+0xf9/0x620 [ 1116.311511] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1116.316688] RIP: 0033:0x45c1d9 [ 1116.319863] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1116.338791] RSP: 002b:00007f5a74fd5c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1116.346482] RAX: ffffffffffffffda RBX: 0000000000000740 RCX: 000000000045c1d9 [ 1116.353731] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000140 [ 1116.360979] RBP: 00007f5a74fd5ca0 R08: fffffffffffffffe R09: 0000000000000000 [ 1116.368227] R10: 00000000000000ca R11: 0000000000000246 R12: 0000000000000001 [ 1116.375477] R13: 00007fff5b639f9f R14: 00007f5a74fd69c0 R15: 000000000078bf0c 06:51:01 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup(r1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000040)={[], 0x2, 0x7ff, 0x7, 0x8, 0x1}) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000000)=0x80000001) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x1f, r0, 0x20000000000, 0x2) 06:51:01 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:51:01 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:51:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)={0x18, r2, 0x1, 0x0, 0x0, {0x8}, [@TIPC_NLA_LINK={0x4}]}, 0x18}}, 0x0) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xc0008010}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x15c, r2, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0xbc, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6a}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}]}, @TIPC_NLA_PUBL={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x157680}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x80000001}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x400}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x20}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xfffffffd}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xffffff20}]}, @TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x2}]}, @TIPC_NLA_BEARER={0x1c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'bridge0\x00'}}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8001}]}, @TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xff}]}]}, 0x15c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:51:01 executing program 1 (fault-call:5 fault-nth:2): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:51:01 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10005, 0x0) 06:51:01 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:51:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="3d06817e8f3dfde9f01696bb072c74ea007fad2c9d000089612ad0c107e582e1aadd0157c10bc1f4b4672b6b9d6bb0d9893cbb8af5dd7d9789b6756e0fa3c4ddffb664edaec1feaa019ab181a14ae7065b3da59a6f75d9c2bd8f655806b0e229d37d91a7084ac8bdc73ada9220da48d1a3876c9888d98fad7bd5235d85a752bff6797b1cac57c0caa88670227d32d5ad88c2cec8bb328ca45e50fbd6428cebd9c87c4bc18ca9e60fad597523efb632508a79a997df1cc9aec100ca37238bb5eaff4313d02f587fc3eaeaddbc550119ae9b48fee4426dfb00", @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:51:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x100) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r1) ioctl$NBD_SET_FLAGS(r1, 0xab0a, 0x1) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x1}, 0x20) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) [ 1118.968037] FAULT_INJECTION: forcing a failure. [ 1118.968037] name failslab, interval 1, probability 0, space 0, times 0 06:51:01 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) [ 1119.050611] CPU: 1 PID: 8250 Comm: syz-executor.1 Not tainted 4.19.133-syzkaller #0 [ 1119.058444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1119.067799] Call Trace: [ 1119.070405] dump_stack+0x1fc/0x2fe [ 1119.074050] should_fail.cold+0xa/0x14 [ 1119.077950] ? setup_fault_attr+0x200/0x200 [ 1119.082282] ? lock_acquire+0x170/0x3c0 [ 1119.086384] __should_failslab+0x115/0x180 [ 1119.090629] should_failslab+0x5/0xf [ 1119.094351] kmem_cache_alloc+0x277/0x370 [ 1119.098522] prepare_creds+0x39/0x510 [ 1119.102332] lookup_user_key+0x3b2/0x11f0 [ 1119.106494] ? join_session_keyring+0x340/0x340 [ 1119.111179] ? key_validate+0x100/0x100 [ 1119.115172] ? __might_fault+0x192/0x1d0 [ 1119.119248] __se_sys_add_key+0x286/0x430 [ 1119.123404] ? keyring_restriction_gc+0x1b0/0x1b0 [ 1119.128258] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1119.133634] ? trace_hardirqs_off_caller+0x69/0x210 [ 1119.138659] ? do_syscall_64+0x21/0x620 [ 1119.142656] do_syscall_64+0xf9/0x620 06:51:02 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) [ 1119.146471] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1119.151670] RIP: 0033:0x45c1d9 [ 1119.154870] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1119.173775] RSP: 002b:00007f5a74fb4c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1119.181504] RAX: ffffffffffffffda RBX: 0000000000000740 RCX: 000000000045c1d9 [ 1119.188780] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000140 06:51:02 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 1119.196058] RBP: 00007f5a74fb4ca0 R08: fffffffffffffffe R09: 0000000000000000 [ 1119.203331] R10: 00000000000000ca R11: 0000000000000246 R12: 0000000000000002 [ 1119.210611] R13: 00007fff5b639f9f R14: 00007f5a74fb59c0 R15: 000000000078bfac 06:51:04 executing program 1 (fault-call:5 fault-nth:3): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:51:04 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:51:04 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r0) ioctl$SNDRV_PCM_IOCTL_STATUS64(r0, 0x80984120, &(0x7f0000000240)) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="1b3d0707000003000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004e19a19a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000061cae8d69ee234298270a2fa8ed694297f34ea9325c4c75ad6eb5c87d0c5e16fd2b6bce704ef9d4c2aed25bb7b6dda1c28da28c6aa607ee77c42a5c8cbf85c7f211255c59b50226d376b7082"], 0x440) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=r2, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r3 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000140)={r6}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0)={r6, 0xffff}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000080)={r6, 0xfb9d, 0x1, [0x4]}, &(0x7f00000001c0)=0xa) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:51:04 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:51:04 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) 06:51:04 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:51:04 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchown(r1, 0x0, r3) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r6 = socket(0x10, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r4, 0x8982, &(0x7f0000000800)={0x1, 'vlan0\x00'}) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r7, r5, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x200, 0x7, &(0x7f0000000640)=[{&(0x7f0000000240)="a243fafed62f6ad5386470d0f64904796de259bc1291abbd9902737c475ba14b4857d8130c87d076c31d1abeb44612712bc8a90977fa6bc23efb9e6bb023e9daae0add0755e59dce7bfa0f0b6d5885625383200ec55d35d53817ddab85481a35b9543f5620302e79c1824e958fcc9cd5d4840831ecbcf065bd9f47c910c3c5a2497debb9e46801b134d0d503a8f2a47bfdd6133f0f140079d9b8adb26dc532ebb9e48b", 0xa3, 0x3}, {&(0x7f0000000300)="306b185c28f678000d8de9cbbaf13a2cdf8da225626b08bc71cf5aeea14680e86bc73256d0", 0x25, 0xe0a}, {&(0x7f0000000340)="3aa199d9f0a6c0a864ed0fcb554fc36218216977ae36351654dfcd2ed01434c01e0b56c8584c6ab401231ad167dc534962fb3844e7c0f25672559895dcadee4eb73bc6df342739a1fbd039bd8069ed1de13da53ab3cbfffa05714102eac20105a7764fcf3a070c391e9972e5c3e5420acffae3a62fd5c283260af8226005a574a3a8b5798e46c64ce8642a63e195605a387cc20f377234e3436eb175f33d1db39db80e2d7597f09d15de621f0e654ca055a0fa2b2ddae9ba8f9209468ab6aa9b7cf6e0083599", 0xc6, 0x80000001}, {&(0x7f0000000440)="18b31c9c00c120ea15dbebf21696bb2c6242aa01725f81b71e92a9bc3757e0923a5922046d8e79def844e1deb70a3c45858c68d15d091b2b223daac0c6c23c0057e8cbb0151bb87e20455ed40e2c20379901fa5592f91fd930a52a73f6ae04fec7e6e3d3b19e44a9f184c6058aa31d983a4d5198856ed4e6add1df30b5beb7d6b4f817baad5c76cd016df32db9de93bfb2b9315f12721e3c82fdcd8c232f425a221d39bf3ec5854efff0638b8f4bc87b77f90b8ee67bd377057d25e0288c363e0ae5749efe7e08b4a9a6a477bc0e9e2f63cdb5c41e", 0xd5, 0x9}, {&(0x7f0000000540)="394569013ace5c6d5540e7c2b8471e565c8bd0a4483fc0511d140889f49896e8efe35831a5aa8863398e98ecda58cc27d0ca2472ecf55ea2e51bf7d93f54310b23450f7caeb0d839cd0f35563c26c4957827bc9e31822233c73330c35ce4fec646b8bb70155a8f11c402851902357db9d5c73c15b8049b39764707", 0x7b, 0xffff}, {&(0x7f00000005c0)="5cc96c13b2bbf097da3d33133fb19f3e2ba77486f8130a4d66635421f42be99d80a61484ef551b6121e72aa9", 0x2c, 0x994e}, {&(0x7f0000000600)="1f31ef7dbf8208a2f5d7d422a80d49a7359061cafb5d376303792e73", 0x1c, 0x101}], 0x5000, &(0x7f0000000700)={[{@gid={'gid', 0x3d, r3}}, {@iocharset={'iocharset', 0x3d, 'cp949'}}, {@iocharset={'iocharset', 0x3d, 'cp852'}}, {@quiet='quiet'}, {@quiet='quiet'}, {@codepage={'codepage', 0x3d, 'koi8-u'}}, {@umask={'umask', 0x3d, 0x1}}, {@part={'part', 0x3d, 0x6}}, {@file_umask={'file_umask', 0x3d, 0x6}}, {@session={'session', 0x3d, 0x3}}], [{@uid_eq={'uid', 0x3d, r5}}]}) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) [ 1121.968375] FAULT_INJECTION: forcing a failure. [ 1121.968375] name failslab, interval 1, probability 0, space 0, times 0 [ 1122.031110] CPU: 0 PID: 8292 Comm: syz-executor.1 Not tainted 4.19.133-syzkaller #0 [ 1122.038944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1122.048305] Call Trace: [ 1122.050907] dump_stack+0x1fc/0x2fe [ 1122.054550] should_fail.cold+0xa/0x14 [ 1122.058446] ? setup_fault_attr+0x200/0x200 [ 1122.062776] ? lock_acquire+0x170/0x3c0 [ 1122.066765] __should_failslab+0x115/0x180 [ 1122.071043] should_failslab+0x5/0xf [ 1122.074758] __kmalloc_track_caller+0x2a6/0x3c0 [ 1122.079427] ? selinux_cred_prepare+0x44/0xa0 [ 1122.083929] kmemdup+0x23/0x50 [ 1122.087122] selinux_cred_prepare+0x44/0xa0 [ 1122.091444] security_prepare_creds+0x50/0xb0 [ 1122.095950] prepare_creds+0x32d/0x510 [ 1122.099843] lookup_user_key+0x3b2/0x11f0 [ 1122.104004] ? join_session_keyring+0x340/0x340 [ 1122.108681] ? key_validate+0x100/0x100 [ 1122.112667] ? __might_fault+0x192/0x1d0 [ 1122.116737] __se_sys_add_key+0x286/0x430 [ 1122.120897] ? keyring_restriction_gc+0x1b0/0x1b0 [ 1122.125767] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1122.131136] ? trace_hardirqs_off_caller+0x69/0x210 [ 1122.136157] ? do_syscall_64+0x21/0x620 [ 1122.140139] do_syscall_64+0xf9/0x620 [ 1122.143949] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1122.149138] RIP: 0033:0x45c1d9 [ 1122.152331] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1122.171232] RSP: 002b:00007f5a74fd5c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 06:51:04 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:51:05 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:51:05 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:51:05 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000140)={r5}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0)={r5, 0xffff}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000000)={r5, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x13}}}, 0xe1, 0x4, 0x1ff, 0x9, 0x54, 0x3, 0xd6}, &(0x7f0000000100)=0x9c) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r6, 0x4}, &(0x7f0000000180)=0x8) ptrace$cont(0x20, 0x0, 0x0, 0x6) [ 1122.178942] RAX: ffffffffffffffda RBX: 0000000000000740 RCX: 000000000045c1d9 [ 1122.186219] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000140 [ 1122.193492] RBP: 00007f5a74fd5ca0 R08: fffffffffffffffe R09: 0000000000000000 [ 1122.200760] R10: 00000000000000ca R11: 0000000000000246 R12: 0000000000000003 [ 1122.208033] R13: 00007fff5b639f9f R14: 00007f5a74fd69c0 R15: 000000000078bf0c 06:51:05 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:51:05 executing program 1 (fault-call:5 fault-nth:4): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:51:05 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:51:05 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:51:05 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 1122.487403] FAULT_INJECTION: forcing a failure. [ 1122.487403] name failslab, interval 1, probability 0, space 0, times 0 [ 1122.545828] CPU: 1 PID: 8340 Comm: syz-executor.1 Not tainted 4.19.133-syzkaller #0 [ 1122.553660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1122.563018] Call Trace: [ 1122.565624] dump_stack+0x1fc/0x2fe [ 1122.569264] should_fail.cold+0xa/0x14 [ 1122.573158] ? setup_fault_attr+0x200/0x200 [ 1122.577484] ? lock_acquire+0x170/0x3c0 [ 1122.581471] __should_failslab+0x115/0x180 [ 1122.585711] should_failslab+0x5/0xf [ 1122.589428] kmem_cache_alloc+0x277/0x370 [ 1122.593581] key_alloc+0x3cf/0x1110 [ 1122.597217] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1122.602257] ? key_user_lookup+0x4e0/0x4e0 [ 1122.606494] ? memcpy+0x35/0x50 [ 1122.609778] ? kmemdup+0x43/0x50 [ 1122.613154] keyring_alloc+0x42/0xb0 [ 1122.616879] lookup_user_key+0xbf3/0x11f0 [ 1122.621041] ? join_session_keyring+0x340/0x340 [ 1122.625715] ? key_validate+0x100/0x100 [ 1122.629701] ? __might_fault+0x192/0x1d0 [ 1122.633771] __se_sys_add_key+0x286/0x430 [ 1122.637921] ? keyring_restriction_gc+0x1b0/0x1b0 [ 1122.642782] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1122.648152] ? trace_hardirqs_off_caller+0x69/0x210 [ 1122.653178] ? do_syscall_64+0x21/0x620 [ 1122.657159] do_syscall_64+0xf9/0x620 [ 1122.660972] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1122.666162] RIP: 0033:0x45c1d9 [ 1122.669358] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1122.688256] RSP: 002b:00007f5a74fd5c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1122.695969] RAX: ffffffffffffffda RBX: 0000000000000740 RCX: 000000000045c1d9 [ 1122.703240] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000140 [ 1122.710511] RBP: 00007f5a74fd5ca0 R08: fffffffffffffffe R09: 0000000000000000 [ 1122.717872] R10: 00000000000000ca R11: 0000000000000246 R12: 0000000000000004 [ 1122.725146] R13: 00007fff5b639f9f R14: 00007f5a74fd69c0 R15: 000000000078bf0c 06:51:06 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) 06:51:06 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:51:06 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:51:06 executing program 1 (fault-call:5 fault-nth:5): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:51:06 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) [ 1123.366954] FAULT_INJECTION: forcing a failure. [ 1123.366954] name failslab, interval 1, probability 0, space 0, times 0 [ 1123.396945] CPU: 0 PID: 8362 Comm: syz-executor.1 Not tainted 4.19.133-syzkaller #0 [ 1123.404774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1123.414131] Call Trace: [ 1123.416727] dump_stack+0x1fc/0x2fe [ 1123.420368] should_fail.cold+0xa/0x14 [ 1123.424271] ? setup_fault_attr+0x200/0x200 [ 1123.428600] ? lock_acquire+0x170/0x3c0 [ 1123.432587] __should_failslab+0x115/0x180 [ 1123.436827] should_failslab+0x5/0xf [ 1123.440543] __kmalloc_track_caller+0x2a6/0x3c0 [ 1123.445213] ? key_alloc+0x426/0x1110 [ 1123.449021] kmemdup+0x23/0x50 [ 1123.452214] key_alloc+0x426/0x1110 [ 1123.455850] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1123.460877] ? key_user_lookup+0x4e0/0x4e0 [ 1123.465117] ? memcpy+0x35/0x50 [ 1123.468408] ? kmemdup+0x43/0x50 [ 1123.471780] keyring_alloc+0x42/0xb0 [ 1123.475500] lookup_user_key+0xbf3/0x11f0 [ 1123.479661] ? join_session_keyring+0x340/0x340 [ 1123.484336] ? key_validate+0x100/0x100 [ 1123.488327] ? __might_fault+0x192/0x1d0 [ 1123.492401] __se_sys_add_key+0x286/0x430 [ 1123.496555] ? keyring_restriction_gc+0x1b0/0x1b0 [ 1123.501412] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1123.506783] ? trace_hardirqs_off_caller+0x69/0x210 [ 1123.511801] ? do_syscall_64+0x21/0x620 [ 1123.515780] do_syscall_64+0xf9/0x620 [ 1123.519589] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1123.524779] RIP: 0033:0x45c1d9 [ 1123.527973] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1123.546874] RSP: 002b:00007f5a74fd5c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1123.554588] RAX: ffffffffffffffda RBX: 0000000000000740 RCX: 000000000045c1d9 06:51:06 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 1123.561965] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000140 [ 1123.569235] RBP: 00007f5a74fd5ca0 R08: fffffffffffffffe R09: 0000000000000000 [ 1123.576506] R10: 00000000000000ca R11: 0000000000000246 R12: 0000000000000005 [ 1123.583777] R13: 00007fff5b639f9f R14: 00007f5a74fd69c0 R15: 000000000078bf0c 06:51:08 executing program 2: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000000)=@routing={0x0, 0x2, 0x1, 0x1, 0x0, [@private2]}, 0x18) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 06:51:08 executing program 1 (fault-call:5 fault-nth:6): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:51:08 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:51:08 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:51:08 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r1) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_REMOVEDEF(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x4c, r2, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x6}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @dev={0xfe, 0x80, [], 0x3f}}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @rand_addr=0x64010102}]}, 0x4c}}, 0x140) sendmsg$NLBL_MGMT_C_VERSION(r1, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x80, r2, 0x2, 0x70bd2c, 0x25dfdbfd, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast2}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @rand_addr=0x64010101}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @private1={0xfc, 0x1, [], 0x1}}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @rand_addr=0x64010100}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @remote}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0xffffffffffffffff}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @local}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}]}, 0x80}, 0x1, 0x0, 0x0, 0x4040880}, 0x1) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000300)={{0xffffffffffffffff, 0x0, 0x17, 0x3, 0x8}}) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:51:08 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) 06:51:08 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) [ 1125.323701] FAULT_INJECTION: forcing a failure. [ 1125.323701] name failslab, interval 1, probability 0, space 0, times 0 06:51:08 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="1b3d0000000000000000000000000000000000000000400000000000000000000000000000000000000000003800"/110], 0x78) r2 = dup(r1) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f0000000080)={0x5, 0x1, 0x1}) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="9c668bcb37386216c5b6f6b388f3eb71cae2001a091289", @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) [ 1125.364309] CPU: 1 PID: 8388 Comm: syz-executor.1 Not tainted 4.19.133-syzkaller #0 [ 1125.372225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1125.381593] Call Trace: [ 1125.384192] dump_stack+0x1fc/0x2fe [ 1125.387837] should_fail.cold+0xa/0x14 [ 1125.391732] ? setup_fault_attr+0x200/0x200 [ 1125.396061] ? lock_acquire+0x170/0x3c0 [ 1125.400048] __should_failslab+0x115/0x180 [ 1125.404291] should_failslab+0x5/0xf [ 1125.408014] kmem_cache_alloc_trace+0x284/0x380 06:51:08 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000053c27bc3376003639405cb4aef12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bfd983f79e65199615607a4ebe404180bab762ccdfe6ad0676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x14c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x11c, 0x2, [@TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14, 0x1, {0x0, 0x0, 0x7ff, 0x1a}}]}}]}, 0x14c}}, 0x0) sendmsg$NL80211_CMD_START_AP(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000f00)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="080029bd7000ffdbdf250f000000fe05b200dd994910b53107129bc4042357b459ee9db38be56bc4ca5e8ab7ad9e80a54031242eb66c0121bb8e050abbe7c76c6eb4a6e31ed2eb7d3ce8c4dc7c2ad61796b6498e4cb8a1b83d84168f8b80913d6a289fbf0b2e552f5b56cda6e0e54843bfdb03489542e7bc3a60ee4b277aa14f2a00703ca1d6d1d3190b7a7d921cb91084edead1c7f54c4c96bbdc1ce10a7d0779df98fb2894236402f738a4b53344dc506ac126c07af5bb3619721679e71d428a71729d8d646b8bad25924806d66dafec936696462de04863c3289e86f1b4db1fefcd33de2c8037d3e5c8d12de2f1c057924e795e849768f1f9c76b96b4044e3ef2fc0f6f080ce3dce93133341cca8f4688d7c40d5414207344e3a26457782c480b23760b803c9076082171b3e17f5872b1c96f56a6f64fc3fff59d9bd8af9e8eec0a4f377970488e28cbc17e52c6689ca49a3b8f7b193d47b430272d1f32bf026231bd99a32ee949497da3bc8a992029cba655e0c859f33ded83cf093936c5a8c08f69e84cb02503e0a66601ac51065582ddc7f7748d5f55e7dabc9fc05d2b220e0892e0fc1420efa8874f1809b0fcef0dea262a1fc0898afeede0bf6c001e24b3e7fb254f2244b1b5bf22e5626e0c8fc9cb54c432948d22149e77f1ec640ab8815f38faa653f65a6a3515cf72f62bfdefd978deffe549508e3dc9382a3a9b0f6dbf89c0f261cd32a9e3252d21c6a1b1e9aec98ef2caee52355dc10c3feb346a5c411ba01ec904da66980224c3767b55f36644673ef48fd476eeaa9899d4408f170e51166a3cc7d66d8c78c34f0f1420a7134017ffa0877c928289711cee977408b4ef2a79e0736ddbe0888a8ac79670e0fc7bcd4ed536fce40d81c6143ff20ec77f313a4c8c2351c7a4306e89de76f7cdee45d5ea6e6bb309eb614ec819bfbafc65fb99e3f2c9471ac356e775d8f4e16c9d544b81b552a5053812cfaa461a248fccf555804e1cdf57a4cec507afc0fa28fb7c3e0d0c5da4a000e69d86b1990cff056c2a9506ae989c913093aafce9f8a353272d47f3eab2378716204c796f0b95ea010d0263e8408933f3fc7c078b06d0948003b6ae97e7a4bf5d0d4a64501324873b2df97d7814e47e63977aefd7c7d1f3884981672dc803051ef3d99f956a23274470e775c8759d481b8d8a5a2cd3dd906dd6add32ec19dd8222dc79e4e071db6834824e37d70aec5b6a63cab341f4bcdc1433f9a54b7517e45e002b70fa2935707fc09de4c3e1d56c063466cb1a3d736d5d8309c5023476540091d286d63021c25bf4632fd937ecb6ab41531b5635537f476b321397e7741f0761934db56132936f8796bff9b22a9f59d69cb70e5cbe4adbeae738c096327ad08fccd58808991e4c9ee32103e4b070293ee8c061beac7fde1b8f55b95725930f1f0d61ff8003533234268e2923986a020d049697cf5bc1421ce8beee62e69f25ffd9b2b3eedccbacf26fa604da7c7a4bf7c57f41ade784b6dc286a08db25b7050fc84a7592709ed2f9c77c198fd18d490e9059d85439b06435631c557b3668046c726699992665160377b05d7a4c30544f3694f37b5e74576131335b3ce6fd2f69170159161676de00d4374bb4f53a309577d0d0308d7be45f099b3c22cc8ef5a3787fbc9b2284d3f15f772bdafbf288f18324815774234255fcdaf8f15083c87a2aca6be1744626e57268f155f00cc7b3dafa4bb538ff784ceaf67e3a9a47009dc5bd93765fc1ef94bd2c554ae939537e773c5256fcf67cf3759e6192aad56cbadae470381e560e0d3823c7558c940a5c9e4b78b955580b5d9950ee8cb4c564a67eb6df949eb119570eb6b468bfd2ff90ebd95543a690ac7db839f004d8e652b701663f41f4aa3e173701f3d1ee3ee1b4de67c4aac4e3735228629f81f1438210a5810336f45a808a73f714e8aa662fc4d522c3a2e126a070fcf63a99701d150a8447c73bff1153ef48c28193131074ce56938e684eab0ee483b0b77c06e477ca8ece8302a4c48a6bbb90f500b48557ab4635ad85920fefa1243b81095d2edf02e673966ccfb8b5908dd3e5d55ccae7832d7ccf28bd988a108acdee094a5e1ce334d5238125b8b00631aee853a6907b6758effb16e3ad54f959bf60db9ee9db25f55d6c742958ead0134ec65e494610000080035000400000008000300", @ANYRES32=0x0, @ANYBLOB="0400460008000300", @ANYRES32=r1, @ANYBLOB="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"], 0xb24}}, 0x40008c4) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r5, &(0x7f0000000040)={{0x1b, 0x3d, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) ioctl$VT_RELDISP(r5, 0x5605) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1125.412705] selinux_key_alloc+0x46/0x1a0 [ 1125.416867] security_key_alloc+0x50/0xb0 [ 1125.421027] key_alloc+0x7a0/0x1110 [ 1125.424678] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1125.429709] ? key_user_lookup+0x4e0/0x4e0 [ 1125.433949] ? memcpy+0x35/0x50 [ 1125.437236] ? kmemdup+0x43/0x50 [ 1125.440612] keyring_alloc+0x42/0xb0 [ 1125.444346] lookup_user_key+0xbf3/0x11f0 [ 1125.448506] ? join_session_keyring+0x340/0x340 [ 1125.453182] ? key_validate+0x100/0x100 [ 1125.457184] ? __might_fault+0x192/0x1d0 06:51:08 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) [ 1125.461260] __se_sys_add_key+0x286/0x430 [ 1125.465416] ? keyring_restriction_gc+0x1b0/0x1b0 [ 1125.470275] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1125.475649] ? trace_hardirqs_off_caller+0x69/0x210 [ 1125.480680] ? do_syscall_64+0x21/0x620 [ 1125.484669] do_syscall_64+0xf9/0x620 [ 1125.488485] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1125.493685] RIP: 0033:0x45c1d9 06:51:08 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:51:08 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) [ 1125.496882] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1125.515786] RSP: 002b:00007f5a74fd5c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1125.523503] RAX: ffffffffffffffda RBX: 0000000000000740 RCX: 000000000045c1d9 [ 1125.530778] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000140 [ 1125.538050] RBP: 00007f5a74fd5ca0 R08: fffffffffffffffe R09: 0000000000000000 [ 1125.545325] R10: 00000000000000ca R11: 0000000000000246 R12: 0000000000000006 [ 1125.552598] R13: 00007fff5b639f9f R14: 00007f5a74fd69c0 R15: 000000000078bf0c 06:51:08 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:51:08 executing program 1 (fault-call:5 fault-nth:7): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:51:08 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, 0x0, 0x0) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:51:08 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:51:08 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, 0x0, 0x0) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 1125.798352] FAULT_INJECTION: forcing a failure. [ 1125.798352] name failslab, interval 1, probability 0, space 0, times 0 [ 1125.841787] CPU: 1 PID: 8439 Comm: syz-executor.1 Not tainted 4.19.133-syzkaller #0 [ 1125.849616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1125.858977] Call Trace: [ 1125.861581] dump_stack+0x1fc/0x2fe [ 1125.865224] should_fail.cold+0xa/0x14 [ 1125.869122] ? setup_fault_attr+0x200/0x200 [ 1125.873536] ? lock_acquire+0x170/0x3c0 [ 1125.877522] __should_failslab+0x115/0x180 [ 1125.881766] should_failslab+0x5/0xf [ 1125.885483] kmem_cache_alloc_trace+0x284/0x380 [ 1125.890161] assoc_array_insert+0xde/0x2aa0 [ 1125.894491] ? mark_held_locks+0xf0/0xf0 [ 1125.898558] ? avc_has_perm_noaudit+0x390/0x390 [ 1125.903236] ? key_instantiate_and_link+0x318/0x420 [ 1125.908256] ? key_alloc+0x940/0x1110 [ 1125.912062] ? __key_instantiate_and_link+0x3b0/0x3b0 [ 1125.917253] ? assoc_array_cancel_edit+0x90/0x90 [ 1125.922013] ? lock_acquire+0x170/0x3c0 [ 1125.925988] ? __key_link_begin+0x97/0x2f0 [ 1125.930229] __key_link_begin+0x124/0x2f0 [ 1125.934385] key_create_or_update+0x42d/0xb90 [ 1125.938891] ? key_alloc+0x1110/0x1110 [ 1125.942803] ? __might_fault+0x192/0x1d0 [ 1125.946872] __se_sys_add_key+0x2c8/0x430 [ 1125.951022] ? keyring_restriction_gc+0x1b0/0x1b0 [ 1125.955872] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1125.961241] ? trace_hardirqs_off_caller+0x69/0x210 [ 1125.966261] ? do_syscall_64+0x21/0x620 [ 1125.970241] do_syscall_64+0xf9/0x620 [ 1125.974049] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1125.979247] RIP: 0033:0x45c1d9 [ 1125.982448] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1126.001467] RSP: 002b:00007f5a74fd5c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1126.009178] RAX: ffffffffffffffda RBX: 0000000000000740 RCX: 000000000045c1d9 [ 1126.016454] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000140 [ 1126.023734] RBP: 00007f5a74fd5ca0 R08: fffffffffffffffe R09: 0000000000000000 [ 1126.030999] R10: 00000000000000ca R11: 0000000000000246 R12: 0000000000000007 [ 1126.038269] R13: 00007fff5b639f9f R14: 00007f5a74fd69c0 R15: 000000000078bf0c 06:51:09 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 06:51:09 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:51:09 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, 0x0, 0x0) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:51:11 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r2) sendmsg$NLBL_UNLABEL_C_STATICLIST(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f0000000240)={0x78, 0x0, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private1={0xfc, 0x1, [], 0x1}}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'bridge0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth0_to_hsr\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth0_virt_wifi\x00'}]}, 0x78}, 0x1, 0x0, 0x0, 0x8c0}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000040)={{0x1b, 0x3d, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r1, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c75705f69643d910432670c7f72cafd30845b71ca4c964efc9df36b6b37885cc29bebcf0496a71a51919188bf979d44b5a50cd6e13bff5d8732b3ca6c754f62aad67b8546c4a58beeb4a713e89c78c20b0432b9719b16ebeb54ec903b9942591cdf723084862145ca18b7864cb55236a9acc9c7f11e618cfb03e4ec3e5c0ba1901919658c2c47bb81a6d905c70988a614dae1bf7356434ab40d5300808073c2d3d9dcfd0adc6b21213019a2d7809542a60a30f9a54cb2c37477019ddb354e13315b7db5cf4031896a5d1de3de061cc9c8b3818762e0219ee7f1815c68b386ee390392590f0c5e4f95c0873f7d68f92b", @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000001c0)={'ip6_vti0\x00', &(0x7f0000000140)={'syztnl2\x00', 0x0, 0x29, 0x0, 0x4, 0x1ff, 0x57, @mcast1, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, 0x20, 0x6e3, 0x8}}) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="50000000bf8365401a3b941c3db291961b1614112b560f7dffce9743eb9bf15b41af63872eb9c66224c60a8948c27c60c5d634a50720f78d934c91ef8574142fe595968f52e4517ac0bff2aa8cd3e9debf2d9c82a8d239c6dedaf62eab114db18503eb480433aa0be42d07453562fc3e697814a9edb1880e915e93ecdae30926b6867533dde6cc79233d7394951d2699e0fc5bc370c85e", @ANYRES16, @ANYBLOB="20002abd7000ffdbdf250000080009000400000008000700"/34, @ANYRES32, @ANYBLOB="080004000a0101010c000300030000000000000008000100", @ANYRES32=r3, @ANYBLOB="080005000a010100"], 0x50}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x14c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x11c, 0x2, [@TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14, 0x1, {0x0, 0x0, 0x7ff, 0x1a}}]}}]}, 0x14c}}, 0x0) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x4c, 0x0, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@GTPA_LINK={0x8, 0x1, r5}, @GTPA_TID={0xc, 0x3, 0x1}, @GTPA_TID={0x21, 0x3, 0x4}, @GTPA_I_TEI={0x8, 0x8, 0x3}, @GTPA_O_TEI={0x8, 0x9, 0x3}, @GTPA_NET_NS_FD={0x0, 0x7, r2}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8854}, 0x800) 06:51:11 executing program 2 (fault-call:4 fault-nth:0): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240), 0x8) 06:51:11 executing program 1 (fault-call:5 fault-nth:8): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:51:11 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:51:11 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x0, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:51:11 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) [ 1128.549055] FAULT_INJECTION: forcing a failure. [ 1128.549055] name failslab, interval 1, probability 0, space 0, times 0 [ 1128.571472] CPU: 1 PID: 8481 Comm: syz-executor.2 Not tainted 4.19.133-syzkaller #0 [ 1128.579298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1128.588653] Call Trace: [ 1128.591252] dump_stack+0x1fc/0x2fe [ 1128.594899] should_fail.cold+0xa/0x14 [ 1128.598797] ? setup_fault_attr+0x200/0x200 [ 1128.600292] FAULT_INJECTION: forcing a failure. [ 1128.600292] name failslab, interval 1, probability 0, space 0, times 0 [ 1128.603118] ? lock_acquire+0x170/0x3c0 [ 1128.603158] __should_failslab+0x115/0x180 [ 1128.603176] should_failslab+0x5/0xf [ 1128.603190] __kmalloc_track_caller+0x2a6/0x3c0 [ 1128.603204] ? sctp_setsockopt+0x291e/0x4b60 [ 1128.603220] memdup_user+0x22/0xb0 [ 1128.603241] sctp_setsockopt+0x291e/0x4b60 [ 1128.643082] ? sock_has_perm+0x1e7/0x280 06:51:11 executing program 1 (fault-call:5 fault-nth:9): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1128.647155] ? sctp_setsockopt_paddr_thresholds+0x3f0/0x3f0 [ 1128.652871] ? selinux_netlbl_socket_setsockopt+0x9e/0x3c0 [ 1128.658501] ? selinux_netlbl_sock_rcv_skb+0x4d0/0x4d0 [ 1128.663787] ? do_dup2+0x450/0x450 [ 1128.667335] ? vfs_write+0x3d7/0x540 [ 1128.671057] ? selinux_socket_setsockopt+0x6a/0x80 [ 1128.676000] __sys_setsockopt+0x14d/0x240 [ 1128.680154] ? kernel_accept+0x310/0x310 [ 1128.684618] ? trace_hardirqs_off+0x64/0x200 [ 1128.684634] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 06:51:11 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) [ 1128.684650] __x64_sys_setsockopt+0xba/0x150 06:51:11 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) [ 1128.684666] ? lockdep_hardirqs_on+0x3a8/0x5c0 06:51:11 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x0, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:51:11 executing program 2 (fault-call:4 fault-nth:1): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240), 0x8) [ 1128.684681] do_syscall_64+0xf9/0x620 06:51:11 executing program 1 (fault-call:5 fault-nth:10): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1128.684698] entry_SYSCALL_64_after_hwframe+0x49/0xbe 06:51:11 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000020004000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) [ 1128.684709] RIP: 0033:0x45c1d9 [ 1128.684722] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:51:11 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:51:11 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240), 0x8) 06:51:11 executing program 1 (fault-call:5 fault-nth:11): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:51:11 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000020004000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) [ 1128.684730] RSP: 002b:00007f3816687c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1128.684744] RAX: ffffffffffffffda RBX: 000000000002e780 RCX: 000000000045c1d9 [ 1128.684751] RDX: 0000000000000077 RSI: 0000000000000084 RDI: 0000000000000003 [ 1128.684758] RBP: 00007f3816687ca0 R08: 0000000000000008 R09: 0000000000000000 [ 1128.684766] R10: 0000000020000240 R11: 0000000000000246 R12: 0000000000000000 [ 1128.684773] R13: 00007ffedf9210ff R14: 00007f38166889c0 R15: 000000000078bf0c [ 1128.696494] CPU: 0 PID: 8488 Comm: syz-executor.1 Not tainted 4.19.133-syzkaller #0 [ 1128.696505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1128.696510] Call Trace: [ 1128.696529] dump_stack+0x1fc/0x2fe [ 1128.696551] should_fail.cold+0xa/0x14 [ 1128.696568] ? setup_fault_attr+0x200/0x200 [ 1128.696583] ? lock_acquire+0x170/0x3c0 [ 1128.696606] __should_failslab+0x115/0x180 [ 1128.696621] should_failslab+0x5/0xf [ 1128.696636] kmem_cache_alloc_trace+0x284/0x380 [ 1128.696653] assoc_array_insert+0x3a3/0x2aa0 [ 1128.696669] ? mark_held_locks+0xf0/0xf0 [ 1128.696688] ? finish_task_switch+0x146/0x780 [ 1128.696707] ? lock_downgrade+0x720/0x720 [ 1128.696720] ? assoc_array_cancel_edit+0x90/0x90 [ 1128.696736] ? lock_acquire+0x170/0x3c0 [ 1128.696749] ? __key_link_begin+0x97/0x2f0 [ 1128.696771] __key_link_begin+0x124/0x2f0 [ 1128.696789] key_create_or_update+0x42d/0xb90 [ 1128.696807] ? key_alloc+0x1110/0x1110 [ 1128.696823] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1128.696839] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1128.696872] __se_sys_add_key+0x2c8/0x430 [ 1128.696888] ? keyring_restriction_gc+0x1b0/0x1b0 [ 1128.696906] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1128.696921] ? trace_hardirqs_off_caller+0x69/0x210 [ 1128.696935] ? do_syscall_64+0x21/0x620 [ 1128.696953] do_syscall_64+0xf9/0x620 [ 1128.696970] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1128.696981] RIP: 0033:0x45c1d9 [ 1128.696995] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1128.697002] RSP: 002b:00007f5a74fb4c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1128.697015] RAX: ffffffffffffffda RBX: 0000000000000740 RCX: 000000000045c1d9 [ 1128.697023] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000140 [ 1128.697032] RBP: 00007f5a74fb4ca0 R08: fffffffffffffffe R09: 0000000000000000 [ 1128.697039] R10: 00000000000000ca R11: 0000000000000246 R12: 0000000000000008 [ 1128.697048] R13: 00007fff5b639f9f R14: 00007f5a74fb59c0 R15: 000000000078bfac [ 1128.825078] FAULT_INJECTION: forcing a failure. [ 1128.825078] name failslab, interval 1, probability 0, space 0, times 0 [ 1128.825098] CPU: 0 PID: 8500 Comm: syz-executor.1 Not tainted 4.19.133-syzkaller #0 [ 1128.825106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1128.825111] Call Trace: [ 1128.825131] dump_stack+0x1fc/0x2fe [ 1128.825151] should_fail.cold+0xa/0x14 [ 1128.825168] ? setup_fault_attr+0x200/0x200 [ 1128.825183] ? lock_acquire+0x170/0x3c0 [ 1128.825205] __should_failslab+0x115/0x180 [ 1128.825221] should_failslab+0x5/0xf [ 1128.825242] kmem_cache_alloc_trace+0x284/0x380 [ 1128.825261] assoc_array_insert+0x3a3/0x2aa0 [ 1128.825276] ? mark_held_locks+0xf0/0xf0 [ 1128.825294] ? avc_has_perm_noaudit+0x390/0x390 [ 1128.825313] ? key_instantiate_and_link+0x318/0x420 [ 1128.825328] ? key_alloc+0x940/0x1110 [ 1128.825344] ? __key_instantiate_and_link+0x3b0/0x3b0 [ 1128.825364] ? assoc_array_cancel_edit+0x90/0x90 [ 1128.825381] ? lock_acquire+0x170/0x3c0 [ 1128.825393] ? __key_link_begin+0x97/0x2f0 [ 1128.825416] __key_link_begin+0x124/0x2f0 [ 1128.825435] key_create_or_update+0x42d/0xb90 [ 1128.825453] ? key_alloc+0x1110/0x1110 [ 1128.825488] ? __might_fault+0x192/0x1d0 [ 1128.825506] __se_sys_add_key+0x2c8/0x430 [ 1128.825523] ? keyring_restriction_gc+0x1b0/0x1b0 [ 1128.825541] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1128.825556] ? trace_hardirqs_off_caller+0x69/0x210 [ 1128.825572] ? do_syscall_64+0x21/0x620 [ 1128.825589] do_syscall_64+0xf9/0x620 [ 1128.825606] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1128.825616] RIP: 0033:0x45c1d9 [ 1128.825629] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1128.825637] RSP: 002b:00007f5a74fd5c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1128.825650] RAX: ffffffffffffffda RBX: 0000000000000740 RCX: 000000000045c1d9 [ 1128.825658] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000140 [ 1128.825666] RBP: 00007f5a74fd5ca0 R08: fffffffffffffffe R09: 0000000000000000 [ 1128.825674] R10: 00000000000000ca R11: 0000000000000246 R12: 0000000000000009 [ 1128.825682] R13: 00007fff5b639f9f R14: 00007f5a74fd69c0 R15: 000000000078bf0c [ 1128.965192] FAULT_INJECTION: forcing a failure. [ 1128.965192] name failslab, interval 1, probability 0, space 0, times 0 [ 1128.965213] CPU: 0 PID: 8516 Comm: syz-executor.1 Not tainted 4.19.133-syzkaller #0 [ 1128.965226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1128.965231] Call Trace: [ 1128.965253] dump_stack+0x1fc/0x2fe [ 1128.965274] should_fail.cold+0xa/0x14 [ 1128.965291] ? setup_fault_attr+0x200/0x200 [ 1128.965306] ? lock_acquire+0x170/0x3c0 [ 1128.965328] __should_failslab+0x115/0x180 [ 1128.965344] should_failslab+0x5/0xf 06:51:12 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 06:51:12 executing program 1 (fault-call:5 fault-nth:12): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:51:12 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x29, 0x77, &(0x7f0000000240), 0x8) 06:51:12 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r1) r2 = socket$netlink(0x10, 0x3, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x1) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_SET_REG(r2, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)=ANY=[@ANYBLOB="440000000ea758d86b5b929afaac7067865e5c459ba5e898ca792273e78fbb8ff44bffc62f22e800c94c9101a42fc82301145441", @ANYRES16=r3, @ANYBLOB="02002dbd7000fbdbdf251a0000001c0022800800070000000000080002000080"], 0x44}, 0x1, 0x0, 0x0, 0x10}, 0x4404) sendmsg$NL80211_CMD_DEL_KEY(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)={0x5c, r3, 0x100, 0x70bd28, 0x25dfdbfd, {}, [@NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "cc15ec12ba0dea1d874cb5ef7e"}, @NL80211_ATTR_KEY={0x34, 0x50, 0x0, 0x1, [@NL80211_KEY_DATA_WEP104={0x11, 0x1, "e68d1b74195d1a8878c71ee7dc"}, @NL80211_KEY_IDX={0x5, 0x2, 0x3}, @NL80211_KEY_DEFAULT_TYPES={0x14, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4040010}, 0x81) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r4) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f0000000300)={0x4, 0x3, 0x4, 0x4, 0x33cb, 0x4}) 06:51:12 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000020004000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:51:12 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x0, 0x1f, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 1128.965366] kmem_cache_alloc+0x277/0x370 [ 1128.965385] key_alloc+0x3cf/0x1110 [ 1128.965411] ? key_user_lookup+0x4e0/0x4e0 [ 1128.965436] key_create_or_update+0x63e/0xb90 [ 1128.965455] ? key_alloc+0x1110/0x1110 [ 1128.965488] ? __might_fault+0x192/0x1d0 [ 1128.965506] __se_sys_add_key+0x2c8/0x430 [ 1128.965521] ? keyring_restriction_gc+0x1b0/0x1b0 [ 1128.965540] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1128.965554] ? trace_hardirqs_off_caller+0x69/0x210 06:51:12 executing program 1 (fault-call:5 fault-nth:13): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1128.965570] ? do_syscall_64+0x21/0x620 [ 1128.965586] do_syscall_64+0xf9/0x620 [ 1128.965602] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1128.965612] RIP: 0033:0x45c1d9 06:51:12 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,use', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) [ 1128.965623] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:51:12 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x2, &(0x7f0000000240), 0x8) [ 1128.965629] RSP: 002b:00007f5a74fd5c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1128.965642] RAX: ffffffffffffffda RBX: 0000000000000740 RCX: 000000000045c1d9 [ 1128.965650] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000140 [ 1128.965659] RBP: 00007f5a74fd5ca0 R08: fffffffffffffffe R09: 0000000000000000 [ 1128.965666] R10: 00000000000000ca R11: 0000000000000246 R12: 000000000000000a [ 1128.965674] R13: 00007fff5b639f9f R14: 00007f5a74fd69c0 R15: 000000000078bf0c [ 1129.097727] FAULT_INJECTION: forcing a failure. [ 1129.097727] name failslab, interval 1, probability 0, space 0, times 0 [ 1129.097746] CPU: 1 PID: 8528 Comm: syz-executor.1 Not tainted 4.19.133-syzkaller #0 [ 1129.097754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1129.097759] Call Trace: [ 1129.097779] dump_stack+0x1fc/0x2fe [ 1129.097800] should_fail.cold+0xa/0x14 [ 1129.097815] ? setup_fault_attr+0x200/0x200 [ 1129.097829] ? lock_acquire+0x170/0x3c0 [ 1129.097859] __should_failslab+0x115/0x180 [ 1129.097876] should_failslab+0x5/0xf [ 1129.097890] kmem_cache_alloc_trace+0x284/0x380 [ 1129.097909] selinux_key_alloc+0x46/0x1a0 [ 1129.097925] security_key_alloc+0x50/0xb0 [ 1129.097943] key_alloc+0x7a0/0x1110 [ 1129.097967] ? key_user_lookup+0x4e0/0x4e0 [ 1129.097991] key_create_or_update+0x63e/0xb90 [ 1129.098011] ? key_alloc+0x1110/0x1110 [ 1129.098042] ? __might_fault+0x192/0x1d0 [ 1129.098060] __se_sys_add_key+0x2c8/0x430 [ 1129.098075] ? keyring_restriction_gc+0x1b0/0x1b0 [ 1129.098094] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1129.098108] ? trace_hardirqs_off_caller+0x69/0x210 [ 1129.098123] ? do_syscall_64+0x21/0x620 06:51:12 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,use', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:51:12 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0/file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r2, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r4, 0x1, 0x0, 0x0, {{}, {}, {0x14, 0x19, {0x9effffff, 0x0, 0x1}}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x24, r4, 0x100, 0x70bd2b, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x3}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x4) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) [ 1129.098140] do_syscall_64+0xf9/0x620 [ 1129.098158] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1129.098176] RIP: 0033:0x45c1d9 [ 1129.098189] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1129.098196] RSP: 002b:00007f5a74fd5c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1129.098210] RAX: ffffffffffffffda RBX: 0000000000000740 RCX: 000000000045c1d9 06:51:13 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x6b4, 0x282000) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0xc0045520, &(0x7f00000001c0)=0x8001) [ 1129.098220] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000140 [ 1129.098228] RBP: 00007f5a74fd5ca0 R08: fffffffffffffffe R09: 0000000000000000 [ 1129.098237] R10: 00000000000000ca R11: 0000000000000246 R12: 000000000000000b [ 1129.098246] R13: 00007fff5b639f9f R14: 00007f5a74fd69c0 R15: 000000000078bf0c [ 1129.853422] FAULT_INJECTION: forcing a failure. [ 1129.853422] name failslab, interval 1, probability 0, space 0, times 0 [ 1129.853442] CPU: 1 PID: 8551 Comm: syz-executor.1 Not tainted 4.19.133-syzkaller #0 [ 1129.853450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1129.853455] Call Trace: [ 1129.853474] dump_stack+0x1fc/0x2fe [ 1129.853495] should_fail.cold+0xa/0x14 [ 1129.853511] ? setup_fault_attr+0x200/0x200 [ 1129.853527] ? lock_acquire+0x170/0x3c0 [ 1129.853548] __should_failslab+0x115/0x180 [ 1129.853565] should_failslab+0x5/0xf [ 1129.853578] __kmalloc+0x2ab/0x3c0 [ 1129.853592] ? encrypted_instantiate+0x142/0x8db [ 1129.853605] ? lock_acquire+0x170/0x3c0 [ 1129.853623] encrypted_instantiate+0x142/0x8db [ 1129.853642] ? encrypted_update+0x680/0x680 [ 1129.853657] ? key_alloc+0x84e/0x1110 [ 1129.853675] ? __key_instantiate_and_link+0x38/0x3b0 [ 1129.853688] ? __mutex_add_waiter+0x160/0x160 [ 1129.853703] ? _raw_spin_unlock+0x29/0x40 [ 1129.853717] ? key_alloc+0x940/0x1110 [ 1129.853741] ? key_user_lookup+0x4e0/0x4e0 [ 1129.853769] __key_instantiate_and_link+0xce/0x3b0 [ 1129.853791] key_create_or_update+0x676/0xb90 [ 1129.853809] ? key_alloc+0x1110/0x1110 [ 1129.853843] ? __might_fault+0x192/0x1d0 [ 1129.853866] __se_sys_add_key+0x2c8/0x430 [ 1129.853881] ? keyring_restriction_gc+0x1b0/0x1b0 [ 1129.853899] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1129.853913] ? trace_hardirqs_off_caller+0x69/0x210 [ 1129.853929] ? do_syscall_64+0x21/0x620 [ 1129.853945] do_syscall_64+0xf9/0x620 [ 1129.853961] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1129.853972] RIP: 0033:0x45c1d9 [ 1129.853985] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1129.853992] RSP: 002b:00007f5a74fd5c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1129.854005] RAX: ffffffffffffffda RBX: 0000000000000740 RCX: 000000000045c1d9 [ 1129.854013] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000140 [ 1129.854022] RBP: 00007f5a74fd5ca0 R08: fffffffffffffffe R09: 0000000000000000 [ 1129.854029] R10: 00000000000000ca R11: 0000000000000246 R12: 000000000000000c [ 1129.854037] R13: 00007fff5b639f9f R14: 00007f5a74fd69c0 R15: 000000000078bf0c [ 1129.871413] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=42766 sclass=netlink_route_socket pid=8549 comm=syz-executor.0 [ 1129.897083] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=42766 sclass=netlink_route_socket pid=8549 comm=syz-executor.0 [ 1130.032979] encrypted_key: keylen parameter is missing 06:51:13 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x0, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:51:13 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x3, &(0x7f0000000240), 0x8) 06:51:13 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,use', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:51:13 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = shmget$private(0x0, 0xe000, 0x2, &(0x7f0000ff2000/0xe000)=nil) shmctl$SHM_STAT(r0, 0xd, 0x0) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000240)=""/145) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) ioctl$KVM_DEASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae75, &(0x7f0000000080)={0x1, 0x0, 0x39b, 0x301}) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:51:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:51:13 executing program 4 (fault-call:12 fault-nth:0): pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:51:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1130.975324] encrypted_key: keylen parameter is missing 06:51:13 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x4, &(0x7f0000000240), 0x8) 06:51:13 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_i', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:51:13 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x3d, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000080)={0xffffffffffffffff, 0x7, 0x7}) getsockopt$inet_int(r1, 0x0, 0xb, &(0x7f00000001c0), &(0x7f0000000240)=0x4) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="8100726f75705f69643d", @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) [ 1131.131272] encrypted_key: keylen parameter is missing [ 1131.150360] encrypted_key: keylen parameter is missing 06:51:14 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x5, &(0x7f0000000240), 0x8) 06:51:14 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_i', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) [ 1131.297752] FAULT_INJECTION: forcing a failure. [ 1131.297752] name failslab, interval 1, probability 0, space 0, times 0 [ 1131.309853] CPU: 0 PID: 8623 Comm: syz-executor.4 Not tainted 4.19.133-syzkaller #0 [ 1131.309871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1131.309876] Call Trace: [ 1131.309899] dump_stack+0x1fc/0x2fe [ 1131.309920] should_fail.cold+0xa/0x14 [ 1131.309937] ? setup_fault_attr+0x200/0x200 [ 1131.309954] ? ima_match_policy+0xa00/0x12e0 [ 1131.309976] __should_failslab+0x115/0x180 [ 1131.309992] should_failslab+0x5/0xf [ 1131.310005] kmem_cache_alloc+0x3f/0x370 [ 1131.310022] __build_skb+0x39/0x300 [ 1131.310040] __napi_alloc_skb+0x1c7/0x300 [ 1131.310056] napi_get_frags+0x5e/0x130 [ 1131.310072] tun_get_user+0xcbb/0x4be0 [ 1131.310097] ? deref_stack_reg+0x134/0x1d0 [ 1131.310112] ? tun_chr_read_iter+0x1d0/0x1d0 [ 1131.310217] ? lock_downgrade+0x720/0x720 [ 1131.310240] ? check_preemption_disabled+0x41/0x280 [ 1131.310256] ? check_preemption_disabled+0x41/0x280 [ 1131.310279] tun_chr_write_iter+0xb0/0x150 [ 1131.310295] __vfs_write+0x51b/0x770 [ 1131.310312] ? kernel_read+0x110/0x110 [ 1131.310345] __kernel_write+0x109/0x370 [ 1131.310363] write_pipe_buf+0x153/0x1f0 [ 1131.310379] ? default_file_splice_read+0xa00/0xa00 [ 1131.310393] ? splice_from_pipe_next.part.0+0x2ad/0x360 [ 1131.310411] __splice_from_pipe+0x389/0x800 [ 1131.310428] ? default_file_splice_read+0xa00/0xa00 [ 1131.310446] default_file_splice_write+0xd8/0x180 [ 1131.310461] ? generic_splice_sendpage+0x140/0x140 [ 1131.310479] ? security_file_permission+0x1c0/0x220 [ 1131.310499] ? generic_splice_sendpage+0x140/0x140 [ 1131.310512] __se_sys_splice+0xfe7/0x16d0 [ 1131.310529] ? check_preemption_disabled+0x41/0x280 [ 1131.310543] ? rcu_nmi_exit+0xb3/0x180 [ 1131.310556] ? __se_sys_tee+0xb90/0xb90 [ 1131.310572] ? trace_hardirqs_off_caller+0x69/0x210 [ 1131.310586] ? do_syscall_64+0x21/0x620 [ 1131.310604] do_syscall_64+0xf9/0x620 [ 1131.310629] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1131.310647] RIP: 0033:0x45c1d9 [ 1131.493627] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1131.493634] RSP: 002b:00007fdec92fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 1131.493645] RAX: ffffffffffffffda RBX: 0000000000031a00 RCX: 000000000045c1d9 [ 1131.493651] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 1131.493658] RBP: 00007fdec92fbca0 R08: 0000000000010005 R09: 0000000000000000 [ 1131.493664] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1131.493671] R13: 00007fffc0c0795f R14: 00007fdec92fc9c0 R15: 000000000078bf0c 06:51:14 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x0, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:51:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x2}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:51:14 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x6, &(0x7f0000000240), 0x8) 06:51:14 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_i', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:51:14 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0464b63ac167f9bf7324e1f6428cf569653da922e6d8916c208e3b7f8988d54ef407000000000000000000", @ANYRESHEX=r0, @ANYRES16, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fsetxattr(r1, &(0x7f0000000240)=@known='system.sockprotoname\x00', &(0x7f00000002c0)='/d{z\xea\x03\xab\x8a\x11\x83\xaf\x7fUev\x05/fuse\x00q\x98v\xa9\xe9p\xf2\xcd\x8b\x04\x9eT\x02\xf0\x1b\xf6\xa7lN\x7f7\xff\x03\x00\x00\x00\x00\xac\x00n\x00\x00\x00\x85\xfd\xa4m4\xfc%\xf7\x8dw\x82\x19\f/a\xb4b\xef]\"\xebY\xbb3\x13', 0x50, 0x1) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x3, 0x401) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r3, &(0x7f0000000040)={{0x1b, 0x3d, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x100, 0x0) setsockopt$PNPIPE_INITSTATE(r4, 0x113, 0x4, &(0x7f0000000140)=0x1, 0x4) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r5, &(0x7f0000000040)={{0x1b, 0x3d, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r6 = dup2(r3, r5) ioctl$UI_SET_SWBIT(r6, 0x4004556d, 0x6) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r2, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x7fff, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000340)={0x3, 0x8, 0x2, 0xc63}, &(0x7f0000000380)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x101}}, 0x10) [ 1131.791264] encrypted_key: keylen parameter is missing 06:51:15 executing program 4 (fault-call:12 fault-nth:1): pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:51:15 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x3}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:51:15 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:51:15 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x7, &(0x7f0000000240), 0x8) 06:51:15 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) [ 1132.564838] encrypted_key: keylen parameter is missing 06:51:15 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x8, &(0x7f0000000240), 0x8) 06:51:15 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:51:15 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x0, 0x0, 0x0, 0x7f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:51:15 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:51:15 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x4}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1132.753637] FAULT_INJECTION: forcing a failure. [ 1132.753637] name failslab, interval 1, probability 0, space 0, times 0 06:51:15 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x9, &(0x7f0000000240), 0x8) [ 1132.839000] CPU: 1 PID: 8708 Comm: syz-executor.4 Not tainted 4.19.133-syzkaller #0 [ 1132.846923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1132.856277] Call Trace: [ 1132.858877] dump_stack+0x1fc/0x2fe [ 1132.862515] should_fail.cold+0xa/0x14 [ 1132.866412] ? setup_fault_attr+0x200/0x200 [ 1132.870737] ? tracing_start_sched_switch.cold+0x74/0x74 [ 1132.876194] ? check_preemption_disabled+0x41/0x280 [ 1132.881218] ? check_preemption_disabled+0x41/0x280 [ 1132.886238] __should_failslab+0x115/0x180 [ 1132.890474] should_failslab+0x5/0xf [ 1132.894192] kmem_cache_alloc_node_trace+0x57/0x3b0 [ 1132.899218] __kmalloc_node_track_caller+0x38/0x70 [ 1132.904153] pskb_expand_head+0x159/0xf20 [ 1132.908308] ? __local_bh_enable_ip+0x159/0x270 [ 1132.912986] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1132.918352] tun_get_user+0x228c/0x4be0 [ 1132.922339] ? deref_stack_reg+0x134/0x1d0 [ 1132.926578] ? tun_chr_read_iter+0x1d0/0x1d0 [ 1132.930999] ? lock_downgrade+0x720/0x720 [ 1132.935143] ? check_preemption_disabled+0x41/0x280 [ 1132.940157] ? check_preemption_disabled+0x41/0x280 [ 1132.945184] tun_chr_write_iter+0xb0/0x150 [ 1132.949423] __vfs_write+0x51b/0x770 [ 1132.953140] ? kernel_read+0x110/0x110 [ 1132.957048] __kernel_write+0x109/0x370 [ 1132.961027] write_pipe_buf+0x153/0x1f0 [ 1132.965001] ? default_file_splice_read+0xa00/0xa00 [ 1132.970018] ? splice_from_pipe_next.part.0+0x2ad/0x360 [ 1132.975388] __splice_from_pipe+0x389/0x800 [ 1132.979713] ? default_file_splice_read+0xa00/0xa00 [ 1132.984738] default_file_splice_write+0xd8/0x180 [ 1132.989581] ? generic_splice_sendpage+0x140/0x140 [ 1132.994520] ? security_file_permission+0x1c0/0x220 [ 1132.999539] ? generic_splice_sendpage+0x140/0x140 [ 1133.004469] __se_sys_splice+0xfe7/0x16d0 [ 1133.008623] ? check_preemption_disabled+0x41/0x280 [ 1133.013642] ? rcu_nmi_exit+0xb3/0x180 [ 1133.017527] ? __se_sys_tee+0xb90/0xb90 [ 1133.021506] ? trace_hardirqs_off_caller+0x69/0x210 [ 1133.026522] ? do_syscall_64+0x21/0x620 [ 1133.030498] do_syscall_64+0xf9/0x620 [ 1133.034302] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1133.039491] RIP: 0033:0x45c1d9 [ 1133.042689] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1133.052160] encrypted_key: keylen parameter is missing [ 1133.061586] RSP: 002b:00007fdec9298c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 1133.061599] RAX: ffffffffffffffda RBX: 0000000000031a00 RCX: 000000000045c1d9 [ 1133.061607] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 06:51:15 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) [ 1133.061615] RBP: 00007fdec9298ca0 R08: 0000000000010005 R09: 0000000000000000 [ 1133.061622] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1133.061630] R13: 00007fffc0c0795f R14: 00007fdec92999c0 R15: 000000000078c0ec [ 1133.243029] encrypted_key: keylen parameter is missing 06:51:16 executing program 4 (fault-call:12 fault-nth:2): pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:51:16 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0xa, &(0x7f0000000240), 0x8) 06:51:16 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:51:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x5}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:51:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:51:16 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) modify_ldt$read(0x0, &(0x7f0000000380)=""/171, 0xab) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00'/10, @ANYRESDEC=0x0]) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000040)) r3 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r2, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f0000000500)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="00082abd7000ffdbdf250714c7d37600010000000000040d9f707dd3afab200000000000000001fc96fab444e246a3b81add91b9d9c972620daaf3e4cfbcc2c5f1342617b5f9274ab91ef81ed989c7bfbea6e7345288beba802c118b2161e46d2ee220b7920249b057feffffff2d5a10412cc2d8921b9831efb541d403c0"], 0x1c}, 0x1, 0x0, 0x0, 0x20040040}, 0x4801) sendmsg$NLBL_UNLABEL_C_STATICLIST(r1, &(0x7f0000002700)={&(0x7f0000002640)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000026c0)={&(0x7f0000002680)={0x40, r3, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast1}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_vlan\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000001}, 0x8001) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) clone(0x40015000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:51:16 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) [ 1133.907318] encrypted_key: keylen parameter is missing 06:51:16 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0xb, &(0x7f0000000240), 0x8) 06:51:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x6}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:51:16 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:51:16 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="3467726775040069643dae4ad9718ab498543296b38eefb0f00d2128aeba0bcebbe664f0a830d426078dca0f942395a10367ba04afd2cfa05ddc8966ea49310a9dbd84e7cc2416ea1096cc914c1df317ee0c962a07bae25721315fa8cbacddfe686503988b96be88939bc6430ec6b7be9b70befecb537618a6fa5e071138f17b94af6e374c7721806d017781b25b0e4fac01caa0b276dcec", @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r2, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) mount$9p_unix(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)='9p\x00', 0x30e005, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) r3 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000540)={0x1, 0x200, 0xfff, 0x0, 0x6}) r5 = socket$inet_sctp(0x2, 0x1, 0x84) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000600)='/dev/vcsa\x00', 0x521400, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(r6, 0x4018aee3, &(0x7f0000000680)={0x0, 0x2, 0x7f, &(0x7f0000000640)=0x1e}) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000140)={r7}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0)={r7, 0xffff}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000280)={r7, 0x8}, 0x8) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r3, 0xc0305302, &(0x7f0000000080)={0xfffffff8, 0x1000, 0x0, 0x0, 0x5, 0x8}) [ 1134.110525] encrypted_key: keylen parameter is missing [ 1134.138718] FAULT_INJECTION: forcing a failure. [ 1134.138718] name failslab, interval 1, probability 0, space 0, times 0 [ 1134.150299] CPU: 1 PID: 8767 Comm: syz-executor.4 Not tainted 4.19.133-syzkaller #0 06:51:17 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 1134.158103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1134.167457] Call Trace: [ 1134.170054] dump_stack+0x1fc/0x2fe [ 1134.173695] should_fail.cold+0xa/0x14 [ 1134.177593] ? setup_fault_attr+0x200/0x200 [ 1134.181921] ? check_preemption_disabled+0x41/0x280 [ 1134.186947] __should_failslab+0x115/0x180 [ 1134.191192] should_failslab+0x5/0xf [ 1134.194912] kmem_cache_alloc+0x3f/0x370 [ 1134.198981] dst_alloc+0x106/0x1a0 [ 1134.202529] rt_dst_alloc+0x7f/0x400 [ 1134.206253] ip_route_input_slow+0x1839/0x3460 [ 1134.210850] ? fib_multipath_hash+0xa10/0xa10 [ 1134.215354] ? lockdep_hardirqs_on+0x288/0x5c0 [ 1134.219937] ? ipt_do_table+0xcc9/0x1820 [ 1134.224005] ? ipt_do_table+0xd24/0x1820 [ 1134.228084] ? lock_acquire+0x170/0x3c0 [ 1134.232064] ? ip_route_input_slow+0x3460/0x3460 [ 1134.236828] ? check_preemption_disabled+0x41/0x280 [ 1134.241855] ip_route_input_noref+0x13e/0x2a0 [ 1134.246361] ? ip_route_input_slow+0x3460/0x3460 [ 1134.251127] ? init_conntrack+0x10d0/0x1180 [ 1134.255456] ? check_preemption_disabled+0x41/0x280 [ 1134.260484] ip_rcv_finish_core.constprop.0+0x229/0x1a60 [ 1134.265937] ip_rcv_finish+0x146/0x2e0 [ 1134.269812] ip_rcv+0xca/0x3c0 [ 1134.272990] ? ip_local_deliver+0x500/0x500 [ 1134.277299] ? ip_sublist_rcv+0xc40/0xc40 [ 1134.281433] ? netif_receive_skb_internal+0x1da/0x3f0 [ 1134.286606] ? ip_local_deliver+0x500/0x500 [ 1134.290912] __netif_receive_skb_one_core+0x114/0x180 [ 1134.296085] ? __netif_receive_skb_core+0x3270/0x3270 [ 1134.301258] ? mark_held_locks+0xa6/0xf0 [ 1134.305305] ? lock_acquire+0x170/0x3c0 [ 1134.309264] ? netif_receive_skb_internal+0x6e/0x3f0 [ 1134.314350] __netif_receive_skb+0x27/0x1c0 [ 1134.318669] netif_receive_skb_internal+0xf0/0x3f0 [ 1134.323593] ? __netif_receive_skb+0x1c0/0x1c0 [ 1134.328160] ? eth_get_headlen+0x1b0/0x1b0 [ 1134.332385] napi_gro_frags+0x67b/0x990 [ 1134.336349] tun_get_user+0x2a53/0x4be0 [ 1134.340318] ? tun_chr_read_iter+0x1d0/0x1d0 [ 1134.344720] ? lock_downgrade+0x720/0x720 [ 1134.348854] ? check_preemption_disabled+0x41/0x280 [ 1134.353856] ? check_preemption_disabled+0x41/0x280 [ 1134.358866] tun_chr_write_iter+0xb0/0x150 [ 1134.363086] __vfs_write+0x51b/0x770 [ 1134.366786] ? kernel_read+0x110/0x110 [ 1134.370657] ? io_schedule_timeout+0x140/0x140 [ 1134.375238] ? ___preempt_schedule+0x16/0x18 [ 1134.379632] ? ___preempt_schedule+0x16/0x18 [ 1134.384027] __kernel_write+0x109/0x370 [ 1134.387985] write_pipe_buf+0x153/0x1f0 [ 1134.391942] ? default_file_splice_read+0xa00/0xa00 [ 1134.396942] ? splice_from_pipe_next.part.0+0x2ad/0x360 [ 1134.402291] __splice_from_pipe+0x389/0x800 [ 1134.406610] ? default_file_splice_read+0xa00/0xa00 [ 1134.411615] default_file_splice_write+0xd8/0x180 [ 1134.416441] ? generic_splice_sendpage+0x140/0x140 [ 1134.421471] ? security_file_permission+0x1c0/0x220 [ 1134.426583] ? generic_splice_sendpage+0x140/0x140 [ 1134.431493] __se_sys_splice+0xfe7/0x16d0 [ 1134.435626] ? check_preemption_disabled+0x41/0x280 [ 1134.440628] ? rcu_nmi_exit+0xb3/0x180 [ 1134.444497] ? __se_sys_tee+0xb90/0xb90 [ 1134.448454] ? trace_hardirqs_off_caller+0x69/0x210 [ 1134.453457] ? do_syscall_64+0x21/0x620 [ 1134.457419] do_syscall_64+0xf9/0x620 [ 1134.461205] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1134.466378] RIP: 0033:0x45c1d9 [ 1134.469553] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1134.488465] RSP: 002b:00007fdec9298c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 1134.496160] RAX: ffffffffffffffda RBX: 0000000000031a00 RCX: 000000000045c1d9 [ 1134.503411] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 1134.510661] RBP: 00007fdec9298ca0 R08: 0000000000010005 R09: 0000000000000000 [ 1134.517910] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1134.525166] R13: 00007fffc0c0795f R14: 00007fdec92999c0 R15: 000000000078c0ec 06:51:17 executing program 4 (fault-call:12 fault-nth:3): pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:51:17 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:51:17 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303230303034303030302c757365725f69643de7b98ea650b6c93d87ca05c09bcaf1b4e569d09775eaaeccff208e46b75412065dd9c6d7739a0149046380cf428794d27d7bad4bcfcd4bd623780fa184565fe324dc5d1515977aafb5fd272afb41d02f1bbf6c56a5d93cae96ecd124ba66debf1200"/152, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:51:17 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0xc, &(0x7f0000000240), 0x8) 06:51:17 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:51:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x7}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:51:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x60}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:51:17 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) [ 1135.023383] encrypted_key: keylen parameter is missing 06:51:17 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r0) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x1, 0x1, 0x0, 0x2, "4ec3e49f1529a21716402809ab53adfd358eb3e0df0fcd49e49f0bb2a644649b4c0b8b539329960437543ca8076106e6e476896bf3fb298c27e3c578d5560ebdaeaea4d02c78ac34b481234b84bd41f118793c4c2671"}, 0x66) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB="1b3d07070000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000567ee51b288605c44ffffffeffb4e7eb92021b7713c7a617f8abcaa5b2c634b1c07061b87d1996709afeef97abd426999174bda3b7086dfd988c6ec1092cca8f3f576785df921bf0b4c9c958114cc79a565ce63821cd3bd7a3f87defa50aafe6006f"], 0x78) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYRES64=r2, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:51:17 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:51:17 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0xd, &(0x7f0000000240), 0x8) 06:51:18 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) [ 1135.209999] FAULT_INJECTION: forcing a failure. [ 1135.209999] name failslab, interval 1, probability 0, space 0, times 0 [ 1135.221300] CPU: 0 PID: 8814 Comm: syz-executor.4 Not tainted 4.19.133-syzkaller #0 [ 1135.229615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1135.229631] Call Trace: [ 1135.229655] dump_stack+0x1fc/0x2fe [ 1135.229677] should_fail.cold+0xa/0x14 [ 1135.229692] ? setup_fault_attr+0x200/0x200 [ 1135.229704] ? check_preemption_disabled+0x41/0x280 [ 1135.229719] __should_failslab+0x115/0x180 [ 1135.229737] should_failslab+0x5/0xf [ 1135.229759] kmem_cache_alloc+0x3f/0x370 [ 1135.229777] dst_alloc+0x106/0x1a0 [ 1135.229796] rt_dst_alloc+0x7f/0x400 [ 1135.229815] ip_route_input_slow+0x1839/0x3460 [ 1135.229838] ? fib_multipath_hash+0xa10/0xa10 [ 1135.229854] ? lockdep_hardirqs_on+0x288/0x5c0 [ 1135.229869] ? ipt_do_table+0xcc9/0x1820 [ 1135.229885] ? ipt_do_table+0xd24/0x1820 [ 1135.229910] ? lock_acquire+0x170/0x3c0 [ 1135.229923] ? ip_route_input_slow+0x3460/0x3460 [ 1135.229936] ? check_preemption_disabled+0x41/0x280 [ 1135.229954] ip_route_input_noref+0x13e/0x2a0 [ 1135.229969] ? ip_route_input_slow+0x3460/0x3460 [ 1135.229985] ? init_conntrack+0x10d0/0x1180 [ 1135.229999] ? check_preemption_disabled+0x41/0x280 [ 1135.230022] ip_rcv_finish_core.constprop.0+0x229/0x1a60 [ 1135.230042] ip_rcv_finish+0x146/0x2e0 [ 1135.230057] ip_rcv+0xca/0x3c0 [ 1135.230070] ? ip_local_deliver+0x500/0x500 [ 1135.230088] ? ip_sublist_rcv+0xc40/0xc40 [ 1135.230104] ? netif_receive_skb_internal+0x1da/0x3f0 [ 1135.230119] ? ip_local_deliver+0x500/0x500 [ 1135.230134] __netif_receive_skb_one_core+0x114/0x180 [ 1135.230149] ? __netif_receive_skb_core+0x3270/0x3270 [ 1135.230161] ? mark_held_locks+0xa6/0xf0 [ 1135.230178] ? lock_acquire+0x170/0x3c0 [ 1135.230192] ? netif_receive_skb_internal+0x6e/0x3f0 [ 1135.230209] __netif_receive_skb+0x27/0x1c0 [ 1135.230224] netif_receive_skb_internal+0xf0/0x3f0 [ 1135.230236] ? __netif_receive_skb+0x1c0/0x1c0 [ 1135.230246] ? eth_get_headlen+0x1b0/0x1b0 [ 1135.230263] napi_gro_frags+0x67b/0x990 [ 1135.230281] tun_get_user+0x2a53/0x4be0 [ 1135.230304] ? deref_stack_reg+0x134/0x1d0 [ 1135.230318] ? tun_chr_read_iter+0x1d0/0x1d0 [ 1135.230341] ? lock_downgrade+0x720/0x720 [ 1135.230351] ? check_preemption_disabled+0x41/0x280 [ 1135.230364] ? check_preemption_disabled+0x41/0x280 [ 1135.230386] tun_chr_write_iter+0xb0/0x150 [ 1135.230402] __vfs_write+0x51b/0x770 [ 1135.230423] ? kernel_read+0x110/0x110 [ 1135.230460] __kernel_write+0x109/0x370 [ 1135.230480] write_pipe_buf+0x153/0x1f0 [ 1135.230496] ? default_file_splice_read+0xa00/0xa00 [ 1135.230510] ? splice_from_pipe_next.part.0+0x2ad/0x360 [ 1135.230530] __splice_from_pipe+0x389/0x800 [ 1135.230548] ? default_file_splice_read+0xa00/0xa00 [ 1135.230568] default_file_splice_write+0xd8/0x180 [ 1135.230584] ? generic_splice_sendpage+0x140/0x140 [ 1135.230604] ? security_file_permission+0x1c0/0x220 [ 1135.230624] ? generic_splice_sendpage+0x140/0x140 [ 1135.230638] __se_sys_splice+0xfe7/0x16d0 [ 1135.230657] ? check_preemption_disabled+0x41/0x280 [ 1135.230673] ? rcu_nmi_exit+0xb3/0x180 [ 1135.230687] ? __se_sys_tee+0xb90/0xb90 [ 1135.230703] ? trace_hardirqs_off_caller+0x69/0x210 [ 1135.230718] ? do_syscall_64+0x21/0x620 [ 1135.230735] do_syscall_64+0xf9/0x620 [ 1135.230763] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1135.230775] RIP: 0033:0x45c1d9 [ 1135.230788] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1135.230795] RSP: 002b:00007fdec9298c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 1135.230809] RAX: ffffffffffffffda RBX: 0000000000031a00 RCX: 000000000045c1d9 [ 1135.230817] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 1135.230826] RBP: 00007fdec9298ca0 R08: 0000000000010005 R09: 0000000000000000 [ 1135.230834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1135.230843] R13: 00007fffc0c0795f R14: 00007fdec92999c0 R15: 000000000078c0ec [ 1135.254615] encrypted_key: keylen parameter is missing 06:51:18 executing program 4 (fault-call:12 fault-nth:4): pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:51:18 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x10, &(0x7f0000000240), 0x8) 06:51:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffe) 06:51:18 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r2, 0x0, 0x0, 0x0) 06:51:18 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:51:18 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r1, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000240)={0xb, {'syz0\x00', 'syz1\x00', 'syz1\x00', 0x83, 0x54e, 0x4, 0x6, 0x9, 0xd24, "65e4f0b7b8956fb94aba90e8e0cb06529bc64a0fec3ecb94823e49ea01bdb7a78c712d378fb4389d1fe3edb3d62f0c6f42931232712b83ba9fb5770eddeaf43d094f3778d9e5c6e39b993553ec8c530f1ee10da202e98ca8a59153894c23c8f9cb192768172f912fd5254cfb56157e2b8df78dece35bc9e687e11f90351de41d69278d"}}, 0x19b) 06:51:19 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) [ 1136.153094] sctp: [Deprecated]: syz-executor.2 (pid 8840) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1136.153094] Use struct sctp_sack_info instead 06:51:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x200001ca, 0xfffffffffffffffe) 06:51:19 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r2, 0x0, 0x0, 0x0) 06:51:19 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) [ 1136.272425] sctp: [Deprecated]: syz-executor.2 (pid 8860) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1136.272425] Use struct sctp_sack_info instead 06:51:19 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:51:19 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x11, &(0x7f0000000240), 0x8) [ 1136.422494] FAULT_INJECTION: forcing a failure. [ 1136.422494] name failslab, interval 1, probability 0, space 0, times 0 [ 1136.433905] CPU: 0 PID: 8884 Comm: syz-executor.4 Not tainted 4.19.133-syzkaller #0 [ 1136.441703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1136.451055] Call Trace: [ 1136.453654] dump_stack+0x1fc/0x2fe [ 1136.457293] should_fail.cold+0xa/0x14 [ 1136.461191] ? setup_fault_attr+0x200/0x200 [ 1136.465528] ? lock_downgrade+0x720/0x720 [ 1136.469684] ? perf_trace_preemptirq_template+0x2e6/0x460 [ 1136.475230] __should_failslab+0x115/0x180 [ 1136.479590] should_failslab+0x5/0xf [ 1136.483313] kmem_cache_alloc+0x3f/0x370 [ 1136.487388] __build_skb+0x39/0x300 [ 1136.491025] __napi_alloc_skb+0x1c7/0x300 [ 1136.495257] napi_get_frags+0x5e/0x130 [ 1136.499148] tun_get_user+0xcbb/0x4be0 [ 1136.503052] ? deref_stack_reg+0x134/0x1d0 [ 1136.507296] ? tun_chr_read_iter+0x1d0/0x1d0 [ 1136.511724] ? lock_downgrade+0x720/0x720 [ 1136.515877] ? check_preemption_disabled+0x41/0x280 [ 1136.520899] ? check_preemption_disabled+0x41/0x280 [ 1136.525931] tun_chr_write_iter+0xb0/0x150 [ 1136.530175] __vfs_write+0x51b/0x770 [ 1136.533898] ? kernel_read+0x110/0x110 [ 1136.537815] __kernel_write+0x109/0x370 [ 1136.541887] write_pipe_buf+0x153/0x1f0 [ 1136.545868] ? default_file_splice_read+0xa00/0xa00 [ 1136.551076] ? splice_from_pipe_next.part.0+0x2ad/0x360 [ 1136.556456] ? anon_pipe_buf_release+0x2a0/0x380 [ 1136.561202] __splice_from_pipe+0x389/0x800 [ 1136.565512] ? default_file_splice_read+0xa00/0xa00 [ 1136.570520] default_file_splice_write+0xd8/0x180 [ 1136.575346] ? generic_splice_sendpage+0x140/0x140 [ 1136.580263] ? security_file_permission+0x1c0/0x220 [ 1136.585278] ? generic_splice_sendpage+0x140/0x140 [ 1136.590195] __se_sys_splice+0xfe7/0x16d0 [ 1136.594334] ? check_preemption_disabled+0x41/0x280 [ 1136.599339] ? rcu_nmi_exit+0xb3/0x180 [ 1136.603226] ? __se_sys_tee+0xb90/0xb90 [ 1136.607201] ? trace_hardirqs_off_caller+0x69/0x210 [ 1136.612204] ? do_syscall_64+0x21/0x620 [ 1136.616165] do_syscall_64+0xf9/0x620 [ 1136.619954] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1136.625139] RIP: 0033:0x45c1d9 [ 1136.628315] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1136.647194] RSP: 002b:00007fdec9298c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 1136.654892] RAX: ffffffffffffffda RBX: 0000000000031a00 RCX: 000000000045c1d9 [ 1136.662152] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 1136.669403] RBP: 00007fdec9298ca0 R08: 0000000000010005 R09: 0000000000000000 [ 1136.676653] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1136.683905] R13: 00007fffc0c0795f R14: 00007fdec92999c0 R15: 000000000078c0ec 06:51:20 executing program 4 (fault-call:12 fault-nth:5): pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:51:20 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r0) recvfrom$unix(r0, &(0x7f0000000240)=""/109, 0x6d, 0x2100, &(0x7f00000002c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000ec0)={{0x1b, 0x3d, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0xfffffffffffffffe, 0x40}, [{0x6474e551}], "311aef1e181c3cd6ce061964f4b51ad039806a3bb98e0366eb3de1ded337085d5a4ccbac3505ccc90a622266b68dbe5c488897529d5f491041ad4458d2939656db1f0be3fa97f70e135bd231a2e0852ee1080d7161ee487e05d3aa615c1e32a9ed8bc6336c348a49e9d78423da349aad726be87ca5c9e43c85bc3e132deabf122ae9f83afbcea5a8df6b742e7a03e405afcabee0ab3b8f3983", [[], [], [], [], [], [], [], [], []]}, 0xa11) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726ffb302c757365725f69643d00"/28, @ANYRESDEC=0x0, @ANYRESOCT=r2, @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:51:20 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x12, &(0x7f0000000240), 0x8) 06:51:20 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:51:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r2, 0x0, 0x0, 0x0) 06:51:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='neer:u', @ANYRES64=r0], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:51:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000258207fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:51:20 executing program 5 (fault-call:5 fault-nth:0): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 1137.366988] encrypted_key: insufficient parameters specified 06:51:20 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:51:20 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x13, &(0x7f0000000240), 0x8) 06:51:20 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:51:20 executing program 5 (fault-call:5 fault-nth:1): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 1137.555985] encrypted_key: keylen parameter is missing [ 1137.576575] FAULT_INJECTION: forcing a failure. [ 1137.576575] name failslab, interval 1, probability 0, space 0, times 0 [ 1137.576596] CPU: 0 PID: 8929 Comm: syz-executor.5 Not tainted 4.19.133-syzkaller #0 [ 1137.576605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1137.576610] Call Trace: [ 1137.576630] dump_stack+0x1fc/0x2fe [ 1137.576652] should_fail.cold+0xa/0x14 [ 1137.576670] ? setup_fault_attr+0x200/0x200 [ 1137.576685] ? lock_acquire+0x170/0x3c0 [ 1137.576707] __should_failslab+0x115/0x180 [ 1137.576724] should_failslab+0x5/0xf [ 1137.576739] kmem_cache_alloc_node+0x245/0x3b0 [ 1137.576760] __alloc_skb+0x71/0x560 [ 1137.576777] alloc_skb_with_frags+0x92/0x570 [ 1137.576791] ? mark_held_locks+0xf0/0xf0 [ 1137.576812] sock_alloc_send_pskb+0x6e1/0x830 [ 1137.576838] ? sock_kzfree_s+0x60/0x60 [ 1137.576853] ? rcu_nmi_exit+0xb3/0x180 [ 1137.576868] ? __local_bh_enable_ip+0x119/0x270 [ 1137.576881] ? trace_hardirqs_off+0x64/0x200 [ 1137.576897] ? __local_bh_enable_ip+0x159/0x270 [ 1137.576918] llc_ui_sendmsg+0x300/0xfc7 [ 1137.576938] ? llc_ui_connect+0xc20/0xc20 [ 1137.576955] ? kernel_recvmsg+0x220/0x220 [ 1137.576976] ? llc_ui_connect+0xc20/0xc20 [ 1137.576989] sock_sendmsg+0xc3/0x120 [ 1137.577005] ___sys_sendmsg+0x3b3/0x8e0 [ 1137.577028] ? mark_held_locks+0xf0/0xf0 [ 1137.577044] ? copy_msghdr_from_user+0x440/0x440 [ 1137.577059] ? _kstrtoull+0x186/0x420 [ 1137.577075] ? __fget+0x32f/0x510 [ 1137.577094] ? lock_downgrade+0x720/0x720 [ 1137.577107] ? check_preemption_disabled+0x41/0x280 [ 1137.577121] ? check_preemption_disabled+0x41/0x280 [ 1137.577139] ? __fget+0x356/0x510 [ 1137.577157] ? do_dup2+0x450/0x450 [ 1137.577173] ? get_pid_task+0xf4/0x190 [ 1137.577191] ? __fdget+0x1d0/0x230 [ 1137.577209] __sys_sendmmsg+0x195/0x470 [ 1137.577227] ? __ia32_sys_sendmsg+0x220/0x220 [ 1137.577243] ? lock_downgrade+0x720/0x720 [ 1137.577268] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1137.577283] ? perf_trace_preemptirq_template+0x2e6/0x460 [ 1137.577300] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1137.577313] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1137.577334] ? tracing_start_sched_switch.cold+0x74/0x74 [ 1137.577349] ? do_syscall_64+0x207/0x620 [ 1137.577363] ? check_preemption_disabled+0x41/0x280 [ 1137.577380] ? rcu_nmi_exit+0xb3/0x180 [ 1137.577392] ? trace_hardirqs_off+0x64/0x200 [ 1137.577409] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1137.577426] __x64_sys_sendmmsg+0x99/0x100 [ 1137.577440] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1137.577455] do_syscall_64+0xf9/0x620 [ 1137.577473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1137.577484] RIP: 0033:0x45c1d9 [ 1137.577498] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1137.577506] RSP: 002b:00007f28ad2cfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1137.577518] RAX: ffffffffffffffda RBX: 0000000000025a40 RCX: 000000000045c1d9 [ 1137.577526] RDX: 03fffffffffffeed RSI: 0000000020001380 RDI: 0000000000000006 [ 1137.577534] RBP: 00007f28ad2cfca0 R08: 0000000000000000 R09: 0000000000000000 [ 1137.577541] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1137.577550] R13: 00007ffe9145ce6f R14: 00007f28ad2d09c0 R15: 000000000078bfac [ 1137.626687] FAULT_INJECTION: forcing a failure. [ 1137.626687] name failslab, interval 1, probability 0, space 0, times 0 [ 1137.626709] CPU: 1 PID: 8933 Comm: syz-executor.4 Not tainted 4.19.133-syzkaller #0 [ 1137.626717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1137.626722] Call Trace: [ 1137.626743] dump_stack+0x1fc/0x2fe [ 1137.626765] should_fail.cold+0xa/0x14 [ 1137.626782] ? setup_fault_attr+0x200/0x200 [ 1137.626801] ? lock_downgrade+0x720/0x720 [ 1137.626816] ? perf_trace_preemptirq_template+0x2e6/0x460 [ 1137.626834] __should_failslab+0x115/0x180 [ 1137.626849] should_failslab+0x5/0xf [ 1137.626863] kmem_cache_alloc+0x3f/0x370 [ 1137.626882] __build_skb+0x39/0x300 [ 1137.626905] __napi_alloc_skb+0x1c7/0x300 [ 1137.626921] napi_get_frags+0x5e/0x130 [ 1137.626938] tun_get_user+0xcbb/0x4be0 [ 1137.626967] ? tun_chr_read_iter+0x1d0/0x1d0 [ 1137.626992] ? lock_downgrade+0x720/0x720 [ 1137.627006] ? check_preemption_disabled+0x41/0x280 [ 1137.627020] ? check_preemption_disabled+0x41/0x280 [ 1137.627042] tun_chr_write_iter+0xb0/0x150 [ 1137.627058] __vfs_write+0x51b/0x770 [ 1137.627075] ? kernel_read+0x110/0x110 [ 1137.627097] ? perf_trace_preemptirq_template+0x2e6/0x460 [ 1137.627115] ? tracing_start_sched_switch.cold+0x74/0x74 [ 1137.627128] ? debug_check_no_obj_freed+0x201/0x482 [ 1137.627149] __kernel_write+0x109/0x370 [ 1137.627167] write_pipe_buf+0x153/0x1f0 [ 1137.627181] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1137.627197] ? default_file_splice_read+0xa00/0xa00 [ 1137.627210] ? __put_page+0xcc/0x3a0 [ 1137.627224] ? anon_pipe_buf_release+0x2c3/0x380 [ 1137.627240] __splice_from_pipe+0x389/0x800 [ 1137.627258] ? default_file_splice_read+0xa00/0xa00 [ 1137.627279] default_file_splice_write+0xd8/0x180 [ 1137.627294] ? generic_splice_sendpage+0x140/0x140 [ 1137.627314] ? security_file_permission+0x1c0/0x220 [ 1137.627334] ? generic_splice_sendpage+0x140/0x140 [ 1137.627348] __se_sys_splice+0xfe7/0x16d0 [ 1137.627367] ? check_preemption_disabled+0x41/0x280 [ 1137.627383] ? rcu_nmi_exit+0xb3/0x180 [ 1137.627397] ? __se_sys_tee+0xb90/0xb90 [ 1137.627411] ? trace_hardirqs_off_caller+0x69/0x210 [ 1137.627426] ? do_syscall_64+0x21/0x620 [ 1137.627443] do_syscall_64+0xf9/0x620 [ 1137.627462] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1137.627474] RIP: 0033:0x45c1d9 [ 1137.627487] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1137.627495] RSP: 002b:00007fdec9298c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 1137.627508] RAX: ffffffffffffffda RBX: 0000000000031a00 RCX: 000000000045c1d9 [ 1137.627522] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 1137.627530] RBP: 00007fdec9298ca0 R08: 0000000000010005 R09: 0000000000000000 [ 1137.627538] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1137.627547] R13: 00007fffc0c0795f R14: 00007fdec92999c0 R15: 000000000078c0ec [ 1137.744679] FAULT_INJECTION: forcing a failure. [ 1137.744679] name failslab, interval 1, probability 0, space 0, times 0 [ 1137.744699] CPU: 0 PID: 8939 Comm: syz-executor.5 Not tainted 4.19.133-syzkaller #0 [ 1137.744707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1137.744712] Call Trace: [ 1137.744734] dump_stack+0x1fc/0x2fe [ 1137.744756] should_fail.cold+0xa/0x14 [ 1137.744774] ? setup_fault_attr+0x200/0x200 [ 1137.744789] ? lock_acquire+0x170/0x3c0 [ 1137.744809] __should_failslab+0x115/0x180 [ 1137.744825] should_failslab+0x5/0xf [ 1137.744840] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1137.744860] __kmalloc_node_track_caller+0x38/0x70 [ 1137.744876] __alloc_skb+0xae/0x560 [ 1137.744893] alloc_skb_with_frags+0x92/0x570 [ 1137.744905] ? mark_held_locks+0xf0/0xf0 [ 1137.744927] sock_alloc_send_pskb+0x6e1/0x830 06:51:21 executing program 4 (fault-call:12 fault-nth:6): pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1137.744950] ? sock_kzfree_s+0x60/0x60 [ 1137.744966] ? rcu_nmi_exit+0xb3/0x180 [ 1137.744980] ? __local_bh_enable_ip+0x119/0x270 [ 1137.744992] ? trace_hardirqs_off+0x64/0x200 [ 1137.745017] ? __local_bh_enable_ip+0x159/0x270 [ 1137.745040] llc_ui_sendmsg+0x300/0xfc7 [ 1137.745066] ? llc_ui_connect+0xc20/0xc20 [ 1137.745082] ? kernel_recvmsg+0x220/0x220 [ 1137.745105] ? llc_ui_connect+0xc20/0xc20 [ 1137.745120] sock_sendmsg+0xc3/0x120 [ 1137.745137] ___sys_sendmsg+0x3b3/0x8e0 [ 1137.745152] ? mark_held_locks+0xf0/0xf0 [ 1137.745167] ? copy_msghdr_from_user+0x440/0x440 [ 1137.745181] ? _kstrtoull+0x186/0x420 [ 1137.745197] ? __fget+0x32f/0x510 [ 1137.745215] ? lock_downgrade+0x720/0x720 [ 1137.745228] ? check_preemption_disabled+0x41/0x280 [ 1137.745242] ? check_preemption_disabled+0x41/0x280 [ 1137.745261] ? __fget+0x356/0x510 [ 1137.745279] ? do_dup2+0x450/0x450 [ 1137.745296] ? get_pid_task+0xf4/0x190 [ 1137.745314] ? __fdget+0x1d0/0x230 [ 1137.745332] __sys_sendmmsg+0x195/0x470 [ 1137.745350] ? __ia32_sys_sendmsg+0x220/0x220 [ 1137.745367] ? lock_downgrade+0x720/0x720 [ 1137.745393] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1137.745407] ? perf_trace_preemptirq_template+0x2e6/0x460 [ 1137.745424] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1137.745438] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1137.745453] ? tracing_start_sched_switch.cold+0x74/0x74 [ 1137.745467] ? do_syscall_64+0x207/0x620 [ 1137.745481] ? check_preemption_disabled+0x41/0x280 [ 1137.745497] ? rcu_nmi_exit+0xb3/0x180 [ 1137.745509] ? trace_hardirqs_off+0x64/0x200 [ 1137.745525] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1137.745542] __x64_sys_sendmmsg+0x99/0x100 [ 1137.745556] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1137.745570] do_syscall_64+0xf9/0x620 [ 1137.745588] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1137.745599] RIP: 0033:0x45c1d9 [ 1137.745613] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1137.745620] RSP: 002b:00007f28ad2f0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1137.745633] RAX: ffffffffffffffda RBX: 0000000000025a40 RCX: 000000000045c1d9 [ 1137.745642] RDX: 03fffffffffffeed RSI: 0000000020001380 RDI: 0000000000000006 [ 1137.745651] RBP: 00007f28ad2f0ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1137.745659] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1137.745667] R13: 00007ffe9145ce6f R14: 00007f28ad2f19c0 R15: 000000000078bf0c [ 1138.732697] FAULT_INJECTION: forcing a failure. [ 1138.732697] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1138.807215] CPU: 1 PID: 8952 Comm: syz-executor.4 Not tainted 4.19.133-syzkaller #0 [ 1138.807223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1138.807227] Call Trace: [ 1138.807249] dump_stack+0x1fc/0x2fe [ 1138.807269] should_fail.cold+0xa/0x14 [ 1138.807285] ? setup_fault_attr+0x200/0x200 [ 1138.807307] __alloc_pages_nodemask+0x239/0x2890 [ 1138.807322] ? unwind_get_return_address+0x51/0x90 [ 1138.807337] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1138.807354] ? __save_stack_trace+0xaf/0x190 [ 1138.858145] ? __lock_acquire+0x6de/0x3ff0 [ 1138.858168] ? kasan_kmalloc+0x139/0x160 [ 1138.858181] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1138.858193] ? kmem_cache_alloc+0x122/0x370 [ 1138.858207] ? __build_skb+0x39/0x300 [ 1138.858220] ? __napi_alloc_skb+0x1c7/0x300 [ 1138.858231] ? napi_get_frags+0x5e/0x130 [ 1138.858246] ? tun_get_user+0xcbb/0x4be0 [ 1138.858258] ? tun_chr_write_iter+0xb0/0x150 [ 1138.858270] ? __vfs_write+0x51b/0x770 [ 1138.858287] ? do_syscall_64+0xf9/0x620 [ 1138.904037] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1138.909388] ? check_preemption_disabled+0x41/0x280 [ 1138.914391] ? perf_trace_preemptirq_template+0x2e6/0x460 [ 1138.919911] cache_grow_begin+0xa4/0x8a0 [ 1138.923952] ? check_preemption_disabled+0x41/0x280 [ 1138.928948] cache_alloc_refill+0x273/0x340 [ 1138.933250] kmem_cache_alloc_node_trace+0x39e/0x3b0 [ 1138.938332] __kmalloc_node_track_caller+0x38/0x70 [ 1138.943241] pskb_expand_head+0x159/0xf20 [ 1138.947368] ? __local_bh_enable_ip+0x159/0x270 [ 1138.952021] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1138.956581] tun_get_user+0x228c/0x4be0 [ 1138.960542] ? deref_stack_reg+0x134/0x1d0 [ 1138.964755] ? tun_chr_read_iter+0x1d0/0x1d0 [ 1138.969149] ? lock_downgrade+0x720/0x720 [ 1138.973274] ? check_preemption_disabled+0x41/0x280 [ 1138.978429] ? check_preemption_disabled+0x41/0x280 [ 1138.983427] tun_chr_write_iter+0xb0/0x150 [ 1138.987674] __vfs_write+0x51b/0x770 [ 1138.991371] ? kernel_read+0x110/0x110 [ 1138.995250] __kernel_write+0x109/0x370 [ 1138.999204] write_pipe_buf+0x153/0x1f0 [ 1139.003157] ? default_file_splice_read+0xa00/0xa00 [ 1139.008149] ? splice_from_pipe_next.part.0+0x2ad/0x360 [ 1139.013491] ? anon_pipe_buf_release+0x2a0/0x380 [ 1139.018225] __splice_from_pipe+0x389/0x800 [ 1139.022526] ? default_file_splice_read+0xa00/0xa00 [ 1139.027522] default_file_splice_write+0xd8/0x180 [ 1139.032356] ? generic_splice_sendpage+0x140/0x140 [ 1139.037268] ? security_file_permission+0x1c0/0x220 [ 1139.042278] ? generic_splice_sendpage+0x140/0x140 [ 1139.047185] __se_sys_splice+0xfe7/0x16d0 [ 1139.051314] ? check_preemption_disabled+0x41/0x280 [ 1139.056324] ? rcu_nmi_exit+0xb3/0x180 [ 1139.060192] ? __se_sys_tee+0xb90/0xb90 [ 1139.064146] ? trace_hardirqs_off_caller+0x69/0x210 [ 1139.069140] ? do_syscall_64+0x21/0x620 [ 1139.073094] do_syscall_64+0xf9/0x620 [ 1139.076874] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1139.082041] RIP: 0033:0x45c1d9 [ 1139.085212] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:51:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/unix\x00') setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000240)={{0xa, 0x4e20, 0xffffffff, @local, 0x40}, {0xa, 0x4e22, 0x5, @private1={0xfc, 0x1, [], 0x1}, 0x8}, 0x100, [0x40, 0x101, 0xc0, 0x2, 0x2, 0x10001, 0x7, 0x8000]}, 0x5c) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="66d13d", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="643d0000005f1b844dd883dbef1dc76b6c0f8fbb05a1fc166e0e724045b21fa6ceba4159cec799ab9da865d054eaa3d1008e3a952b622328a31ed331fa0be9aa92699ce81f0ffc99a6d3c1252698ccd4823eb803d5156c3b3fdc6da1ccb00ad2f894909dcbda90d1728d00000000000000000000f5ff000000", @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:51:22 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x14, &(0x7f0000000240), 0x8) 06:51:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r1, 0xc0385720, 0xfffffffffffffffd) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYRES64], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:51:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:51:22 executing program 5 (fault-call:5 fault-nth:2): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 1139.104090] RSP: 002b:00007fdec92dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 1139.111776] RAX: ffffffffffffffda RBX: 0000000000031a00 RCX: 000000000045c1d9 [ 1139.119021] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 1139.126269] RBP: 00007fdec92daca0 R08: 0000000000010005 R09: 0000000000000000 [ 1139.133514] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1139.140761] R13: 00007fffc0c0795f R14: 00007fdec92db9c0 R15: 000000000078bfac 06:51:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001ff) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="6e657720656372797074667320757365523a75fa4f546b2a3b65d27c9d9d8f159f7b072cb2a9084ed9d6cf46519f7880d3e0dcb39fcda091f7f30f430c1f03ae9741f77dd32c1e1bf2dad2b331dec2ac0b670244d84e7a143180b31e90a52c29118a74cc9eb6304731f17266227f9d215641c3ff670d8ad3cd9c6f57e8d618154aa2c8b7976d534dd84ea572ee4c09b1a35a01"], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) ioctl$SOUND_MIXER_READ_CAPS(r1, 0x80044dfc, &(0x7f0000000100)) 06:51:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) [ 1139.246051] encrypted_key: insufficient parameters specified [ 1139.246342] FAULT_INJECTION: forcing a failure. [ 1139.246342] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1139.304585] CPU: 0 PID: 8960 Comm: syz-executor.5 Not tainted 4.19.133-syzkaller #0 [ 1139.312416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1139.321774] Call Trace: [ 1139.324376] dump_stack+0x1fc/0x2fe [ 1139.328018] should_fail.cold+0xa/0x14 [ 1139.331913] ? lock_acquire+0x170/0x3c0 [ 1139.335897] ? setup_fault_attr+0x200/0x200 [ 1139.340317] __alloc_pages_nodemask+0x239/0x2890 [ 1139.345077] ? unwind_get_return_address+0x51/0x90 [ 1139.350009] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1139.355377] ? __save_stack_trace+0xaf/0x190 [ 1139.359799] ? __lock_acquire+0x6de/0x3ff0 [ 1139.364046] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1139.368894] ? kfree_skb+0x127/0x3d0 [ 1139.372616] ? llc_sap_state_process+0x8c/0x4e0 [ 1139.373513] encrypted_key: insufficient parameters specified [ 1139.377282] ? llc_ui_sendmsg+0x958/0xfc7 [ 1139.377298] ? sock_sendmsg+0xc3/0x120 [ 1139.377311] ? ___sys_sendmsg+0x3b3/0x8e0 [ 1139.377335] ? debug_check_no_obj_freed+0x201/0x482 [ 1139.400268] ? __lock_acquire+0x6de/0x3ff0 [ 1139.404518] alloc_pages_vma+0xf2/0x780 [ 1139.408501] wp_page_copy+0x1171/0x2080 [ 1139.412486] ? _vm_normal_page+0x132/0x510 [ 1139.416734] ? clear_subpage.constprop.0+0x100/0x100 [ 1139.421853] do_wp_page+0x2d4/0x2210 [ 1139.425573] ? finish_mkwrite_fault+0x640/0x640 [ 1139.426751] encrypted_key: insufficient parameters specified [ 1139.430241] ? __handle_mm_fault+0x15f6/0x41c0 [ 1139.430261] ? mark_held_locks+0xf0/0xf0 [ 1139.430279] __handle_mm_fault+0x258b/0x41c0 [ 1139.430297] ? vm_insert_page+0x9c0/0x9c0 06:51:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r1, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r2) ioctl$SG_GET_RESERVED_SIZE(r2, 0x2272, &(0x7f0000000400)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000380)={0xfffffda3, 0x6, 0x8000}) name_to_handle_at(r1, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000240)={0xa9, 0x3ff, "3e1a2a7cad88bffe4cae63641b7eb6a38816ebefea5253aa847517baba1b77c4f55e50957e5458df5bee5676baa46bc1540a770a373c6b8a29ba325546d540dd7eb029a5056b86118d06e4ad371cd6d874c43d7b5c2db299efcc6077b3242991b60d254b12e898c02b43efd05af11b3b624f7c049ab2e2deb56207cf174b95481f7b7724dc011377a565a2a3d8761c9aeb349ec30fe21538f04ee4143ab78d1977"}, &(0x7f00000001c0), 0x1000) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="9ca6713e746d6f64653d30303030303030383030303030303230303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) [ 1139.430311] ? handle_mm_fault+0x1d9/0xb10 [ 1139.430335] ? check_preemption_disabled+0x41/0x280 [ 1139.430351] handle_mm_fault+0x436/0xb10 [ 1139.430371] __do_page_fault+0x6d8/0xde0 [ 1139.430392] ? trace_hardirqs_off_caller+0x69/0x210 [ 1139.430405] ? spurious_fault+0x840/0x840 [ 1139.430422] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1139.430442] page_fault+0x1e/0x30 [ 1139.430456] RIP: 0010:__put_user_4+0x1c/0x30 [ 1139.430468] Code: 1f 00 c3 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 8b 1c 25 40 ee 01 00 48 8b 9b 18 14 00 00 48 83 eb 03 48 39 d9 73 3c 0f 1f 00 <89> 01 31 c0 0f 1f 00 c3 66 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 [ 1139.430475] RSP: 0018:ffff888208d47cd0 EFLAGS: 00010297 [ 1139.430485] RAX: 0000000000000000 RBX: 00007fffffffeffd RCX: 00000000200013b8 [ 1139.430492] RDX: 00000000000006cb RSI: ffffffff85adba92 RDI: 0000000000000282 [ 1139.430499] RBP: 0000000000040000 R08: ffffffff8b3ead78 R09: 0000000000000000 [ 1139.430507] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1139.430513] R13: 0000000020001380 R14: 0000000000000400 R15: 00000000000003ff [ 1139.430534] ? __sys_sendmmsg+0x1c2/0x470 [ 1139.430550] __sys_sendmmsg+0x1d3/0x470 [ 1139.430566] ? __ia32_sys_sendmsg+0x220/0x220 [ 1139.430581] ? lock_downgrade+0x720/0x720 [ 1139.430605] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1139.430619] ? perf_trace_preemptirq_template+0x2e6/0x460 [ 1139.430634] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1139.430647] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1139.430661] ? tracing_start_sched_switch.cold+0x74/0x74 [ 1139.430675] ? do_syscall_64+0x207/0x620 06:51:22 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x15, &(0x7f0000000240), 0x8) [ 1139.430688] ? check_preemption_disabled+0x41/0x280 [ 1139.430705] ? rcu_nmi_exit+0xb3/0x180 [ 1139.430718] ? trace_hardirqs_off+0x64/0x200 [ 1139.430734] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1139.430752] __x64_sys_sendmmsg+0x99/0x100 [ 1139.430767] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1139.430781] do_syscall_64+0xf9/0x620 [ 1139.430800] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1139.430810] RIP: 0033:0x45c1d9 06:51:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x6100, 0x0) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000200)={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x1, @local}, 0xa, {0x2, 0x4e21, @local}, 'syz_tun\x00'}) prctl$PR_GET_NAME(0x10, &(0x7f0000000040)=""/189) [ 1139.430823] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1139.430836] RSP: 002b:00007f28ad2f0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1139.430849] RAX: ffffffffffffffda RBX: 0000000000025a40 RCX: 000000000045c1d9 [ 1139.430857] RDX: 03fffffffffffeed RSI: 0000000020001380 RDI: 0000000000000006 [ 1139.430865] RBP: 00007f28ad2f0ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1139.430872] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1139.430880] R13: 00007ffe9145ce6f R14: 00007f28ad2f19c0 R15: 000000000078bf0c 06:51:22 executing program 5 (fault-call:5 fault-nth:3): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 1139.796806] encrypted_key: keylen parameter is missing [ 1139.929316] FAULT_INJECTION: forcing a failure. [ 1139.929316] name failslab, interval 1, probability 0, space 0, times 0 [ 1139.966036] CPU: 0 PID: 9004 Comm: syz-executor.5 Not tainted 4.19.133-syzkaller #0 [ 1139.973872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1139.983235] Call Trace: [ 1139.985846] dump_stack+0x1fc/0x2fe [ 1139.989508] should_fail.cold+0xa/0x14 [ 1139.993405] ? setup_fault_attr+0x200/0x200 [ 1139.997730] ? lock_acquire+0x170/0x3c0 [ 1140.001717] __should_failslab+0x115/0x180 [ 1140.005957] should_failslab+0x5/0xf [ 1140.009688] kmem_cache_alloc_node+0x245/0x3b0 [ 1140.014278] __alloc_skb+0x71/0x560 [ 1140.017912] alloc_skb_with_frags+0x92/0x570 [ 1140.022321] ? mark_held_locks+0xf0/0xf0 [ 1140.026392] sock_alloc_send_pskb+0x6e1/0x830 [ 1140.030904] ? sock_kzfree_s+0x60/0x60 [ 1140.034795] ? rcu_nmi_exit+0xb3/0x180 [ 1140.038684] ? __local_bh_enable_ip+0x119/0x270 [ 1140.043355] ? trace_hardirqs_off+0x64/0x200 [ 1140.047766] ? __local_bh_enable_ip+0x159/0x270 [ 1140.052450] llc_ui_sendmsg+0x300/0xfc7 [ 1140.056431] ? llc_ui_connect+0xc20/0xc20 [ 1140.060585] ? kernel_recvmsg+0x220/0x220 [ 1140.064749] ? llc_ui_connect+0xc20/0xc20 [ 1140.069102] sock_sendmsg+0xc3/0x120 [ 1140.072834] ___sys_sendmsg+0x3b3/0x8e0 [ 1140.076814] ? copy_msghdr_from_user+0x440/0x440 [ 1140.081583] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1140.086431] ? tracing_start_sched_switch.cold+0x74/0x74 [ 1140.091889] ? check_preemption_disabled+0x41/0x280 [ 1140.096912] ? rcu_nmi_exit+0xb3/0x180 [ 1140.100802] ? trace_hardirqs_off+0x64/0x200 [ 1140.105225] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1140.109990] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1140.114577] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1140.119342] ? __do_page_fault+0x1ca/0xde0 [ 1140.123584] ? retint_kernel+0x2d/0x2d [ 1140.127490] __sys_sendmmsg+0x195/0x470 [ 1140.131479] ? __ia32_sys_sendmsg+0x220/0x220 [ 1140.135984] ? lock_downgrade+0x720/0x720 [ 1140.140151] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1140.145002] ? perf_trace_preemptirq_template+0x2e6/0x460 [ 1140.150584] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1140.155952] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1140.160801] ? tracing_start_sched_switch.cold+0x74/0x74 [ 1140.166265] ? do_syscall_64+0x207/0x620 [ 1140.170334] ? check_preemption_disabled+0x41/0x280 [ 1140.175356] ? rcu_nmi_exit+0xb3/0x180 [ 1140.179252] ? trace_hardirqs_off+0x64/0x200 [ 1140.183666] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1140.189034] __x64_sys_sendmmsg+0x99/0x100 [ 1140.193273] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1140.197856] do_syscall_64+0xf9/0x620 [ 1140.201667] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1140.206860] RIP: 0033:0x45c1d9 [ 1140.210054] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1140.228955] RSP: 002b:00007f28ad2cfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1140.236666] RAX: ffffffffffffffda RBX: 0000000000025a40 RCX: 000000000045c1d9 [ 1140.243938] RDX: 03fffffffffffeed RSI: 0000000020001380 RDI: 0000000000000006 [ 1140.251212] RBP: 00007f28ad2cfca0 R08: 0000000000000000 R09: 0000000000000000 [ 1140.258483] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1140.265754] R13: 00007ffe9145ce6f R14: 00007f28ad2d09c0 R15: 000000000078bfac 06:51:23 executing program 4 (fault-call:12 fault-nth:7): pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:51:23 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x16, &(0x7f0000000240), 0x8) 06:51:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000240)={@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, 0x1, 0x6, [@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @local, @rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0x1e}]}, 0x28) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r2, 0x0, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}]}, 0x30}}, 0x850) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:51:23 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:51:23 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x17, &(0x7f0000000240), 0x8) [ 1140.599768] encrypted_key: keylen parameter is missing [ 1140.690161] FAULT_INJECTION: forcing a failure. [ 1140.690161] name failslab, interval 1, probability 0, space 0, times 0 [ 1140.701479] CPU: 0 PID: 9029 Comm: syz-executor.4 Not tainted 4.19.133-syzkaller #0 [ 1140.709276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1140.718631] Call Trace: [ 1140.721233] dump_stack+0x1fc/0x2fe [ 1140.724871] should_fail.cold+0xa/0x14 [ 1140.728769] ? setup_fault_attr+0x200/0x200 [ 1140.733101] ? lock_downgrade+0x720/0x720 [ 1140.737251] ? perf_trace_preemptirq_template+0x2e6/0x460 [ 1140.742798] __should_failslab+0x115/0x180 [ 1140.747042] should_failslab+0x5/0xf [ 1140.750780] kmem_cache_alloc+0x3f/0x370 [ 1140.754843] __build_skb+0x39/0x300 [ 1140.758482] __napi_alloc_skb+0x1c7/0x300 [ 1140.762638] napi_get_frags+0x5e/0x130 [ 1140.766533] tun_get_user+0xcbb/0x4be0 [ 1140.770444] ? tun_chr_read_iter+0x1d0/0x1d0 [ 1140.774864] ? lock_downgrade+0x720/0x720 [ 1140.779011] ? check_preemption_disabled+0x41/0x280 [ 1140.784026] ? check_preemption_disabled+0x41/0x280 06:51:23 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x18, &(0x7f0000000240), 0x8) [ 1140.789054] tun_chr_write_iter+0xb0/0x150 [ 1140.793295] __vfs_write+0x51b/0x770 [ 1140.797012] ? kernel_read+0x110/0x110 [ 1140.800910] ? perf_trace_preemptirq_template+0x2e6/0x460 [ 1140.806455] ? tracing_start_sched_switch.cold+0x74/0x74 [ 1140.811907] ? debug_check_no_obj_freed+0x201/0x482 [ 1140.816953] __kernel_write+0x109/0x370 [ 1140.821023] write_pipe_buf+0x153/0x1f0 [ 1140.825002] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1140.829705] ? default_file_splice_read+0xa00/0xa00 [ 1140.834721] ? __put_page+0xcc/0x3a0 [ 1140.838433] ? anon_pipe_buf_release+0x2c3/0x380 [ 1140.843193] __splice_from_pipe+0x389/0x800 [ 1140.847518] ? default_file_splice_read+0xa00/0xa00 [ 1140.852545] default_file_splice_write+0xd8/0x180 [ 1140.857396] ? generic_splice_sendpage+0x140/0x140 [ 1140.862339] ? security_file_permission+0x1c0/0x220 [ 1140.867371] ? generic_splice_sendpage+0x140/0x140 [ 1140.872305] __se_sys_splice+0xfe7/0x16d0 [ 1140.876467] ? check_preemption_disabled+0x41/0x280 [ 1140.881495] ? rcu_nmi_exit+0xb3/0x180 [ 1140.885383] ? __se_sys_tee+0xb90/0xb90 [ 1140.889365] ? trace_hardirqs_off_caller+0x69/0x210 [ 1140.894385] ? do_syscall_64+0x21/0x620 [ 1140.898361] do_syscall_64+0xf9/0x620 [ 1140.902157] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1140.907331] RIP: 0033:0x45c1d9 [ 1140.910506] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1140.929393] RSP: 002b:00007fdec9298c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 06:51:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r1) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_SET_REG(r2, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)=ANY=[@ANYBLOB="440000000ea758d86b5b929afaac7067865e5c459ba5e898ca792273e78fbb8ff44bffc62f22e8771220abf857b7119a01145441", @ANYRES16=r3, @ANYBLOB="02002dbd7000fbdbdf251a0000001c0022800800070000000000080002000080"], 0x44}, 0x1, 0x0, 0x0, 0x10}, 0x4404) sendmsg$NL80211_CMD_GET_MESH_CONFIG(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r3, 0x10, 0x70bd2a, 0x25dfdbfd, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x4, 0x4}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x3f, 0x1}}]}, 0x34}, 0x1, 0x0, 0x0, 0x24008000}, 0x24008014) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1140.937086] RAX: ffffffffffffffda RBX: 0000000000031a00 RCX: 000000000045c1d9 [ 1140.944336] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 1140.951586] RBP: 00007fdec9298ca0 R08: 0000000000010005 R09: 0000000000000000 [ 1140.958834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 1140.966085] R13: 00007fffc0c0795f R14: 00007fdec92999c0 R15: 000000000078c0ec 06:51:23 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x19, &(0x7f0000000240), 0x8) [ 1141.078017] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=42766 sclass=netlink_route_socket pid=9036 comm=syz-executor.1 [ 1141.110916] encrypted_key: keylen parameter is missing 06:51:24 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 06:51:24 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x1e, &(0x7f0000000240), 0x8) 06:51:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000040), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000400)=0x260000) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r3, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x14c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x11c, 0x2, [@TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14, 0x1, {0x0, 0x0, 0x7ff, 0x1a}}]}}]}, 0x14c}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@empty, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@multicast2, @in=@private=0xa010100, 0x4e24, 0x0, 0x4e24, 0x2, 0x2, 0x80, 0x20, 0xff, r5, r7}, {0x0, 0x9, 0x1a9, 0x80000000, 0x7, 0x3, 0x1, 0x10001}, {0x7ff, 0x4, 0x8, 0x2}, 0x8, 0x6e6bb9, 0x2, 0x1, 0x3, 0x3}, {{@in=@loopback, 0x4d6, 0x6c}, 0x0, @in6=@remote, 0x3500, 0x3, 0x0, 0x1, 0x80000001, 0x5, 0x7}}, 0xe8) keyctl$instantiate(0xc, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6ef3bc723a750200006d000000000000000000593b7a70ce54a593a9b3c3a41d66dab776d2b73f1a019d7ff5bac473e2701945062a35b138311c9fc922c6ac7358bc55124299c5b06fd5a5319e4be7c0ab3e9d7e8c426459443ccfc3b936c6da36c61e90fa574a57c7292c3844301a4565ff4a5f92a1dc16c345ec65b8d9132cef6881c9eee780debf7cb6e6d55800c51b922aa61923809c3d1782e6144be3f4a6437c60a829e2969b0f21c0329794cbb0e676b0bf649b7642b9508798330d3c59dc834afd4b8dbcc33ef454ddfc3d2be7b7083285e13ad1cfff9c69656546"], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) fcntl$setlease(r0, 0x400, 0x0) 06:51:24 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x21, &(0x7f0000000240), 0x8) [ 1141.443726] encrypted_key: insufficient parameters specified 06:51:24 executing program 4 (fault-call:12 fault-nth:8): pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:51:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x3, 0x0) 06:51:24 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x22, &(0x7f0000000240), 0x8) 06:51:24 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x4) 06:51:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20000200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000005a00)='/dev/dlm-control\x00', 0x101000, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000005a40)=0x6, 0x4) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='ns user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r3 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r3) getsockopt$CAN_RAW_FILTER(r3, 0x65, 0x1, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f00000000c0)=0x38) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000003, 0x10, r3, 0x100000000) write$FUSE_POLL(r1, &(0x7f0000000040)={0x18, 0xffffffffffffffda, 0x7, {0x881}}, 0x18) 06:51:24 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x23, &(0x7f0000000240), 0x8) [ 1142.118552] encrypted_key: keylen parameter is missing [ 1142.152669] encrypted_key: keylen parameter is missing 06:51:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$trusted_overlay_opaque(r0, 0xfffffffffffffffe, &(0x7f0000000040)='y\x00', 0x2, 0x4) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:51:25 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x24, &(0x7f0000000240), 0x8) [ 1142.282633] FAULT_INJECTION: forcing a failure. [ 1142.282633] name failslab, interval 1, probability 0, space 0, times 0 [ 1142.307271] encrypted_key: keylen parameter is missing [ 1142.317136] encrypted_key: keylen parameter is missing [ 1142.329907] CPU: 1 PID: 9076 Comm: syz-executor.4 Not tainted 4.19.133-syzkaller #0 [ 1142.337729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1142.347087] Call Trace: [ 1142.349686] dump_stack+0x1fc/0x2fe [ 1142.353329] should_fail.cold+0xa/0x14 [ 1142.357230] ? setup_fault_attr+0x200/0x200 [ 1142.361558] ? tracing_start_sched_switch.cold+0x74/0x74 [ 1142.367020] ? check_preemption_disabled+0x41/0x280 [ 1142.372041] ? check_preemption_disabled+0x41/0x280 [ 1142.377069] __should_failslab+0x115/0x180 [ 1142.381309] should_failslab+0x5/0xf [ 1142.385030] kmem_cache_alloc_node_trace+0x57/0x3b0 [ 1142.390055] __kmalloc_node_track_caller+0x38/0x70 [ 1142.394993] pskb_expand_head+0x159/0xf20 [ 1142.399152] ? __local_bh_enable_ip+0x159/0x270 [ 1142.403827] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1142.408420] tun_get_user+0x228c/0x4be0 [ 1142.412415] ? tun_chr_read_iter+0x1d0/0x1d0 [ 1142.416840] ? lock_downgrade+0x720/0x720 [ 1142.420990] ? check_preemption_disabled+0x41/0x280 [ 1142.426014] ? check_preemption_disabled+0x41/0x280 06:51:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x101801, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7002) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000380)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000040)={{0x1b, 0x3d, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000340)={0x0, 0x1, r1, 0x4, 0x80000}) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) ioprio_get$pid(0x1, r2) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="66649bc8ae1f008f38fe46852ce38044e53d", @ANYRESHEX=r3, @ANYBLOB=',rootm00200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643df51ac4a00200000000000000a156", @ANYRESDEC=0x0, @ANYRESHEX]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RRENAME(r4, &(0x7f0000000100)={0x7, 0x15, 0x1}, 0x7) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:51:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="6e65f7206563727970746673207573723a75d03bcd6cf21b7f23ee7fc4e752e8635f211affdd922dafa62af2d6dee3e0ea8e7e61"], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:51:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x11) [ 1142.426177] encrypted_key: insufficient parameters specified [ 1142.431036] tun_chr_write_iter+0xb0/0x150 [ 1142.431056] __vfs_write+0x51b/0x770 [ 1142.431073] ? kernel_read+0x110/0x110 [ 1142.431108] ? perf_trace_preemptirq_template+0x2e6/0x460 [ 1142.431124] ? tracing_start_sched_switch.cold+0x74/0x74 [ 1142.431139] ? debug_check_no_obj_freed+0x201/0x482 [ 1142.464679] __kernel_write+0x109/0x370 [ 1142.468670] write_pipe_buf+0x153/0x1f0 [ 1142.472702] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1142.477295] ? default_file_splice_read+0xa00/0xa00 06:51:25 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x64, &(0x7f0000000240), 0x8) [ 1142.482331] ? __put_page+0xcc/0x3a0 [ 1142.482345] ? anon_pipe_buf_release+0x2c3/0x380 [ 1142.482362] __splice_from_pipe+0x389/0x800 [ 1142.482379] ? default_file_splice_read+0xa00/0xa00 [ 1142.482399] default_file_splice_write+0xd8/0x180 [ 1142.482414] ? generic_splice_sendpage+0x140/0x140 [ 1142.482435] ? security_file_permission+0x1c0/0x220 [ 1142.482454] ? generic_splice_sendpage+0x140/0x140 [ 1142.482466] __se_sys_splice+0xfe7/0x16d0 [ 1142.482483] ? check_preemption_disabled+0x41/0x280 [ 1142.482498] ? rcu_nmi_exit+0xb3/0x180 [ 1142.482511] ? __se_sys_tee+0xb90/0xb90 [ 1142.482526] ? trace_hardirqs_off_caller+0x69/0x210 [ 1142.482548] ? do_syscall_64+0x21/0x620 [ 1142.482565] do_syscall_64+0xf9/0x620 [ 1142.482583] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1142.482593] RIP: 0033:0x45c1d9 [ 1142.482605] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1142.482611] RSP: 002b:00007fdec92fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 1142.482624] RAX: ffffffffffffffda RBX: 0000000000031a00 RCX: 000000000045c1d9 [ 1142.482631] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 1142.482638] RBP: 00007fdec92fbca0 R08: 0000000000010005 R09: 0000000000000000 [ 1142.482645] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008 [ 1142.482652] R13: 00007fffc0c0795f R14: 00007fdec92fc9c0 R15: 000000000078bf0c 06:51:26 executing program 4 (fault-call:12 fault-nth:9): pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:51:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:51:26 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x65, &(0x7f0000000240), 0x8) 06:51:26 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x1100) 06:51:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r4, r2, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000240)='./file0/file0\x00', 0x7fff, 0x4, &(0x7f00000004c0)=[{&(0x7f0000000280)="45e581087118f3a058ea626caca8b5c90c0e8a7e7283fa56a6cdcd969e60a02d3888f00770a5cbad0e9c003d3426f506261537d18c33a86ab4aade1c715b9b0b296d4875448620a5a0bae1c9fa7ad8befd26ab0f83ffaa28115edf076643ba47e672e474a7a1dda8fad82c9e5b9d1f36a8e24365cebfdf2e5c0e4c3873d1950b1f578027c369d6b95b10e207599c9f3f2e4576fcf4b5fc42f361620a2fd3e0261a160c3b9f31e9", 0xa7, 0x400}, {&(0x7f0000000340)="8d84ee2f6c806598", 0x8, 0x3}, {&(0x7f0000000380)="59c5cdee7a8665ca47892e5a8985f20f8692310ee5ca0d31729e313825364e4ab293a50c05b3aa8cebadfee8aa54ebe3a2510418ed29e2b2692c4c1ccb66c9ea57abb21582bbdf1368e0b394df814ef91fb29a7ac1563022eb3651c75702b7f59831b0a0d0e10d412e0049c914d0ef31bafa130da6c7b8578b9451131f7957576a2a639e021604e4befb5f30f0a880737b2e818edab165f4ea539377ebe7", 0x9e, 0x6}, {&(0x7f0000000440)="9352f2f3c1e2a9033874244411c04edfbacabf56fe7967f4d82c9f5c3e6b0fc10ed6eca1a51f03726bcf8ff89fcbd80d653e96ee2a683e2be1ce1558f8153a478b7d60355b24257fd76c015fdc53ebaa9f66b0c2d3ca5d4debc11861335c2da06a2f", 0x62}], 0x1000, &(0x7f0000000600)={[{@usrquota='usrquota'}, {@orlov='orlov'}, {@abort='abort'}, {@usrquota='usrquota'}, {@usrjquota='usrjquota='}, {@i_version='i_version'}], [{@fowner_lt={'fowner<', r0}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@fowner_lt={'fowner<', r4}}, {@subj_user={'subj_user', 0x3d, '}[-&),@/@&}!\\*#%$'}}]}) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) ioctl$SG_GET_PACK_ID(r6, 0x227c, &(0x7f0000000080)) 06:51:26 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(0x0, 0x3, 0x0) 06:51:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657720657272797032f83ffacaaf38dfcfb2"], 0x2d, 0x0) r3 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x1, 0x500) fchdir(r0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') socket$isdn(0x22, 0x3, 0x25) preadv(r4, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000080)={0x0, 0x1, 0x4, 0x1, 0x80000401, {}, {0x3, 0x0, 0x0, 0x6c, 0x81, 0x53, "69ce33e7"}, 0xa, 0x2, @offset=0x2, 0x9b9d836, 0x0, r3}) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x14c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x11c, 0x2, [@TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14, 0x1, {0x0, 0x0, 0x7ff, 0x1a}}]}}]}, 0x14c}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000280)={'gre0\x00', &(0x7f0000000500)={'gretap0\x00', r6, 0x10, 0x80, 0x0, 0x800, {{0x29, 0x4, 0x1, 0x3c, 0xa4, 0x64, 0x0, 0x81, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, {[@cipso={0x86, 0x12, 0xffffffffffffffff, [{0x5, 0xc, "63be361a695d6ad8516e"}]}, @timestamp_prespec={0x44, 0x14, 0x4a, 0x3, 0x9, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8000}, {@broadcast, 0x4}]}, @timestamp={0x44, 0x1c, 0xe3, 0x0, 0x1, [0x40, 0x3, 0x200, 0x2, 0x9, 0xffff]}, @lsrr={0x83, 0x7, 0xc3, [@broadcast]}, @timestamp={0x44, 0x10, 0xb9, 0x0, 0x6, [0x1ff, 0x0, 0x8d]}, @cipso={0x86, 0x34, 0x0, [{0x5, 0x10, "c95799d63ff7479aace9310cf400"}, {0x0, 0x3, "88"}, {0x6, 0x12, "b4d1e4b018d60268f0d2ebd798a20916"}, {0x1, 0x9, "4e37abd7f39dca"}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f00000004c0)={'ip6gre0\x00', &(0x7f0000000440)={'syztnl1\x00', r8, 0x29, 0xd1, 0x0, 0x31400000, 0x8, @dev={0xfe, 0x80, [], 0x17}, @mcast1, 0x80, 0x700, 0x3ff, 0xfffffbff}}) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1143.247053] encrypted_key: keylen parameter is missing 06:51:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000040)={{0x1b, 0x3d, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) ioctl$int_out(r1, 0x5460, &(0x7f0000000080)) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r2) ioctl$SIOCAX25CTLCON(r2, 0x89e8, &(0x7f0000000240)={@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, 0x8, 0xd5fe, 0x7, [@bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) 06:51:26 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(0x0, 0x3, 0x0) 06:51:26 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x6b, &(0x7f0000000240), 0x8) [ 1143.486208] FAULT_INJECTION: forcing a failure. [ 1143.486208] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1143.498043] CPU: 1 PID: 9155 Comm: syz-executor.4 Not tainted 4.19.133-syzkaller #0 [ 1143.505929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1143.515288] Call Trace: [ 1143.517887] dump_stack+0x1fc/0x2fe [ 1143.521529] should_fail.cold+0xa/0x14 [ 1143.525439] ? setup_fault_attr+0x200/0x200 [ 1143.529784] __alloc_pages_nodemask+0x239/0x2890 [ 1143.534562] ? unwind_get_return_address+0x51/0x90 [ 1143.534579] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1143.534592] ? __save_stack_trace+0xaf/0x190 [ 1143.534607] ? __lock_acquire+0x6de/0x3ff0 [ 1143.534633] ? kasan_kmalloc+0x139/0x160 [ 1143.534650] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1143.534663] ? kmem_cache_alloc+0x122/0x370 [ 1143.534677] ? __build_skb+0x39/0x300 [ 1143.534690] ? __napi_alloc_skb+0x1c7/0x300 [ 1143.534702] ? napi_get_frags+0x5e/0x130 [ 1143.534717] ? tun_get_user+0xcbb/0x4be0 [ 1143.534731] ? tun_chr_write_iter+0xb0/0x150 [ 1143.534745] ? __vfs_write+0x51b/0x770 [ 1143.534760] ? do_syscall_64+0xf9/0x620 [ 1143.534772] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1143.534786] ? kfree_skbmem+0xc1/0x140 [ 1143.534799] ? kfree_skb+0x127/0x3d0 [ 1143.534813] ? check_preemption_disabled+0x41/0x280 [ 1143.534831] ? perf_trace_preemptirq_template+0x2e6/0x460 [ 1143.534850] cache_grow_begin+0xa4/0x8a0 [ 1143.534864] ? check_preemption_disabled+0x41/0x280 [ 1143.534882] cache_alloc_refill+0x273/0x340 [ 1143.534901] kmem_cache_alloc_node_trace+0x39e/0x3b0 [ 1143.534920] __kmalloc_node_track_caller+0x38/0x70 [ 1143.534935] pskb_expand_head+0x159/0xf20 [ 1143.534953] ? __local_bh_enable_ip+0x159/0x270 [ 1143.534969] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1143.534985] tun_get_user+0x228c/0x4be0 [ 1143.535011] ? tun_chr_read_iter+0x1d0/0x1d0 [ 1143.535034] ? lock_downgrade+0x720/0x720 [ 1143.535046] ? check_preemption_disabled+0x41/0x280 [ 1143.535060] ? check_preemption_disabled+0x41/0x280 [ 1143.535082] tun_chr_write_iter+0xb0/0x150 [ 1143.535097] __vfs_write+0x51b/0x770 [ 1143.535113] ? kernel_read+0x110/0x110 [ 1143.535134] ? perf_trace_preemptirq_template+0x2e6/0x460 [ 1143.535151] ? tracing_start_sched_switch.cold+0x74/0x74 [ 1143.535163] ? debug_check_no_obj_freed+0x201/0x482 [ 1143.535185] __kernel_write+0x109/0x370 [ 1143.535204] write_pipe_buf+0x153/0x1f0 [ 1143.535216] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1143.535233] ? default_file_splice_read+0xa00/0xa00 [ 1143.554480] encrypted_key: master key parameter 'erryp2ø?úʯ8ßϲ' is invalid [ 1143.558166] ? __put_page+0xcc/0x3a0 06:51:26 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x6e, &(0x7f0000000240), 0x8) [ 1143.558183] ? anon_pipe_buf_release+0x2c3/0x380 [ 1143.558201] __splice_from_pipe+0x389/0x800 [ 1143.558218] ? default_file_splice_read+0xa00/0xa00 [ 1143.558236] default_file_splice_write+0xd8/0x180 [ 1143.753657] ? generic_splice_sendpage+0x140/0x140 [ 1143.753673] ? security_file_permission+0x1c0/0x220 06:51:26 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(0x0, 0x3, 0x0) [ 1143.753687] ? generic_splice_sendpage+0x140/0x140 [ 1143.753697] __se_sys_splice+0xfe7/0x16d0 [ 1143.753712] ? check_preemption_disabled+0x41/0x280 [ 1143.753724] ? rcu_nmi_exit+0xb3/0x180 [ 1143.753734] ? __se_sys_tee+0xb90/0xb90 [ 1143.753746] ? trace_hardirqs_off_caller+0x69/0x210 [ 1143.753758] ? do_syscall_64+0x21/0x620 [ 1143.753770] do_syscall_64+0xf9/0x620 [ 1143.753784] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1143.753794] RIP: 0033:0x45c1d9 [ 1143.753805] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1143.753810] RSP: 002b:00007fdec9298c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 1143.753820] RAX: ffffffffffffffda RBX: 0000000000031a00 RCX: 000000000045c1d9 [ 1143.753825] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 1143.753831] RBP: 00007fdec9298ca0 R08: 0000000000010005 R09: 0000000000000000 [ 1143.753836] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000009 [ 1143.753842] R13: 00007fffc0c0795f R14: 00007fdec92999c0 R15: 000000000078c0ec [ 1143.859581] encrypted_key: master key parameter 'erryp2ø?úʯ8ßϲ' is invalid 06:51:27 executing program 4 (fault-call:12 fault-nth:10): pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:51:27 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x2000) 06:51:27 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x71, &(0x7f0000000240), 0x8) 06:51:27 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:51:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c02726f75705f69643d", @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000040)={{0x1b, 0x3d, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)={{0x1b, 0x3d, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) dup3(r1, r2, 0x80000) 06:51:27 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x14c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x11c, 0x2, [@TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14, 0x1, {0x0, 0x0, 0x7ff, 0x1a}}]}}]}, 0x14c}}, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x14c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x11c, 0x2, [@TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14, 0x1, {0x0, 0x0, 0x7ff, 0x1a}}]}}]}, 0x14c}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x14c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x11c, 0x2, [@TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14, 0x1, {0x0, 0x0, 0x7ff, 0x1a}}]}}]}, 0x14c}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000680)={0x138, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}]}, @HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7427d41c14bbd303}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}]}]}, 0x138}, 0x1, 0x0, 0x0, 0x20000014}, 0x24046084) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="0efce48b8df34e7e43f469c487bd"], 0x2d, 0x0) r9 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key(&(0x7f0000000040)='encrypted\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f00000001c0)="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", 0x16c, r9) 06:51:27 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:51:27 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x72, &(0x7f0000000240), 0x8) 06:51:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000140)={r4}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0)={r4, 0xffff}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000080)=r4, 0x4) 06:51:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r1, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000001c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x650, 0x2b8, 0x0, 0x0, 0x2b8, 0x2b8, 0x5b8, 0x5b8, 0x5b8, 0x5b8, 0x5b8, 0x6, &(0x7f0000000040), {[{{@uncond, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@loopback, @rand_addr=0x64010102, 0xff, 0x0, 'veth1\x00', 'ip6tnl0\x00', {}, {}, 0x21, 0x1, 0x2}, 0x0, 0x1e0, 0x220, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0xe}}, @common=@inet=@sctp={{0x148, 'sctp\x00'}, {[0x4e23, 0x4e21], [0x4e23, 0x4e23], [0x2000, 0x0, 0x5, 0x8, 0x80, 0xffffffff, 0x4, 0x4, 0x2, 0x8001, 0x6, 0x0, 0x7fffffff, 0x7ff, 0x6, 0x6, 0x3, 0x0, 0x5, 0x3f, 0x40000000, 0x40, 0x3ff, 0x1, 0x7ff, 0x6, 0x101, 0x38, 0x95, 0x6, 0xba3, 0x3, 0x0, 0x20, 0x7, 0x4e, 0x3, 0x80000000, 0x4, 0xf2, 0x1, 0x2, 0x5, 0x0, 0x7, 0x8, 0x814, 0x401, 0x2f, 0x4, 0x3, 0x6f, 0x2, 0x6, 0x4, 0x10001, 0x80000001, 0x7fffffff, 0x7, 0x4, 0xfffffffa, 0x1, 0x0, 0x7], 0x1, [{0xff, 0x20, 0x4d}, {0x40, 0x1, 0x9}, {0x6, 0x50, 0x81}, {0xf9, 0x80, 0x1}], 0x1, 0x0, 0x1}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "d8cb3f121aefecdcaea4cf84a9d95ea3f68e7738858a75133272bc94ca06"}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x2, 0x20}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0x1}}]}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x91b, 0xff, 0x2}}}, {{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@inet=@iprange={{0x68, 'iprange\x00'}, {@ipv6=@private0={0xfc, 0x0, [], 0x1}, @ipv6=@rand_addr=' \x01\x00', @ipv4=@dev={0xac, 0x14, 0x14, 0x40}, @ipv6=@private1, 0x2}}, @common=@addrtype={{0x30, 'addrtype\x00'}, {0x500, 0x20, 0x1, 0x1}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0x4, 0x1, 0x2}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x1e, 0x6c, 0x3ff}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6b0) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1144.837560] FAULT_INJECTION: forcing a failure. [ 1144.837560] name failslab, interval 1, probability 0, space 0, times 0 [ 1144.848870] CPU: 1 PID: 9239 Comm: syz-executor.4 Not tainted 4.19.133-syzkaller #0 [ 1144.856671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1144.866037] Call Trace: [ 1144.868639] dump_stack+0x1fc/0x2fe [ 1144.872281] should_fail.cold+0xa/0x14 [ 1144.876182] ? setup_fault_attr+0x200/0x200 [ 1144.880515] ? lock_downgrade+0x720/0x720 [ 1144.884667] ? perf_trace_preemptirq_template+0x2e6/0x460 [ 1144.890213] __should_failslab+0x115/0x180 [ 1144.894454] should_failslab+0x5/0xf [ 1144.898171] kmem_cache_alloc+0x3f/0x370 [ 1144.902243] __build_skb+0x39/0x300 [ 1144.905873] __napi_alloc_skb+0x1c7/0x300 [ 1144.910029] napi_get_frags+0x5e/0x130 [ 1144.913920] tun_get_user+0xcbb/0x4be0 [ 1144.917831] ? tun_chr_read_iter+0x1d0/0x1d0 [ 1144.922255] ? lock_downgrade+0x720/0x720 [ 1144.923810] encrypted_key: keylen parameter is missing [ 1144.926406] ? check_preemption_disabled+0x41/0x280 06:51:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="6e657720656372797074667320757365723b75d2193429f9b165508596a2a6806e051ee82f5dbc93d00d979e6ffa6b5278ea57d6dc6fcfc7f095c242f3ffbea6802c112c54db62dc5be375f4664afcdc70fccedff7ea38a91dc9b651ba17f4e6960ef4cb67408e5021ed506e7dd94b67624d62cd6ee468124e2e795958abfa972b8e594470652db653d1a2c26807f364438ea32923bffd804cdd03020db6353f59f6b32efa37701019ee6cb86acabe5b0baf4f2b6cc446b4b2906d7c878fc6cb84fb1c80816c6a"], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1144.926423] ? check_preemption_disabled+0x41/0x280 [ 1144.926447] tun_chr_write_iter+0xb0/0x150 [ 1144.926467] __vfs_write+0x51b/0x770 [ 1144.949652] ? kernel_read+0x110/0x110 [ 1144.953564] ? perf_trace_preemptirq_template+0x2e6/0x460 [ 1144.959111] ? tracing_start_sched_switch.cold+0x74/0x74 [ 1144.964566] ? debug_check_no_obj_freed+0x201/0x482 [ 1144.969599] __kernel_write+0x109/0x370 [ 1144.973581] write_pipe_buf+0x153/0x1f0 [ 1144.977567] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1144.982157] ? default_file_splice_read+0xa00/0xa00 06:51:27 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x75, &(0x7f0000000240), 0x8) [ 1144.987175] ? __put_page+0xcc/0x3a0 [ 1144.990892] ? anon_pipe_buf_release+0x2c3/0x380 [ 1144.995656] __splice_from_pipe+0x389/0x800 [ 1144.999988] ? default_file_splice_read+0xa00/0xa00 [ 1145.005013] default_file_splice_write+0xd8/0x180 [ 1145.009860] ? generic_splice_sendpage+0x140/0x140 [ 1145.019054] ? security_file_permission+0x1c0/0x220 [ 1145.024087] ? generic_splice_sendpage+0x140/0x140 [ 1145.029026] __se_sys_splice+0xfe7/0x16d0 [ 1145.033186] ? check_preemption_disabled+0x41/0x280 [ 1145.038210] ? rcu_nmi_exit+0xb3/0x180 [ 1145.042101] ? __se_sys_tee+0xb90/0xb90 [ 1145.046080] ? trace_hardirqs_off_caller+0x69/0x210 [ 1145.051102] ? do_syscall_64+0x21/0x620 [ 1145.055087] do_syscall_64+0xf9/0x620 [ 1145.058897] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1145.064090] RIP: 0033:0x45c1d9 [ 1145.067284] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1145.086188] RSP: 002b:00007fdec9298c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 1145.093902] RAX: ffffffffffffffda RBX: 0000000000031a00 RCX: 000000000045c1d9 [ 1145.101174] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 1145.108449] RBP: 00007fdec9298ca0 R08: 0000000000010005 R09: 0000000000000000 [ 1145.115720] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000a [ 1145.122993] R13: 00007fffc0c0795f R14: 00007fdec92999c0 R15: 000000000078c0ec [ 1145.143802] encrypted_key: insufficient parameters specified 06:51:28 executing program 4 (fault-call:12 fault-nth:11): pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:51:28 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:51:28 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x4000) 06:51:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000080), &(0x7f00000001c0)=0xc) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030303030301a303030303030ff30bfbc8ee82189abcf66af6e3030302c75", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x284141, 0x0) 06:51:28 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x76, &(0x7f0000000240), 0x8) 06:51:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000380)='/dev/video37\x00', 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f00000003c0)='trusted.overlay.opaque\x00', &(0x7f0000000400)='y\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000200)={0x2, 0x0, [0x0, 0x0]}) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x1, 0x8, 0x101, 0x0, 0x0, {0x7, 0x0, 0x2}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x6001}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000004) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r3, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) sendmsg$AUDIT_TTY_GET(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x10, 0x3f8, 0x200, 0x70bd27, 0x25dfdbff, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x50}, 0x8840) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:51:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x6, 0x2081) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r1, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x1, 0x8, 0x0, 0x0, 0x0, {0x1, 0x0, 0x8}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x200}]}, 0x28}, 0x1, 0x0, 0x0, 0x8}, 0x80) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:51:28 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657720657272797032f83ffacaaf38dfcfb2"], 0x2d, 0x0) r3 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x1, 0x500) fchdir(r0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') socket$isdn(0x22, 0x3, 0x25) preadv(r4, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000080)={0x0, 0x1, 0x4, 0x1, 0x80000401, {}, {0x3, 0x0, 0x0, 0x6c, 0x81, 0x53, "69ce33e7"}, 0xa, 0x2, @offset=0x2, 0x9b9d836, 0x0, r3}) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x14c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x11c, 0x2, [@TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14, 0x1, {0x0, 0x0, 0x7ff, 0x1a}}]}}]}, 0x14c}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000280)={'gre0\x00', &(0x7f0000000500)={'gretap0\x00', r6, 0x10, 0x80, 0x0, 0x800, {{0x29, 0x4, 0x1, 0x3c, 0xa4, 0x64, 0x0, 0x81, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, {[@cipso={0x86, 0x12, 0xffffffffffffffff, [{0x5, 0xc, "63be361a695d6ad8516e"}]}, @timestamp_prespec={0x44, 0x14, 0x4a, 0x3, 0x9, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8000}, {@broadcast, 0x4}]}, @timestamp={0x44, 0x1c, 0xe3, 0x0, 0x1, [0x40, 0x3, 0x200, 0x2, 0x9, 0xffff]}, @lsrr={0x83, 0x7, 0xc3, [@broadcast]}, @timestamp={0x44, 0x10, 0xb9, 0x0, 0x6, [0x1ff, 0x0, 0x8d]}, @cipso={0x86, 0x34, 0x0, [{0x5, 0x10, "c95799d63ff7479aace9310cf400"}, {0x0, 0x3, "88"}, {0x6, 0x12, "b4d1e4b018d60268f0d2ebd798a20916"}, {0x1, 0x9, "4e37abd7f39dca"}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f00000004c0)={'ip6gre0\x00', &(0x7f0000000440)={'syztnl1\x00', r8, 0x29, 0xd1, 0x0, 0x31400000, 0x8, @dev={0xfe, 0x80, [], 0x17}, @mcast1, 0x80, 0x700, 0x3ff, 0xfffffbff}}) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:51:28 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x78, &(0x7f0000000240), 0x8) [ 1145.806729] encrypted_key: keylen parameter is missing [ 1145.915567] encrypted_key: keylen parameter is missing [ 1145.994105] FAULT_INJECTION: forcing a failure. [ 1145.994105] name failslab, interval 1, probability 0, space 0, times 0 [ 1146.005409] CPU: 0 PID: 9311 Comm: syz-executor.4 Not tainted 4.19.133-syzkaller #0 [ 1146.013213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1146.022569] Call Trace: [ 1146.025164] dump_stack+0x1fc/0x2fe [ 1146.028801] should_fail.cold+0xa/0x14 [ 1146.032687] ? setup_fault_attr+0x200/0x200 [ 1146.036997] ? lock_downgrade+0x720/0x720 [ 1146.041132] ? perf_trace_preemptirq_template+0x2e6/0x460 [ 1146.046658] __should_failslab+0x115/0x180 [ 1146.050877] should_failslab+0x5/0xf [ 1146.054575] kmem_cache_alloc+0x3f/0x370 [ 1146.058621] __build_skb+0x39/0x300 [ 1146.062232] __napi_alloc_skb+0x1c7/0x300 [ 1146.066368] napi_get_frags+0x5e/0x130 [ 1146.070248] tun_get_user+0xcbb/0x4be0 [ 1146.074126] ? tun_chr_read_iter+0x1d0/0x1d0 [ 1146.078523] ? lock_downgrade+0x720/0x720 [ 1146.082654] ? check_preemption_disabled+0x41/0x280 [ 1146.087651] ? check_preemption_disabled+0x41/0x280 [ 1146.092652] tun_chr_write_iter+0xb0/0x150 [ 1146.096874] __vfs_write+0x51b/0x770 [ 1146.100576] ? kernel_read+0x110/0x110 [ 1146.104455] ? perf_trace_preemptirq_template+0x2e6/0x460 [ 1146.110150] ? tracing_start_sched_switch.cold+0x74/0x74 [ 1146.115580] ? debug_check_no_obj_freed+0x201/0x482 [ 1146.120584] __kernel_write+0x109/0x370 [ 1146.124544] write_pipe_buf+0x153/0x1f0 [ 1146.128498] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1146.133062] ? default_file_splice_read+0xa00/0xa00 [ 1146.138058] ? __put_page+0xcc/0x3a0 [ 1146.141753] ? anon_pipe_buf_release+0x2c3/0x380 [ 1146.146491] __splice_from_pipe+0x389/0x800 [ 1146.150794] ? default_file_splice_read+0xa00/0xa00 [ 1146.155888] default_file_splice_write+0xd8/0x180 [ 1146.160712] ? generic_splice_sendpage+0x140/0x140 [ 1146.165628] ? security_file_permission+0x1c0/0x220 [ 1146.170632] ? generic_splice_sendpage+0x140/0x140 [ 1146.175542] __se_sys_splice+0xfe7/0x16d0 [ 1146.179674] ? check_preemption_disabled+0x41/0x280 [ 1146.184675] ? rcu_nmi_exit+0xb3/0x180 [ 1146.188543] ? __se_sys_tee+0xb90/0xb90 [ 1146.192500] ? trace_hardirqs_off_caller+0x69/0x210 [ 1146.197498] ? do_syscall_64+0x21/0x620 [ 1146.201457] do_syscall_64+0xf9/0x620 [ 1146.205242] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1146.210410] RIP: 0033:0x45c1d9 [ 1146.213584] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1146.232466] RSP: 002b:00007fdec9298c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 06:51:29 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x3d, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) ioctl$TIOCL_UNBLANKSCREEN(r0, 0x541c, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r3 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r3) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r3, 0x404c534a, &(0x7f00000001c0)={0x7f, 0xff, 0xffffffcd}) [ 1146.240166] RAX: ffffffffffffffda RBX: 0000000000031a00 RCX: 000000000045c1d9 [ 1146.247414] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 1146.254679] RBP: 00007fdec9298ca0 R08: 0000000000010005 R09: 0000000000000000 [ 1146.261940] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000b [ 1146.269194] R13: 00007fffc0c0795f R14: 00007fdec92999c0 R15: 000000000078c0ec 06:51:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r1 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x1}, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, r3}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @mcast2}, {0x2, 0x0, 0xac141424, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, r3}}, 0x48) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000240), r3, 0x1}}, 0x18) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:51:29 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f0000000240), 0x8) [ 1146.443357] encrypted_key: master key parameter 'erryp2ø?úʯ8ßϲ' is invalid [ 1146.484014] encrypted_key: keylen parameter is missing [ 1146.570102] encrypted_key: keylen parameter is missing 06:51:29 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:51:29 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0xff03) 06:51:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) sched_setparam(r1, &(0x7f0000000080)=0x8) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:51:29 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657720657272797032f83ffacaaf38dfcfb2"], 0x2d, 0x0) r3 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x1, 0x500) fchdir(r0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') socket$isdn(0x22, 0x3, 0x25) preadv(r4, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000080)={0x0, 0x1, 0x4, 0x1, 0x80000401, {}, {0x3, 0x0, 0x0, 0x6c, 0x81, 0x53, "69ce33e7"}, 0xa, 0x2, @offset=0x2, 0x9b9d836, 0x0, r3}) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x14c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x11c, 0x2, [@TCA_CHOKE_STAB={0x104, 0x2, "514722036d202a1e640138a53fbabaa71ee164cb9c9e09992b73824cc09d2dc44511ffe2d79ca2dcb539f7ed9ef9b8132c31696ce6d04246097cef71db191444a5d364191a5434db9dc7c039b5e791224811144e0f1b72869a34b9fcad9efdedb875394895c66173909b06e8c8ba0851029db019fa4357f578d995efde753d5d87c5da4838f496157735a70926d3b454441df3fb911c21d5ba9b428c35d82894560a0a36cf2bf37460097b40c42bf9f6ddfb599b0d3eaa6ec273c1bde7f452a7531ad33cb3438c31907285ca20042be90d5e2b9bb631c72f614e5c3b5d9ef258a46ad8f9469dd07275dd550b84eb54016ed117ca7ee0c12ee31811adaab9b78a"}, @TCA_CHOKE_PARMS={0x14, 0x1, {0x0, 0x0, 0x7ff, 0x1a}}]}}]}, 0x14c}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000280)={'gre0\x00', &(0x7f0000000500)={'gretap0\x00', r6, 0x10, 0x80, 0x0, 0x800, {{0x29, 0x4, 0x1, 0x3c, 0xa4, 0x64, 0x0, 0x81, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, {[@cipso={0x86, 0x12, 0xffffffffffffffff, [{0x5, 0xc, "63be361a695d6ad8516e"}]}, @timestamp_prespec={0x44, 0x14, 0x4a, 0x3, 0x9, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8000}, {@broadcast, 0x4}]}, @timestamp={0x44, 0x1c, 0xe3, 0x0, 0x1, [0x40, 0x3, 0x200, 0x2, 0x9, 0xffff]}, @lsrr={0x83, 0x7, 0xc3, [@broadcast]}, @timestamp={0x44, 0x10, 0xb9, 0x0, 0x6, [0x1ff, 0x0, 0x8d]}, @cipso={0x86, 0x34, 0x0, [{0x5, 0x10, "c95799d63ff7479aace9310cf400"}, {0x0, 0x3, "88"}, {0x6, 0x12, "b4d1e4b018d60268f0d2ebd798a20916"}, {0x1, 0x9, "4e37abd7f39dca"}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f00000004c0)={'ip6gre0\x00', &(0x7f0000000440)={'syztnl1\x00', r8, 0x29, 0xd1, 0x0, 0x31400000, 0x8, @dev={0xfe, 0x80, [], 0x17}, @mcast1, 0x80, 0x700, 0x3ff, 0xfffffbff}}) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:51:29 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x7b, &(0x7f0000000240), 0x8) 06:51:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r2) ioctl$sock_ifreq(r2, 0x8930, &(0x7f0000000040)={'wg0\x00', @ifru_mtu=0x675}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1147.002980] encrypted_key: master key parameter 'erryp2ø?úʯ8ßϲ' is invalid [ 1147.037424] encrypted_key: keylen parameter is missing 06:51:29 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xfe, 0x2000) mkdirat(r0, &(0x7f0000000080)='./file0/file0\x00', 0x40) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:51:29 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657720657272797032f83ffacaaf38dfcfb2"], 0x2d, 0x0) r3 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x1, 0x500) fchdir(r0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') socket$isdn(0x22, 0x3, 0x25) preadv(r4, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000080)={0x0, 0x1, 0x4, 0x1, 0x80000401, {}, {0x3, 0x0, 0x0, 0x6c, 0x81, 0x53, "69ce33e7"}, 0xa, 0x2, @offset=0x2, 0x9b9d836, 0x0, r3}) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x14c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x11c, 0x2, [@TCA_CHOKE_STAB={0x104, 0x2, "514722036d202a1e640138a53fbabaa71ee164cb9c9e09992b73824cc09d2dc44511ffe2d79ca2dcb539f7ed9ef9b8132c31696ce6d04246097cef71db191444a5d364191a5434db9dc7c039b5e791224811144e0f1b72869a34b9fcad9efdedb875394895c66173909b06e8c8ba0851029db019fa4357f578d995efde753d5d87c5da4838f496157735a70926d3b454441df3fb911c21d5ba9b428c35d82894560a0a36cf2bf37460097b40c42bf9f6ddfb599b0d3eaa6ec273c1bde7f452a7531ad33cb3438c31907285ca20042be90d5e2b9bb631c72f614e5c3b5d9ef258a46ad8f9469dd07275dd550b84eb54016ed117ca7ee0c12ee31811adaab9b78a"}, @TCA_CHOKE_PARMS={0x14, 0x1, {0x0, 0x0, 0x7ff, 0x1a}}]}}]}, 0x14c}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000280)={'gre0\x00', &(0x7f0000000500)={'gretap0\x00', r6, 0x10, 0x80, 0x0, 0x800, {{0x29, 0x4, 0x1, 0x3c, 0xa4, 0x64, 0x0, 0x81, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, {[@cipso={0x86, 0x12, 0xffffffffffffffff, [{0x5, 0xc, "63be361a695d6ad8516e"}]}, @timestamp_prespec={0x44, 0x14, 0x4a, 0x3, 0x9, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8000}, {@broadcast, 0x4}]}, @timestamp={0x44, 0x1c, 0xe3, 0x0, 0x1, [0x40, 0x3, 0x200, 0x2, 0x9, 0xffff]}, @lsrr={0x83, 0x7, 0xc3, [@broadcast]}, @timestamp={0x44, 0x10, 0xb9, 0x0, 0x6, [0x1ff, 0x0, 0x8d]}, @cipso={0x86, 0x34, 0x0, [{0x5, 0x10, "c95799d63ff7479aace9310cf400"}, {0x0, 0x3, "88"}, {0x6, 0x12, "b4d1e4b018d60268f0d2ebd798a20916"}, {0x1, 0x9, "4e37abd7f39dca"}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f00000004c0)={'ip6gre0\x00', &(0x7f0000000440)={'syztnl1\x00', r8, 0x29, 0xd1, 0x0, 0x31400000, 0x8, @dev={0xfe, 0x80, [], 0x17}, @mcast1, 0x80, 0x700, 0x3ff, 0xfffffbff}}) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:51:29 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x7c, &(0x7f0000000240), 0x8) 06:51:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1147.053430] encrypted_key: keylen parameter is missing 06:51:30 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657720657272797032f83ffacaaf38dfcfb2"], 0x2d, 0x0) r3 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x1, 0x500) fchdir(r0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') socket$isdn(0x22, 0x3, 0x25) preadv(r4, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000080)={0x0, 0x1, 0x4, 0x1, 0x80000401, {}, {0x3, 0x0, 0x0, 0x6c, 0x81, 0x53, "69ce33e7"}, 0xa, 0x2, @offset=0x2, 0x9b9d836, 0x0, r3}) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x14c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x11c, 0x2, [@TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14, 0x1, {0x0, 0x0, 0x7ff, 0x1a}}]}}]}, 0x14c}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000280)={'gre0\x00', &(0x7f0000000500)={'gretap0\x00', r6, 0x10, 0x80, 0x0, 0x800, {{0x29, 0x4, 0x1, 0x3c, 0xa4, 0x64, 0x0, 0x81, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, {[@cipso={0x86, 0x12, 0xffffffffffffffff, [{0x5, 0xc, "63be361a695d6ad8516e"}]}, @timestamp_prespec={0x44, 0x14, 0x4a, 0x3, 0x9, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8000}, {@broadcast, 0x4}]}, @timestamp={0x44, 0x1c, 0xe3, 0x0, 0x1, [0x40, 0x3, 0x200, 0x2, 0x9, 0xffff]}, @lsrr={0x83, 0x7, 0xc3, [@broadcast]}, @timestamp={0x44, 0x10, 0xb9, 0x0, 0x6, [0x1ff, 0x0, 0x8d]}, @cipso={0x86, 0x34, 0x0, [{0x5, 0x10, "c95799d63ff7479aace9310cf400"}, {0x0, 0x3, "88"}, {0x6, 0x12, "b4d1e4b018d60268f0d2ebd798a20916"}, {0x1, 0x9, "4e37abd7f39dca"}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f00000004c0)={'ip6gre0\x00', &(0x7f0000000440)={'syztnl1\x00', r8, 0x29, 0xd1, 0x0, 0x31400000, 0x8, @dev={0xfe, 0x80, [], 0x17}, @mcast1, 0x80, 0x700, 0x3ff, 0xfffffbff}}) 06:51:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r1 = openat$mice(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/input/mice\x00', 0x151000) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000280)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r2, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4800) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) [ 1147.286027] encrypted_key: keylen parameter is missing 06:51:30 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10003, 0x0) 06:51:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x34000) 06:51:30 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x7d, &(0x7f0000000240), 0x8) 06:51:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r5, 0x202002) keyctl$chown(0x4, r5, r3, r4) keyctl$instantiate(0xc, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="6e65772065437279707466e9072e0e7720750065723a754c95c1d6893868fd8ee734b5315434ab8a1e08df891e59ac7514baa1fd80f91f29ea69f0f13685537e803021b66ff3fa0c111d7baec10781b655c003fe75ae77e9eea4d84db1a59ae16d0edd05e443433006d79030921abe130c765296e5318b18ae9193f260bad318000000000000"], 0x2d, r5) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:51:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000040)={{0x1b, 0x3d, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="070700000000211d26ea0000000000000000000000000000000000004000000000000000000000000000000000000000000038000000005c9cd6344de08a96846379e6cc000000000000000000000000000000000000000000000000000000000000000000000800"/131], 0x78) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x1200001, &(0x7f0000000380)=ANY=[@ANYRESDEC=r1, @ANYRESHEX=r2, @ANYRESHEX, @ANYRESDEC=0x0, @ANYRESHEX=r0, @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(0xffffffffffffffff) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r3, 0x110, 0x5, &(0x7f0000000100)=[0x3, 0x3], 0x2) r4 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r4) write$FUSE_POLL(r4, &(0x7f0000000340)={0x18, 0x0, 0x5, {0x9}}, 0x18) syz_mount_image$hfs(&(0x7f0000000140)='hfs\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x5, 0x1, &(0x7f0000000300)=[{&(0x7f0000000240)="5f29e71072259823c2749dcb67d00f4ad6ab06e3595e2ee669aa6041235ccd626e0923624f84cbdb93ee3ac24b932f33e7ecc09d8516322e7abeda2c8fcee164d2d3b8eff27cc1e72d0d126c8032ae20d35dfd6ef63957a2e18e5aab4370f094b620a07564fe7b9383596a8ed473a3b6ed2aa637c5fcb941fbbfdde0622cf6ba72636f37b1bce35f5147396e99e87f296c7422d8b066d348e1eecf7fdbb0c6c1", 0xa0, 0x3}], 0x80, &(0x7f0000000400)={[{@session={'session', 0x3d, 0x9}}, {@file_umask={'file_umask', 0x3d, 0x3}}], [{@func={'func', 0x3d, 'CREDS_CHECK'}}]}) r5 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r5) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000004c0)={0x0, 0x4}, &(0x7f0000000600)=0x8) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8983, &(0x7f0000000480)) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:51:30 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657720657272797032f83ffacaaf38dfcfb2"], 0x2d, 0x0) r3 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x1, 0x500) fchdir(r0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') socket$isdn(0x22, 0x3, 0x25) preadv(r4, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000080)={0x0, 0x1, 0x4, 0x1, 0x80000401, {}, {0x3, 0x0, 0x0, 0x6c, 0x81, 0x53, "69ce33e7"}, 0xa, 0x2, @offset=0x2, 0x9b9d836, 0x0, r3}) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x14c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x11c, 0x2, [@TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14, 0x1, {0x0, 0x0, 0x7ff, 0x1a}}]}}]}, 0x14c}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000280)={'gre0\x00', &(0x7f0000000500)={'gretap0\x00', r6, 0x10, 0x80, 0x0, 0x800, {{0x29, 0x4, 0x1, 0x3c, 0xa4, 0x64, 0x0, 0x81, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, {[@cipso={0x86, 0x12, 0xffffffffffffffff, [{0x5, 0xc, "63be361a695d6ad8516e"}]}, @timestamp_prespec={0x44, 0x14, 0x4a, 0x3, 0x9, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8000}, {@broadcast, 0x4}]}, @timestamp={0x44, 0x1c, 0xe3, 0x0, 0x1, [0x40, 0x3, 0x200, 0x2, 0x9, 0xffff]}, @lsrr={0x83, 0x7, 0xc3, [@broadcast]}, @timestamp={0x44, 0x10, 0xb9, 0x0, 0x6, [0x1ff, 0x0, 0x8d]}, @cipso={0x86, 0x34, 0x0, [{0x5, 0x10, "c95799d63ff7479aace9310cf400"}, {0x0, 0x3, "88"}, {0x6, 0x12, "b4d1e4b018d60268f0d2ebd798a20916"}, {0x1, 0x9, "4e37abd7f39dca"}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f00000004c0)={'ip6gre0\x00', &(0x7f0000000440)={'syztnl1\x00', r8, 0x29, 0xd1, 0x0, 0x31400000, 0x8, @dev={0xfe, 0x80, [], 0x17}, @mcast1, 0x80, 0x700, 0x3ff, 0xfffffbff}}) 06:51:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000001c0)='./file1\x00', 0x7, 0x3, &(0x7f00000013c0)=[{&(0x7f0000000240)="11556a4bc39372607c1b94d59cc96bdb42266490887fd6eae269ad35bb5b1d00793eb4d804522e62f81d9bfd4477137241459c34fd54e4c00f4de834aac2e4de02a46a9513b8babe1c39d0ba0f7a602729bfed21522aecc04af7554d1681e3c5c9", 0x61}, {&(0x7f00000002c0)="bdbec74aa8830ae60aa7665d680689e272b2fefae20a1384097a92ac3bb8f51502c849f393f54575efcd69fe8ec5da3409ddf273a7e26f48e5343b530b972d4134a2f44d2f6877d03c64a946730013fc87a32af55756746082ce5328e3822f63d6c33749672c6dcf50d61526ac1fd39d513842fc4ba3454ab3b0ef544cc4c7671fed34161540c23186cd0e9debd3bddc01ace44ba5ed15d0340cc4ef0e3da74ab08de0226bae3945005a95e783d6594f0b3a4357e55d52754e46c016f7f4a0e9ce8d47d0a894d7e1be1cbe5d7f430a4e80ffb2474ab39381e323fece6b6c314cf849c2d3b2b7eed6cc546f8c063db7", 0xef, 0xf16d}, {&(0x7f00000003c0)="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", 0x1000, 0x3}], 0x8, &(0x7f0000001440)={[{@notail='notail'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@expose_privroot='expose_privroot'}, {@tails_on='tails=on'}], [{@dont_hash='dont_hash'}, {@fsmagic={'fsmagic', 0x3d, 0x1}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) waitid(0x2, r1, &(0x7f0000001500), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)={{0x1b, 0x3d, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f00000014c0)=0x4) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:51:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657720657272797032f83ffacaaf38dfcfb2"], 0x2d, 0x0) r3 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x1, 0x500) fchdir(r0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') socket$isdn(0x22, 0x3, 0x25) preadv(r4, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000080)={0x0, 0x1, 0x4, 0x1, 0x80000401, {}, {0x3, 0x0, 0x0, 0x6c, 0x81, 0x53, "69ce33e7"}, 0xa, 0x2, @offset=0x2, 0x9b9d836, 0x0, r3}) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x14c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x11c, 0x2, [@TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14, 0x1, {0x0, 0x0, 0x7ff, 0x1a}}]}}]}, 0x14c}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000280)={'gre0\x00', &(0x7f0000000500)={'gretap0\x00', r6, 0x10, 0x80, 0x0, 0x800, {{0x29, 0x4, 0x1, 0x3c, 0xa4, 0x64, 0x0, 0x81, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, {[@cipso={0x86, 0x12, 0xffffffffffffffff, [{0x5, 0xc, "63be361a695d6ad8516e"}]}, @timestamp_prespec={0x44, 0x14, 0x4a, 0x3, 0x9, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8000}, {@broadcast, 0x4}]}, @timestamp={0x44, 0x1c, 0xe3, 0x0, 0x1, [0x40, 0x3, 0x200, 0x2, 0x9, 0xffff]}, @lsrr={0x83, 0x7, 0xc3, [@broadcast]}, @timestamp={0x44, 0x10, 0xb9, 0x0, 0x6, [0x1ff, 0x0, 0x8d]}, @cipso={0x86, 0x34, 0x0, [{0x5, 0x10, "c95799d63ff7479aace9310cf400"}, {0x0, 0x3, "88"}, {0x6, 0x12, "b4d1e4b018d60268f0d2ebd798a20916"}, {0x1, 0x9, "4e37abd7f39dca"}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f00000004c0)={'ip6gre0\x00', &(0x7f0000000440)={'syztnl1\x00', r8, 0x29, 0xd1, 0x0, 0x31400000, 0x8, @dev={0xfe, 0x80, [], 0x17}, @mcast1, 0x80, 0x700, 0x3ff, 0xfffffbff}}) 06:51:31 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240), 0x8) [ 1148.203371] encrypted_key: insufficient parameters specified 06:51:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000001c0)={@in={{0x2, 0x1ff, @remote}}, 0x0, 0x0, 0x3, 0x0, "1f58ab10b7f37749c5fb83bb5e0c17b7b965b5fb2baf20336eef5c2c662982204095eb6ed8d837049d8442a555bf3909b6ed43064d3041b9db2f254caa242231dd2c619ff61ac66f117bc11dec127862"}, 0xd8) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs u`Er:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1148.268026] encrypted_key: insufficient parameters specified 06:51:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user]id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0) 06:51:31 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0x2}, 0x8) [ 1148.460379] encrypted_key: master key parameter 'u`Er:u' is invalid [ 1148.492406] encrypted_key: master key parameter 'u`Er:u' is invalid 06:51:32 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10004, 0x0) 06:51:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRES32=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303230303046303030302c757365725f69643d126b58a7112c0f1db337f213a2a0dde463689704cac1dc9f565decf1da1662675150ce953157c99780e8d4b52548c974f609b545fc8f59d078230b3a4468", @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESOCT]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r1, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000300)={'nat\x00'}, &(0x7f0000000140)=0x54) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r2) bind$alg(r2, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cfb(aes-ce))\x00'}, 0x58) getsockopt$PNPIPE_INITSTATE(r2, 0x113, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 06:51:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r2, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000002c80)=[{{&(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x2, 0x0, 0x3, {0xa, 0x4e23, 0x7, @local, 0x10001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="246cf58fe534ed046595d9727cf727a7870dac62808281766c3813c6910d", 0x1e}, {&(0x7f00000002c0)="0a4d1d2e79e129e69263c6915bfbbd9f2123306abc0d91b9a03f7880fb5ec73786512a38b48f9848eec27a930a581b77c4765071313d18140f185bc4c478674495e9be8ed6af90d96bc3846a323b8f75072b4dec10bb2810a54e63ee33ce9e62124f4c7e45149f31861d699e00e742d543c09d5b174076051eb6a363665bfd9e67918399a4c2240bbc7ffec6c43edc418b6b38b7d54eae09a6939cc440739bef660a23669379e9f06da9b7286d6b21245a6c769eadaf2d9c739e650f35d61027757c51d6698ce4910afae961f7480b1083025ca4007a17f50f124872414e9a24fce1d8544f", 0xe5}, {&(0x7f00000003c0)="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", 0x1000}], 0x3, &(0x7f00000013c0)=[{0xb8, 0xff, 0x1, "b0f4869031e25667c8baab7252b093950bc0166b346ac57bb1673377fe57cbe44c31f71da09fa157fcc510b9b24cc38f1f8e184ca4d30182af7f2f6b5e885862f5cc6143cb306060b92b04c6bb06fc2f6507d174294e063a1d738efab77ec6f1459ac4230c1cb49f73b9f4ebcc943ec27a24b6be3c0bb7d7ed6c7c6b8a5bde57d3b236a182ce3b797a371d02357b4bd5b912caf24db44bcc1434e17a3362182b54b8ae9c1a1e"}, {0xc0, 0x88, 0x1, "ebef72ccc737626c1e1eaf715142da48ef9818e8251a8c94bd578b7f5cbcb2c9255b4753e3c4e1cb0b01aee22fe0945c79dd4e07b078545c3e4ec264d6cb2791b5c79c46ac8770a86ff4aa0d9895f2020139661b0235923eb60d7fe519818a2a0dd701fc1155eadb333e74a9c1a4f0bbc558955129b4766fea73947d10be8f9cd278ebfcc184ef6a6cd1d65f6f9bdaa5b7d4acd6db3ddb4dad6fd78146f7f0de775218ea096d9790a8e646bdc2"}, {0xf8, 0x722f39cd10aff0a6, 0x8000, "3172c99380488fd55910507f5f8ab426a35d686375d89cb346db703a4bfd6c89c0a6f2e330e825f8037bdd721fe6d9dad1d8bf551292131d4084d6785d685c8cc7362f37d6153a08ef17ed9e78419f8d0ea4b647a0d81f331cd877da4c705e758ec91de141300a30315f7f7a3fe0f18fb91c61892e6bc3d2dc83da2b917b84c1844fd36af3fca5c1acc14da3692b4e9b9ff095ee2a272e220aa272eb7a2ab1856701eb7563b8d38f597de774a570ac0201f2bcff38efd1050f966be4b4abf688353d31182de57703c15dc8795d24058e747d88f725433e233a015146a0763f4acc2fac9d46"}, {0x58, 0x105, 0x100, "988eec9da0d3fee249cc60d5604b5458996d569ad8088e2d01bdf6d434765e5c30ca9577cd7a86f3faaff2d75b4fc4e055a92cf39466b4ffebaf72bdfa7c9cf51f2f4a46"}], 0x2c8}}, {{&(0x7f00000016c0)=@llc={0x1a, 0x10f, 0x1, 0x4, 0xa, 0x3f, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x80, &(0x7f0000002900)=[{&(0x7f0000001740)="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", 0x1000}, {&(0x7f0000002740)="c6949dceb9967c493253047b6154a8bf3fd475d22adb04adfbb9af35305fc4146010846923064d254af90c292faf5485405da610fa1b9c05c1b7ffc140efa66f27a50f6867cbcdcb77c9385759052f1e7ce729aa643f6eef42efe28ab85dbea497d4d3fc96709613fb6abd4d70b4dbdb47ac4b48eed2ff16c9be082980674a0a627e64bd17da39c99e054b7a3546590dc8d6dea99a0e28b032f3720b5d98f208c5946711e5120efbf5221b8094f0e1439509ee3186df1b9c2511d89a", 0xbc}, {&(0x7f0000002800)="6ee86acffcc21d0fced4530093515408cda15c1a45f2770d9af9e537fd9efb9f39af65cdd86d74cb1a458b8c8a3a4ff082707c9bdc357bee7c46d41a098c490c560b12e4fabd305c49101411afd8becdfd2885b3a4c00990524e8d8e8aea1da9708e30cd2f4c5b77509f0bfe4c9462dbbf80aedf0ad45960087371d3a9a6c45122b18da96578e12cf3256d06f725738d7fdd89b9d26e1aee10c6bc442092d30d25f6c6b41177e8bcb8aa2484eb4ed65a255e43897ba8ef62e8c53b7c072acfc1374aed9c0171d19aeb48ca6e93e0fff38e4e6884318bed02", 0xd8}], 0x3, &(0x7f0000002940)=[{0x48, 0x112, 0x2, "ad8bcdefa84b872d9aa62d03e93a5a5fe67458ede474ac8563f040a61962f14707c3ae1ea544f2fdd6a60ff4c4050fb3dd7f0b37fa71dbc2"}, {0xf0, 0x10e, 0x6, "b2d0efba86b9f088ca4dddf36bca063c11a58263ff846f1349fbf9bf4a2ebe954e5c5d85821aaad8ec5eb86946ad2c7deae2a13585fc3e3f7bf4b20dc7af0bb604a9bb079fb1fe8fe7315c549ef25ab74336c711bee0a6f2c47eae26478a569d562322524b9532e4813eac1495a2ca9673d8b4b803eac9323054147a587268ea642064cb38a6743b924df96c98deed7c96b7715a59b54b13ebba35e2adac82f514ace1d264acb77f550195f1fd971c0ed65ba3488cae82876f1a335dd1ebfc59b97a15b42e69057e923a96f9dc4b771b7a0fde8bd53f8b594bc4d8bd"}, {0x30, 0x6, 0x6, "3a3fcc885364aadf1906da78ddad6d736420b1727328c3268e1648aa3d"}, {0xb0, 0x10c, 0x8, "f66cc88de4c361c6e452e29190e1440451dd143807c79ee493745056df05e7f1d10ed932746d361f1a3e8346d4c8886608ca3c4cbf35a2c9d751470c1d51cc52ba261950fe8ef3043ead9ec996962a2d0b6626d188c1549cf930977534fb4a037d05451a9cf73c5cd7de3e3a8c50900f52d227df83ecc667dba8973058d9c81f187cf93db2adf25623c31dac217dc69ce53a65cd35c36fa6ed"}, {0xf8, 0x105, 0x7, "fd871eb47b0a7109a1078f3e5676784902fbc9a940b12210064ca4ed303f06eb6a80375ad4c03d13a389004a0b533434d4253363762316e57eaa086139dee032664c8ed4a9edecfc771675f0661cb1b4f222434c414e7258aeffdaf75a4f149063c4814d463b84c68b54135427468139b8362f4b8f608b7fe67bca3ca3ebc535021d7c74244784b4f76f41f62ff894bcf8d7b96033f5c14e770adad83c4387d674473011654b4e6ade1d0ead2bf297d8e93fb914acf5c777eba68902f5334878cb53ecc1d80b0c7a936ef44578c21254a17721795707b0cb9df2f6963e3ccfbd0981b8"}], 0x310}}], 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000002d00)=0x200) keyctl$instantiate(0xc, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='new ecryptfs user:u', @ANYBLOB="f8ba471275f2f86a0ffa73c7d81c80767fe18698f43d84e49bfaed0b26c68f8329312b0451ec532c0fb02a501b426a40f41259bb94fd6cc04706b081e47bb7961f260a5b2be061c9278494d3bc2668e4774f8f8b71acc401666fd0b2645e8bef2f82e31b2c7045ff49b29304500d3459f7d459684bb127a5d86fd486c6f1781ee6299646b567044c96501fcb086117e55dacc2a9aa43cd66e7e26b06e00aa27520292fd0169dab03460d25c4847b428bb9447246438c626989f1847dbf82971b5cf186ed1b5f5795d1cbd14cf7d98e60f71717a6232504a19f0ca2bd20be"], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:51:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657720657272797032f83ffacaaf38dfcfb2"], 0x2d, 0x0) r3 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x1, 0x500) fchdir(r0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') socket$isdn(0x22, 0x3, 0x25) preadv(r4, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000080)={0x0, 0x1, 0x4, 0x1, 0x80000401, {}, {0x3, 0x0, 0x0, 0x6c, 0x81, 0x53, "69ce33e7"}, 0xa, 0x2, @offset=0x2, 0x9b9d836, 0x0, r3}) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x14c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x11c, 0x2, [@TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14, 0x1, {0x0, 0x0, 0x7ff, 0x1a}}]}}]}, 0x14c}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f00000004c0)={'ip6gre0\x00', &(0x7f0000000440)={'syztnl1\x00', 0x0, 0x29, 0xd1, 0x0, 0x31400000, 0x8, @dev={0xfe, 0x80, [], 0x17}, @mcast1, 0x80, 0x700, 0x3ff, 0xfffffbff}}) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:51:32 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x40000) 06:51:32 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240), 0x8) [ 1149.371861] encrypted_key: master key parameter 'erryp2ø?úʯ8ßϲ' is invalid 06:51:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x9, &(0x7f0000001640)=[{&(0x7f0000000240)="9711032ce842e4b102e6e8a49c625d659125d2cd7907e8d1f2849e31a7944a137e2c4403d9541b98b49c41866de5bcdcfbea644fa76c3750a2462fa46e3e9c5b", 0x40, 0x5}, {&(0x7f0000000280)="5c9c0c6152179d82b9032f7d131b84fe630775bc7b9874cf268bac24e0317faac71dd397dbca952b495ec2973373eb1c01a0cfdd92d61fb9ce9f85d89f02c99e03b813ad30bc4260412815875d57805855bb156461144e27e54b1bde74d6eebf0b0d3cd075edde15379ba24c358d34124eb6d71a827f18f366e48cb5da038abb5f944aab109c", 0x86, 0x714}, {&(0x7f0000000340)="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", 0x1000, 0xfffffffffffffffb}, {&(0x7f0000001340)="2cf5696eebed04c1932469196052ef79a2b1f58afd2f304652f5bb9aa9305ff559946d6c6b7b296272f5edfbde72519e", 0x30, 0x9}, {&(0x7f0000001380)="8ab0260804c9b7ea2eed11049224978c3a518c08327f671f6c09abfdf2d31a", 0x1f, 0x783}, {&(0x7f00000013c0)="267aff797138c4ee605ae9ed7f933c572ae3cdcd8f2b1d18b02b40089581d50c97cb6af0bd0d35c8c30410de28c6fd7a393855f174d17e77210744e82d2149d03cfc1553bc0f0053796afe560c467d3ff2b69f14b00610bb476b134f6f0b47ac5f4a74f40967", 0x66, 0x3}, {&(0x7f0000001440)="dcc3ed3c2738f8208e84b6d292110c01de801b85db89e0506d2adb5a684d72797eac3c05580a2268c5c1cccb68e1f87d73ddb6586f36c14cabef325a1716c9386fa2538400583eef51749e", 0x4b, 0x3}, {&(0x7f00000014c0)="8614ea05d7fbe8e43d4908c9a7a01278c16ede0895bd4c54998e575a9be6a00fc577a48e6797a1780b6a5fa86b43b1678abc8f1ca7ae851a0cf67210f7da328dbbbe5b45fa0c23b6a75d3bddcf3be799bd4ec99255dcdea8c5c40e4f021397ff023239d1a2d7df41911b01279e2350571482a2428ff370194b139acdd99c3f15d2b54e8c327a01bb5b92ccf47c12a00569938afa854b0d0779f98f59ce0918eff1", 0xa1, 0xffffffffffffff34}, {&(0x7f0000001580)="64f66fb80434ec01acf774fd03da1a917f2ef6c09927be154297b047900945722282921cdc921103ffd94b7f8f6851da3ded95cee54ec86d535656607fbc5c40c70b7c7f1b5b93dc3d05d7900eea7d4a7529ea586b5cf54310c3582345ab3522f75a6b93f05db69fa8b22ecd0e649126d6d278bf0ea6701f02047d8c389ef17f2183decef06c27eca5c3a718", 0x8c, 0x2e32}], 0x2000, &(0x7f0000001840)=ANY=[@ANYBLOB="6d74707417338cc81067f0b32c6e6f7265636f766572792c66696c6573747265616d732c6c6f676273697a653d52337074312c62736467726f7570732c7377696474683d3078303030303030303030303030303037322c70716e6f656e666f7263652c686173682c6d6561737572652c66736e616d653d5c2c646f6e745f6d6561737572652c686173682c736d61636b66736861743d295b2c61707072616973652c646566636f6e746578743d757365725f752c00d86146701ad4122808f08394b5948994fa7845c49bff57f26905aac6c7df2a6fa8f5f33ad25f1407b7"]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:51:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657720657272797032f83ffacaaf38dfcfb2"], 0x2d, 0x0) r3 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x1, 0x500) fchdir(r0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') socket$isdn(0x22, 0x3, 0x25) preadv(r4, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000080)={0x0, 0x1, 0x4, 0x1, 0x80000401, {}, {0x3, 0x0, 0x0, 0x6c, 0x81, 0x53, "69ce33e7"}, 0xa, 0x2, @offset=0x2, 0x9b9d836, 0x0, r3}) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x14c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x11c, 0x2, [@TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14, 0x1, {0x0, 0x0, 0x7ff, 0x1a}}]}}]}, 0x14c}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f00000004c0)={'ip6gre0\x00', &(0x7f0000000440)={'syztnl1\x00', 0x0, 0x29, 0xd1, 0x0, 0x31400000, 0x8, @dev={0xfe, 0x80, [], 0x17}, @mcast1, 0x80, 0x700, 0x3ff, 0xfffffbff}}) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:51:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="ee657720656372797074722a75"], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1149.415478] encrypted_key: insufficient parameters specified 06:51:32 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={0x0, 0x0, 0x2}, 0x8) 06:51:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r2, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, &(0x7f0000000280)={0x1, 0x0, [{}]}) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x1) ioctl$VIDIOC_DBG_G_REGISTER(r1, 0xc0385650, &(0x7f0000000080)={{0x1, @addr=0x10000000}, 0x8, 0x200, 0x101}) 06:51:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r5, 0x202002) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r6, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) getsockopt$llc_int(r6, 0x10c, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) keyctl$chown(0x4, r5, r3, r4) add_key(&(0x7f0000000040)='.dead\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="c74b9aa9da96385c199a382802abb2362e4e7150f585bca2a43bc6fe3880d4323df0366e61bd2a09dc1e078bcb07dfbfe9d911c2816c767db9bd29d93b2ad5c8490747c64fc434b9f0c3a4232171ffdf286cec7a35d1e8e8c7cf5e0a5b9a91f5b4e8b80b90da96a2aa321ce4570153363b08c49b369d009ebc56e6c5bc4634d0334a54ca5d626da0efb2a58bc27e87999b8948db955faf5067881483ec2093de69607970b9aeac07a10868eaf94b4fa8c022b31b8cc00b6e94b70db4663f4cb41531d31d", 0xc4, r5) [ 1149.655409] encrypted_key: master key parameter 'ecryptr*u' is invalid [ 1149.669162] encrypted_key: master key parameter 'erryp2ø?úʯ8ßϲ' is invalid 06:51:33 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val={0x2}, @void, @eth={@random='K\b\x00', @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x12, 0x0, 0x0, @loopback}}}}}}, 0x2e) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10006, 0x0) 06:51:33 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657720657272797032f83ffacaaf38dfcfb2"], 0x2d, 0x0) r3 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x1, 0x500) fchdir(r0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') socket$isdn(0x22, 0x3, 0x25) preadv(r4, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000080)={0x0, 0x1, 0x4, 0x1, 0x80000401, {}, {0x3, 0x0, 0x0, 0x6c, 0x81, 0x53, "69ce33e7"}, 0xa, 0x2, @offset=0x2, 0x9b9d836, 0x0, r3}) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x14c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x11c, 0x2, [@TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14, 0x1, {0x0, 0x0, 0x7ff, 0x1a}}]}}]}, 0x14c}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f00000004c0)={'ip6gre0\x00', &(0x7f0000000440)={'syztnl1\x00', 0x0, 0x29, 0xd1, 0x0, 0x31400000, 0x8, @dev={0xfe, 0x80, [], 0x17}, @mcast1, 0x80, 0x700, 0x3ff, 0xfffffbff}}) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:51:33 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240), 0x7) 06:51:33 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x200000) 06:51:33 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket(0x1d, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r4, &(0x7f0000000040)=ANY=[@ANYBLOB="1b3d070700000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000003800000000000000000000000000000000000000000000008000"/120], 0x78) fcntl$setpipe(r4, 0x407, 0x7) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f00000001c0)={0x1000, 0x1, 0x80000000, 0x14, 0x2}) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r5, 0x202002) keyctl$chown(0x4, r5, r2, r3) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[], 0x2d, r5) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r6 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$KDSKBENT(r6, 0x4b47, &(0x7f0000000100)={0xbf, 0xc1, 0x101}) 06:51:33 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x4a300, 0x0) ioctl$EVIOCGKEYCODE_V2(r2, 0x80284504, &(0x7f00000002c0)=""/194) write$binfmt_elf64(r1, &(0x7f0000000040)={{0x1b, 0x3d, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r3, &(0x7f0000000040)={{0x1b, 0x3d, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) mount$fuse(0x0, &(0x7f0000000100)='./file0/file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=r3, @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') preadv(r4, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) fchmodat(r4, &(0x7f0000000180)='./file0\x00', 0x90) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:51:33 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r0) mkdirat(r0, &(0x7f0000000080)='./file0/file0\x00', 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x3f, 0xa4000) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000200040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:51:33 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657720657272797032f83ffacaaf38dfcfb2"], 0x2d, 0x0) r3 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x1, 0x500) fchdir(r0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='maps\x00') socket$isdn(0x22, 0x3, 0x25) preadv(r4, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000080)={0x0, 0x1, 0x4, 0x1, 0x80000401, {}, {0x3, 0x0, 0x0, 0x6c, 0x81, 0x53, "69ce33e7"}, 0xa, 0x2, @offset=0x2, 0x9b9d836, 0x0, r3}) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) socket(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000280)={'gre0\x00', &(0x7f0000000500)={'gretap0\x00', r6, 0x10, 0x80, 0x0, 0x800, {{0x29, 0x4, 0x1, 0x3c, 0xa4, 0x64, 0x0, 0x81, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, {[@cipso={0x86, 0x12, 0xffffffffffffffff, [{0x5, 0xc, "63be361a695d6ad8516e"}]}, @timestamp_prespec={0x44, 0x14, 0x4a, 0x3, 0x9, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8000}, {@broadcast, 0x4}]}, @timestamp={0x44, 0x1c, 0xe3, 0x0, 0x1, [0x40, 0x3, 0x200, 0x2, 0x9, 0xffff]}, @lsrr={0x83, 0x7, 0xc3, [@broadcast]}, @timestamp={0x44, 0x10, 0xb9, 0x0, 0x6, [0x1ff, 0x0, 0x8d]}, @cipso={0x86, 0x34, 0x0, [{0x5, 0x10, "c95799d63ff7479aace9310cf400"}, {0x0, 0x3, "88"}, {0x6, 0x12, "b4d1e4b018d60268f0d2ebd798a20916"}, {0x1, 0x9, "4e37abd7f39dca"}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f00000004c0)={'ip6gre0\x00', &(0x7f0000000440)={'syztnl1\x00', r7, 0x29, 0xd1, 0x0, 0x31400000, 0x8, @dev={0xfe, 0x80, [], 0x17}, @mcast1, 0x80, 0x700, 0x3ff, 0xfffffbff}}) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1150.545032] encrypted_key: master key parameter 'erryp2ø?úʯ8ßϲ' is invalid [ 1150.575885] encrypted_key: insufficient parameters specified [ 1150.579022] can: request_module (can-proto-0) failed. 06:51:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='ner:u\x00'/19], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:51:33 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240), 0x20000248) [ 1150.638605] can: request_module (can-proto-0) failed. [ 1150.639074] encrypted_key: insufficient parameters specified 06:51:33 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r1) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x2) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000000)=0x2) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240), 0x8) 06:51:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r2, 0x541c, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r3, &(0x7f0000000040)={{0x1b, 0x3d, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) ioctl$VT_DISALLOCATE(r3, 0x5608) clone(0x1000000218007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new ecryptfs user:u'], 0x2d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r4 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/adsp1\x00', 0x105500, 0x0) ioctl$SNDCTL_DSP_STEREO(r4, 0xc0045003, &(0x7f0000000080)) [ 1150.771329] encrypted_key: insufficient parameters specified [ 1150.802551] encrypted_key: master key parameter 'erryp2ø?úʯ8ßϲ' is invalid [ 1150.897106] kasan: CONFIG_KASAN_INLINE enabled [ 1150.897128] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 1150.897148] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 1150.897162] CPU: 1 PID: 9602 Comm: syz-executor.1 Not tainted 4.19.133-syzkaller #0 [ 1150.897170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1150.897189] RIP: 0010:do_con_write+0x94d/0x1d90 [ 1150.897201] Code: 03 9c 24 ba 00 00 00 01 dd e8 ef ea bd fd 48 8b 44 24 70 80 38 00 0f 85 75 11 00 00 49 8b 9d a0 03 00 00 48 89 d8 48 c1 e8 03 <42> 0f b6 14 30 48 89 d8 83 e0 07 83 c0 01 38 d0 7c 08 84 d2 0f 85 [ 1150.897208] RSP: 0018:ffff88820ded74c0 EFLAGS: 00010203 [ 1150.897219] RAX: 0000000020000001 RBX: 000000010000000e RCX: ffffc90007ccd000 [ 1150.897226] RDX: 0000000000000e5c RSI: ffffffff83abbde1 RDI: 0000000000000003 [ 1150.897233] RBP: 0000000000000740 R08: 0000000000000000 R09: 0000000000000000 [ 1150.897239] R10: 0000000000000003 R11: 0000000000000000 R12: 0000000000000001 [ 1150.897248] R13: ffff88804a5231c0 R14: dffffc0000000000 R15: 0000000000000000 [ 1150.897258] FS: 00007f5a74fd6700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 [ 1150.897266] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1150.897274] CR2: 00000000004f1250 CR3: 000000020a423000 CR4: 00000000001406e0 [ 1150.897284] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1150.897291] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1150.897295] Call Trace: [ 1150.897320] ? do_con_trol+0x5970/0x5970 [ 1150.897334] ? mark_held_locks+0xa6/0xf0 [ 1150.897348] ? finish_task_switch+0x118/0x780 [ 1150.897366] con_put_char+0x96/0xe0 [ 1150.897378] ? do_con_write+0x1d90/0x1d90 [ 1150.897392] ? __mutex_lock+0x3a8/0x1260 [ 1150.897404] ? mark_held_locks+0xa6/0xf0 [ 1150.897417] ? do_con_write+0x1d90/0x1d90 [ 1150.897429] tty_put_char+0xb7/0x150 [ 1150.897443] ? dev_match_devt+0x90/0x90 [ 1150.897455] ? n_tty_receive_buf_common+0xbce/0x2a90 [ 1150.897467] ? __mutex_add_waiter+0x160/0x160 [ 1150.897479] ? __mutex_unlock_slowpath+0xea/0x610 [ 1150.897492] do_output_char+0x155/0x850 [ 1150.897505] __process_echoes+0x38e/0x9f0 [ 1150.897522] n_tty_receive_buf_common+0xc0c/0x2a90 [ 1150.897546] tty_ldisc_receive_buf+0xa9/0x190 [ 1150.897558] ? n_tty_receive_buf_common+0x2a90/0x2a90 [ 1150.897572] paste_selection+0x1e5/0x46d [ 1150.897587] ? set_selection+0x12a0/0x12a0 [ 1150.897600] ? wake_up_q+0xe0/0xe0 [ 1150.897617] tioclinux+0x122/0x510 [ 1150.897630] vt_ioctl+0x1775/0x24d0 [ 1150.897643] ? vt_waitactive+0x350/0x350 [ 1150.897657] ? avc_has_extended_perms+0x86d/0xea0 [ 1150.897670] ? futex_wake+0x159/0x480 [ 1150.897685] ? avc_ss_reset+0x170/0x170 [ 1150.897697] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 1150.897712] ? tty_jobctrl_ioctl+0x4d/0xed0 [ 1150.897724] ? vt_waitactive+0x350/0x350 [ 1150.897735] tty_ioctl+0x5b0/0x15c0 [ 1150.897754] ? tty_fasync+0x300/0x300 [ 1150.897767] ? mark_held_locks+0xf0/0xf0 [ 1150.897779] ? do_futex+0x163/0x1c40 [ 1150.897793] ? mark_held_locks+0xf0/0xf0 [ 1150.897809] ? mark_held_locks+0xf0/0xf0 [ 1150.897823] ? debug_check_no_obj_freed+0x201/0x482 [ 1150.897839] ? __might_fault+0x11f/0x1d0 [ 1150.897851] ? tty_fasync+0x300/0x300 [ 1150.897867] do_vfs_ioctl+0xcdb/0x12e0 [ 1150.897884] ? selinux_file_ioctl+0x506/0x6c0 [ 1150.897899] ? ioctl_preallocate+0x200/0x200 [ 1150.897913] ? selinux_inode_link+0x20/0x20 [ 1150.897928] ? __fget+0x356/0x510 [ 1150.897949] ? do_dup2+0x450/0x450 [ 1150.897962] ? check_preemption_disabled+0x41/0x280 [ 1150.897979] ksys_ioctl+0x9b/0xc0 [ 1150.897994] __x64_sys_ioctl+0x6f/0xb0 [ 1150.898008] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1150.898023] do_syscall_64+0xf9/0x620 [ 1150.898041] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1150.898050] RIP: 0033:0x45c1d9 [ 1150.898064] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1150.898070] RSP: 002b:00007f5a74fd5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1150.898082] RAX: ffffffffffffffda RBX: 0000000000017480 RCX: 000000000045c1d9 [ 1150.898091] RDX: 00000000200000c0 RSI: 000000000000541c RDI: 0000000000000006 [ 1150.898099] RBP: 000000000078bf40 R08: 0000000000000000 R09: 0000000000000000 [ 1150.898106] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000078bf0c [ 1150.898115] R13: 00007fff5b639f9f R14: 00007f5a74fd69c0 R15: 000000000078bf0c [ 1150.898125] Modules linked in: [ 1150.903750] ---[ end trace 7edc12533848684a ]--- [ 1150.903773] RIP: 0010:do_con_write+0x94d/0x1d90 [ 1150.903788] Code: 03 9c 24 ba 00 00 00 01 dd e8 ef ea bd fd 48 8b 44 24 70 80 38 00 0f 85 75 11 00 00 49 8b 9d a0 03 00 00 48 89 d8 48 c1 e8 03 <42> 0f b6 14 30 48 89 d8 83 e0 07 83 c0 01 38 d0 7c 08 84 d2 0f 85 [ 1150.903798] RSP: 0018:ffff88820ded74c0 EFLAGS: 00010203 [ 1150.903813] RAX: 0000000020000001 RBX: 000000010000000e RCX: ffffc90007ccd000 [ 1150.903821] RDX: 0000000000000e5c RSI: ffffffff83abbde1 RDI: 0000000000000003 [ 1150.903831] RBP: 0000000000000740 R08: 0000000000000000 R09: 0000000000000000 [ 1150.903841] R10: 0000000000000003 R11: 0000000000000000 R12: 0000000000000001 [ 1150.903856] R13: ffff88804a5231c0 R14: dffffc0000000000 R15: 0000000000000000 [ 1150.903869] FS: 00007f5a74fd6700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 [ 1150.903879] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1150.903888] CR2: 00007f164b900000 CR3: 000000020a423000 CR4: 00000000001406e0 [ 1150.903901] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1150.903909] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1150.903918] Kernel panic - not syncing: Fatal exception [ 1150.905204] Kernel Offset: disabled [ 1151.439014] Rebooting in 86400 seconds..