874.056964] tty_port_register_device+0x3e/0x50 [ 874.061642] rfcomm_dev_ioctl+0x15d7/0x1b60 [ 874.065970] ? rfcomm_dev_state_change+0x150/0x150 [ 874.070890] ? __local_bh_enable_ip+0x15a/0x270 [ 874.075551] rfcomm_sock_ioctl+0x90/0xb0 [ 874.079600] sock_do_ioctl+0xde/0x300 [ 874.083387] ? compat_ifr_data_ioctl+0x160/0x160 [ 874.088130] ? kasan_check_read+0x11/0x20 [ 874.092272] ? mark_held_locks+0x100/0x100 [ 874.096496] sock_ioctl+0x32b/0x610 [ 874.100110] ? dlci_ioctl_set+0x40/0x40 [ 874.104072] ? __fget+0x340/0x540 [ 874.107527] ? smk_access+0x40d/0x570 [ 874.112065] ? find_held_lock+0x35/0x130 [ 874.116117] ? smk_tskacc+0x2ba/0x390 [ 874.119901] ? dlci_ioctl_set+0x40/0x40 [ 874.123864] do_vfs_ioctl+0xd6e/0x1390 [ 874.127737] ? smk_curacc+0x7f/0xa0 [ 874.131353] ? ioctl_preallocate+0x210/0x210 [ 874.135752] ? smack_file_ioctl+0x196/0x300 [ 874.140061] ? smack_file_lock+0x240/0x240 [ 874.144285] ? __fget+0x367/0x540 [ 874.147728] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 874.153250] ? fput+0x128/0x1a0 [ 874.156520] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 874.162043] ? security_file_ioctl+0x93/0xc0 [ 874.166440] ksys_ioctl+0xab/0xd0 [ 874.169879] __x64_sys_ioctl+0x73/0xb0 [ 874.173758] do_syscall_64+0x103/0x610 [ 874.177644] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 874.182819] RIP: 0033:0x457e29 [ 874.185998] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 874.204885] RSP: 002b:00007fb6ddf5fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 874.213267] RAX: ffffffffffffffda RBX: 00007fb6ddf5fc90 RCX: 0000000000457e29 [ 874.220523] RDX: 0000000020000100 RSI: 00000000400452c8 RDI: 0000000000000005 [ 874.227777] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 874.235033] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb6ddf606d4 [ 874.242288] R13: 00000000004c0359 R14: 00000000004d1f88 R15: 0000000000000004 [ 874.318284] IPVS: ftp: loaded support on port[0] = 21 03:43:01 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x100000000000000]}, &(0x7f0000000000)=0x54) 03:43:01 executing program 5: socket$alg(0x26, 0x5, 0x0) socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x1, 0xe59) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x5, &(0x7f0000000580)=0x6) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$inet6(0xa, 0x2, 0xfd9) ioctl(r0, 0x10001, &(0x7f0000000100)="153f6234488dd25d766070") socketpair$unix(0x1, 0x45, 0x0, &(0x7f0000000440)) socket(0xa, 0x3, 0x8) r1 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000800)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:01 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SVE_SET_VL(0x32, 0x1cdf0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x14) 03:43:01 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:01 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') close(r0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:43:01 executing program 1 (fault-call:5 fault-nth:12): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) [ 874.716700] CUSE: unknown device info "" [ 874.721388] FAULT_INJECTION: forcing a failure. [ 874.721388] name failslab, interval 1, probability 0, space 0, times 0 [ 874.733914] CUSE: zero length info key specified [ 874.749708] IPVS: ftp: loaded support on port[0] = 21 [ 874.755070] CPU: 0 PID: 16478 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #86 [ 874.762348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 874.771796] Call Trace: [ 874.774398] dump_stack+0x172/0x1f0 [ 874.778037] should_fail.cold+0xa/0x1b [ 874.781938] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 874.787046] ? lock_downgrade+0x810/0x810 [ 874.791206] ? ___might_sleep+0x163/0x280 [ 874.795364] __should_failslab+0x121/0x190 [ 874.799606] should_failslab+0x9/0x14 [ 874.803416] kmem_cache_alloc+0x2b2/0x6f0 [ 874.807577] ? kernfs_find_and_get_ns+0x26/0x70 [ 874.812628] __kernfs_new_node+0xef/0x690 [ 874.816783] ? kernfs_find_and_get_ns+0x26/0x70 [ 874.821454] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 874.821481] ? lock_downgrade+0x810/0x810 [ 874.821500] ? mutex_trylock+0x1e0/0x1e0 [ 874.821512] ? kernfs_activate+0x192/0x1f0 [ 874.821535] kernfs_new_node+0x99/0x130 [ 874.821554] __kernfs_create_file+0x51/0x340 [ 874.821572] sysfs_add_file_mode_ns+0x222/0x560 [ 874.821594] sysfs_merge_group+0x1a0/0x340 [ 874.821608] ? sysfs_mount+0x1e0/0x1e0 [ 874.834542] ? kernfs_put+0x3c2/0x5d0 [ 874.863670] dpm_sysfs_add+0x164/0x210 [ 874.867570] device_add+0xa20/0x1870 [ 874.871307] ? get_device_parent.isra.0+0x570/0x570 [ 874.876333] ? __init_waitqueue_head+0x36/0x90 [ 874.880927] ? pm_runtime_init+0x364/0x420 [ 874.885163] device_register+0x1e/0x30 [ 874.889037] tty_register_device_attr+0x35c/0x740 [ 874.893869] ? hung_up_tty_compat_ioctl+0x40/0x40 [ 874.898699] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 874.903531] ? lockdep_init_map+0x10c/0x5b0 [ 874.907841] ? wait_for_completion+0x440/0x440 [ 874.912737] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 874.917747] tty_port_register_device+0x3e/0x50 [ 874.922408] rfcomm_dev_ioctl+0x15d7/0x1b60 [ 874.926720] ? rfcomm_dev_state_change+0x150/0x150 [ 874.931640] ? __local_bh_enable_ip+0x15a/0x270 [ 874.936300] rfcomm_sock_ioctl+0x90/0xb0 [ 874.940437] sock_do_ioctl+0xde/0x300 [ 874.944224] ? compat_ifr_data_ioctl+0x160/0x160 [ 874.948968] ? kasan_check_read+0x11/0x20 [ 874.953106] ? mark_held_locks+0x100/0x100 [ 874.957327] sock_ioctl+0x32b/0x610 [ 874.960937] ? dlci_ioctl_set+0x40/0x40 [ 874.964896] ? __fget+0x340/0x540 [ 874.968332] ? smk_access+0x40d/0x570 [ 874.972127] ? find_held_lock+0x35/0x130 [ 874.976178] ? smk_tskacc+0x2ba/0x390 [ 874.979960] ? dlci_ioctl_set+0x40/0x40 [ 874.983923] do_vfs_ioctl+0xd6e/0x1390 [ 874.987794] ? smk_curacc+0x7f/0xa0 [ 874.991409] ? ioctl_preallocate+0x210/0x210 [ 874.995804] ? smack_file_ioctl+0x196/0x300 [ 875.000110] ? smack_file_lock+0x240/0x240 [ 875.004325] ? __fget+0x367/0x540 [ 875.007768] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 875.013586] ? fput+0x128/0x1a0 [ 875.016854] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 875.022488] ? security_file_ioctl+0x93/0xc0 [ 875.026883] ksys_ioctl+0xab/0xd0 [ 875.030324] __x64_sys_ioctl+0x73/0xb0 [ 875.034200] do_syscall_64+0x103/0x610 [ 875.038077] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 875.043267] RIP: 0033:0x457e29 [ 875.046448] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:43:01 executing program 5: socket$alg(0x26, 0x5, 0x0) socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x1, 0xe59) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x5, &(0x7f0000000580)=0x6) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$inet6(0xa, 0x2, 0xfd9) ioctl(r0, 0x10001, &(0x7f0000000100)="153f6234488dd25d766070") socketpair$unix(0x1, 0x45, 0x0, &(0x7f0000000440)) socket(0xa, 0x3, 0x8) syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 875.065335] RSP: 002b:00007fb6ddf5fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 875.073025] RAX: ffffffffffffffda RBX: 00007fb6ddf5fc90 RCX: 0000000000457e29 [ 875.080278] RDX: 0000000020000100 RSI: 00000000400452c8 RDI: 0000000000000005 [ 875.087529] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 875.094793] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb6ddf606d4 [ 875.102044] R13: 00000000004c0359 R14: 00000000004d1f88 R15: 0000000000000004 03:43:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x81000008913, &(0x7f0000000100)="0adc1f123c40a41d88b070") r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f00000001c0)={0x0, 0x401, 0x4, {0x1, @vbi={0x0, 0x0, 0x0, 0x0, [0x0, 0x96000]}}}) 03:43:02 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x4002, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400200) pipe2(&(0x7f0000000240), 0x84000) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x240, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x998) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x424200, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)=0x14) r6 = fcntl$dupfd(r5, 0x406, r1) write$P9_RGETATTR(r6, &(0x7f0000000180)={0xa0, 0x19, 0x1, {0x0, {0x20, 0x1, 0x7}, 0x0, r3, r4, 0x10000, 0x7fffffff, 0x1000, 0xcd8b, 0xfffffffffffffffa, 0x401, 0xfffffffffffffffb, 0x25, 0xef, 0xffff, 0xa62, 0x5, 0x400, 0x2, 0x1}}, 0xa0) 03:43:02 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x5, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 875.116684] CUSE: unknown device info "" [ 875.124267] CUSE: zero length info key specified 03:43:02 executing program 1 (fault-call:5 fault-nth:13): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:02 executing program 5: socket$alg(0x26, 0x5, 0x0) socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x1, 0xe59) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x5, &(0x7f0000000580)=0x6) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$inet6(0xa, 0x2, 0xfd9) ioctl(r0, 0x10001, &(0x7f0000000100)="153f6234488dd25d766070") socketpair$unix(0x1, 0x45, 0x0, &(0x7f0000000440)) socket(0xa, 0x3, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 875.313651] CUSE: unknown device info "" [ 875.320609] CUSE: zero length info key specified [ 875.345955] CUSE: unknown device info "" [ 875.350140] CUSE: zero length info key specified [ 875.421197] FAULT_INJECTION: forcing a failure. [ 875.421197] name failslab, interval 1, probability 0, space 0, times 0 [ 875.468754] CPU: 0 PID: 16521 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #86 [ 875.476053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 875.476060] Call Trace: [ 875.476084] dump_stack+0x172/0x1f0 [ 875.476105] should_fail.cold+0xa/0x1b [ 875.476126] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 875.476143] ? lock_downgrade+0x810/0x810 [ 875.504802] ? ___might_sleep+0x163/0x280 [ 875.509323] __should_failslab+0x121/0x190 [ 875.513568] should_failslab+0x9/0x14 [ 875.517380] kmem_cache_alloc+0x2b2/0x6f0 [ 875.521545] ? kernfs_find_and_get_ns+0x26/0x70 [ 875.526231] __kernfs_new_node+0xef/0x690 [ 875.530376] ? kernfs_find_and_get_ns+0x26/0x70 [ 875.535040] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 875.535067] ? lock_downgrade+0x810/0x810 [ 875.543952] ? mutex_trylock+0x1e0/0x1e0 [ 875.548011] ? kernfs_activate+0x192/0x1f0 [ 875.548029] kernfs_new_node+0x99/0x130 [ 875.548049] __kernfs_create_file+0x51/0x340 [ 875.548067] sysfs_add_file_mode_ns+0x222/0x560 [ 875.548086] sysfs_merge_group+0x1a0/0x340 [ 875.560655] ? sysfs_mount+0x1e0/0x1e0 [ 875.560668] ? kernfs_put+0x3c2/0x5d0 [ 875.560696] dpm_sysfs_add+0x164/0x210 [ 875.560710] device_add+0xa20/0x1870 [ 875.577260] ? get_device_parent.isra.0+0x570/0x570 [ 875.577276] ? __init_waitqueue_head+0x36/0x90 [ 875.577293] ? pm_runtime_init+0x364/0x420 [ 875.577310] device_register+0x1e/0x30 [ 875.577328] tty_register_device_attr+0x35c/0x740 [ 875.577347] ? hung_up_tty_compat_ioctl+0x40/0x40 [ 875.589926] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 875.589943] ? lockdep_init_map+0x10c/0x5b0 [ 875.589959] ? wait_for_completion+0x440/0x440 [ 875.589976] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 875.589996] tty_port_register_device+0x3e/0x50 [ 875.590015] rfcomm_dev_ioctl+0x15d7/0x1b60 [ 875.590036] ? rfcomm_dev_state_change+0x150/0x150 [ 875.607526] ? __local_bh_enable_ip+0x15a/0x270 [ 875.622045] rfcomm_sock_ioctl+0x90/0xb0 [ 875.622065] sock_do_ioctl+0xde/0x300 [ 875.622081] ? compat_ifr_data_ioctl+0x160/0x160 [ 875.622098] ? kasan_check_read+0x11/0x20 [ 875.622119] ? mark_held_locks+0x100/0x100 [ 875.636348] sock_ioctl+0x32b/0x610 [ 875.650219] ? dlci_ioctl_set+0x40/0x40 [ 875.650234] ? __fget+0x340/0x540 [ 875.650248] ? smk_access+0x40d/0x570 [ 875.650262] ? find_held_lock+0x35/0x130 [ 875.650283] ? smk_tskacc+0x2ba/0x390 [ 875.666979] ? dlci_ioctl_set+0x40/0x40 [ 875.666997] do_vfs_ioctl+0xd6e/0x1390 [ 875.667012] ? smk_curacc+0x7f/0xa0 [ 875.667028] ? ioctl_preallocate+0x210/0x210 [ 875.667043] ? smack_file_ioctl+0x196/0x300 [ 875.667057] ? smack_file_lock+0x240/0x240 [ 875.667070] ? __fget+0x367/0x540 [ 875.678871] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 875.678887] ? fput+0x128/0x1a0 [ 875.678907] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 875.678922] ? security_file_ioctl+0x93/0xc0 [ 875.678938] ksys_ioctl+0xab/0xd0 [ 875.686164] __x64_sys_ioctl+0x73/0xb0 [ 875.686183] do_syscall_64+0x103/0x610 [ 875.686212] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 875.686224] RIP: 0033:0x457e29 [ 875.686239] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 875.686246] RSP: 002b:00007fb6ddf3ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 875.686260] RAX: ffffffffffffffda RBX: 00007fb6ddf3ec90 RCX: 0000000000457e29 [ 875.686271] RDX: 0000000020000100 RSI: 00000000400452c8 RDI: 0000000000000005 [ 875.701932] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 875.701942] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb6ddf3f6d4 [ 875.701950] R13: 00000000004c0359 R14: 00000000004d1f88 R15: 0000000000000004 [ 875.871487] IPVS: ftp: loaded support on port[0] = 21 03:43:02 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x1100000000000000]}, &(0x7f0000000000)=0x54) 03:43:02 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000100)={0x0, 0x5}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000340)=ANY=[@ANYRES32=r4, @ANYBLOB="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"], 0xa) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)=0x14) 03:43:02 executing program 4: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x1, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(&(0x7f0000b57ff8), 0x0) madvise(&(0x7f0000b9c000/0x3000)=nil, 0x3000, 0xf) ioctl$TIOCNXCL(r0, 0x540d) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) 03:43:02 executing program 5: socket$alg(0x26, 0x5, 0x0) socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x1, 0xe59) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x5, &(0x7f0000000580)=0x6) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$inet6(0xa, 0x2, 0xfd9) ioctl(r0, 0x10001, &(0x7f0000000100)="153f6234488dd25d766070") socketpair$unix(0x1, 0x45, 0x0, &(0x7f0000000440)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:02 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x6, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:02 executing program 1 (fault-call:5 fault-nth:14): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) [ 876.098459] FAULT_INJECTION: forcing a failure. [ 876.098459] name failslab, interval 1, probability 0, space 0, times 0 [ 876.110525] CUSE: unknown device info "" [ 876.117747] CUSE: zero length info key specified [ 876.130571] CUSE: unknown device info "" [ 876.136242] CPU: 0 PID: 16538 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #86 [ 876.140759] IPVS: ftp: loaded support on port[0] = 21 [ 876.143531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 876.143537] Call Trace: [ 876.143561] dump_stack+0x172/0x1f0 [ 876.143582] should_fail.cold+0xa/0x1b [ 876.143601] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 876.143618] ? lock_downgrade+0x810/0x810 [ 876.143634] ? ___might_sleep+0x163/0x280 [ 876.143649] __should_failslab+0x121/0x190 [ 876.158486] CUSE: zero length info key specified [ 876.160763] should_failslab+0x9/0x14 [ 876.160782] kmem_cache_alloc+0x2b2/0x6f0 [ 876.160800] ? lock_downgrade+0x810/0x810 [ 876.160820] __kernfs_new_node+0xef/0x690 [ 876.160838] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 876.160857] ? wait_for_completion+0x440/0x440 [ 876.160878] ? mutex_unlock+0xd/0x10 [ 876.177594] ? kernfs_activate+0x192/0x1f0 [ 876.177613] kernfs_new_node+0x99/0x130 [ 876.177633] __kernfs_create_file+0x51/0x340 [ 876.177651] sysfs_add_file_mode_ns+0x222/0x560 [ 876.177672] sysfs_merge_group+0x1a0/0x340 [ 876.186021] ? sysfs_mount+0x1e0/0x1e0 [ 876.186034] ? kernfs_put+0x3c2/0x5d0 [ 876.186062] dpm_sysfs_add+0x164/0x210 [ 876.186078] device_add+0xa20/0x1870 [ 876.186098] ? get_device_parent.isra.0+0x570/0x570 [ 876.186112] ? __init_waitqueue_head+0x36/0x90 [ 876.186130] ? pm_runtime_init+0x364/0x420 [ 876.194750] device_register+0x1e/0x30 [ 876.194770] tty_register_device_attr+0x35c/0x740 [ 876.194791] ? hung_up_tty_compat_ioctl+0x40/0x40 [ 876.194808] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 876.194822] ? lockdep_init_map+0x10c/0x5b0 [ 876.203090] ? wait_for_completion+0x440/0x440 03:43:03 executing program 0: ustat(0x100, &(0x7f00000000c0)) socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x14) 03:43:03 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x7, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:03 executing program 5: socket$alg(0x26, 0x5, 0x0) socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x1, 0xe59) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x5, &(0x7f0000000580)=0x6) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$inet6(0xa, 0x2, 0xfd9) ioctl(r0, 0x10001, &(0x7f0000000100)="153f6234488dd25d766070") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 876.203108] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 876.203129] tty_port_register_device+0x3e/0x50 [ 876.203157] rfcomm_dev_ioctl+0x15d7/0x1b60 [ 876.203178] ? rfcomm_dev_state_change+0x150/0x150 [ 876.203196] ? __local_bh_enable_ip+0x15a/0x270 [ 876.220663] rfcomm_sock_ioctl+0x90/0xb0 [ 876.220682] sock_do_ioctl+0xde/0x300 [ 876.220698] ? compat_ifr_data_ioctl+0x160/0x160 [ 876.220717] ? kasan_check_read+0x11/0x20 [ 876.220737] ? mark_held_locks+0x100/0x100 [ 876.233306] sock_ioctl+0x32b/0x610 03:43:03 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x100000000000000]}, &(0x7f0000000000)=0x54) [ 876.233321] ? dlci_ioctl_set+0x40/0x40 [ 876.233335] ? __fget+0x340/0x540 [ 876.233350] ? smk_access+0x40d/0x570 [ 876.233363] ? find_held_lock+0x35/0x130 [ 876.233382] ? smk_tskacc+0x2ba/0x390 [ 876.233393] ? dlci_ioctl_set+0x40/0x40 [ 876.233415] do_vfs_ioctl+0xd6e/0x1390 [ 876.242275] ? smk_curacc+0x7f/0xa0 [ 876.242292] ? ioctl_preallocate+0x210/0x210 [ 876.242308] ? smack_file_ioctl+0x196/0x300 [ 876.242323] ? smack_file_lock+0x240/0x240 [ 876.242335] ? __fget+0x367/0x540 [ 876.242358] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 876.242372] ? fput+0x128/0x1a0 [ 876.250025] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 876.250042] ? security_file_ioctl+0x93/0xc0 [ 876.250059] ksys_ioctl+0xab/0xd0 [ 876.250077] __x64_sys_ioctl+0x73/0xb0 [ 876.250095] do_syscall_64+0x103/0x610 [ 876.257664] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 876.257676] RIP: 0033:0x457e29 [ 876.257690] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 876.257698] RSP: 002b:00007fb6ddf5fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 876.257713] RAX: ffffffffffffffda RBX: 00007fb6ddf5fc90 RCX: 0000000000457e29 [ 876.257721] RDX: 0000000020000100 RSI: 00000000400452c8 RDI: 0000000000000005 [ 876.257730] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 876.257739] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb6ddf606d4 [ 876.257746] R13: 00000000004c0359 R14: 00000000004d1f88 R15: 0000000000000004 [ 876.515680] CUSE: unknown device info "" 03:43:03 executing program 1 (fault-call:5 fault-nth:15): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) [ 876.548552] CUSE: zero length info key specified [ 876.559010] IPVS: ftp: loaded support on port[0] = 21 [ 876.787000] CUSE: unknown device info "" [ 876.793532] CUSE: zero length info key specified 03:43:03 executing program 5: socket$alg(0x26, 0x5, 0x0) socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x1, 0xe59) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x5, &(0x7f0000000580)=0x6) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$inet6(0xa, 0x2, 0xfd9) ioctl(r0, 0x10001, &(0x7f0000000100)="153f6234488dd25d766070") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 876.840062] FAULT_INJECTION: forcing a failure. [ 876.840062] name failslab, interval 1, probability 0, space 0, times 0 [ 876.884238] CPU: 1 PID: 16570 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #86 [ 876.891533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 876.900884] Call Trace: [ 876.903481] dump_stack+0x172/0x1f0 [ 876.907122] should_fail.cold+0xa/0x1b [ 876.911757] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 876.916863] ? lock_downgrade+0x810/0x810 [ 876.916881] ? ___might_sleep+0x163/0x280 [ 876.916902] __should_failslab+0x121/0x190 [ 876.916922] should_failslab+0x9/0x14 [ 876.916936] kmem_cache_alloc+0x2b2/0x6f0 [ 876.916950] ? lock_downgrade+0x810/0x810 [ 876.929445] ? kasan_check_read+0x11/0x20 [ 876.937352] __kernfs_new_node+0xef/0x690 [ 876.937370] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 876.937389] ? wait_for_completion+0x440/0x440 [ 876.937416] ? mutex_unlock+0xd/0x10 [ 876.945674] ? kernfs_activate+0x192/0x1f0 [ 876.945692] kernfs_new_node+0x99/0x130 [ 876.945712] __kernfs_create_file+0x51/0x340 [ 876.945730] sysfs_add_file_mode_ns+0x222/0x560 [ 876.945756] sysfs_merge_group+0x1a0/0x340 [ 876.959185] ? sysfs_mount+0x1e0/0x1e0 [ 876.959195] ? kernfs_put+0x3c2/0x5d0 [ 876.959222] dpm_sysfs_add+0x164/0x210 [ 876.967126] device_add+0xa20/0x1870 [ 876.967146] ? get_device_parent.isra.0+0x570/0x570 [ 876.967160] ? __init_waitqueue_head+0x36/0x90 [ 876.967177] ? pm_runtime_init+0x364/0x420 [ 876.967207] device_register+0x1e/0x30 [ 876.967222] tty_register_device_attr+0x35c/0x740 [ 876.967259] ? hung_up_tty_compat_ioctl+0x40/0x40 [ 876.975597] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 876.975610] ? lockdep_init_map+0x10c/0x5b0 [ 876.975625] ? wait_for_completion+0x440/0x440 [ 876.984481] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 876.984501] tty_port_register_device+0x3e/0x50 [ 876.984520] rfcomm_dev_ioctl+0x15d7/0x1b60 [ 876.984545] ? rfcomm_dev_state_change+0x150/0x150 [ 876.992191] ? __local_bh_enable_ip+0x15a/0x270 [ 876.992213] rfcomm_sock_ioctl+0x90/0xb0 [ 876.999790] sock_do_ioctl+0xde/0x300 [ 877.010098] ? compat_ifr_data_ioctl+0x160/0x160 [ 877.010115] ? kasan_check_read+0x11/0x20 [ 877.010148] ? mark_held_locks+0x100/0x100 [ 877.023083] sock_ioctl+0x32b/0x610 [ 877.032735] ? dlci_ioctl_set+0x40/0x40 [ 877.032748] ? __fget+0x340/0x540 [ 877.032762] ? smk_access+0x40d/0x570 [ 877.041638] ? find_held_lock+0x35/0x130 [ 877.051291] ? smk_tskacc+0x2ba/0x390 [ 877.051307] ? dlci_ioctl_set+0x40/0x40 [ 877.060615] do_vfs_ioctl+0xd6e/0x1390 [ 877.060633] ? smk_curacc+0x7f/0xa0 [ 877.069322] ? ioctl_preallocate+0x210/0x210 [ 877.069336] ? smack_file_ioctl+0x196/0x300 [ 877.069351] ? smack_file_lock+0x240/0x240 [ 877.077860] ? __fget+0x367/0x540 [ 877.077885] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 877.077898] ? fput+0x128/0x1a0 [ 877.077917] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 877.077932] ? security_file_ioctl+0x93/0xc0 [ 877.077950] ksys_ioctl+0xab/0xd0 [ 877.089909] __x64_sys_ioctl+0x73/0xb0 [ 877.097309] do_syscall_64+0x103/0x610 [ 877.097329] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 877.105143] RIP: 0033:0x457e29 [ 877.105156] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 877.105163] RSP: 002b:00007fb6ddf5fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 877.105175] RAX: ffffffffffffffda RBX: 00007fb6ddf5fc90 RCX: 0000000000457e29 [ 877.105183] RDX: 0000000020000100 RSI: 00000000400452c8 RDI: 0000000000000005 [ 877.105191] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 877.105199] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb6ddf606d4 [ 877.105207] R13: 00000000004c0359 R14: 00000000004d1f88 R15: 0000000000000004 [ 877.250224] IPVS: ftp: loaded support on port[0] = 21 03:43:04 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x8800000000000000]}, &(0x7f0000000000)=0x54) 03:43:04 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:04 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000440)=[&(0x7f0000000200)='em0\x00', &(0x7f0000000240)='/dev/ptmx\x00', &(0x7f0000000280)='/dev/ptmx\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='/dev/ptmx\x00', &(0x7f0000000340)='/dev/ptmx\x00', &(0x7f0000000380)='/dev/ptmx\x00', &(0x7f00000003c0)='/dev/ptmx\x00', &(0x7f0000000400)='/em0ppp0\x00'], &(0x7f0000000600)=[&(0x7f00000004c0)='\\#ppp0\x00', &(0x7f0000000500)='&,,\x00', &(0x7f0000000540)='/dev/ptmx\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='systemk}\x00']) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(r3, 0x4b67, &(0x7f0000000180)={0x3, &(0x7f0000000100)=[{0x10000, 0x1}, {0x8001, 0x42af}, {0x3, 0x100}]}) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x14) 03:43:04 executing program 1 (fault-call:5 fault-nth:16): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:04 executing program 5: socket$alg(0x26, 0x5, 0x0) socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x1, 0xe59) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x5, &(0x7f0000000580)=0x6) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$inet6(0xa, 0x2, 0xfd9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 877.641016] CUSE: unknown device info "" [ 877.659297] FAULT_INJECTION: forcing a failure. [ 877.659297] name failslab, interval 1, probability 0, space 0, times 0 [ 877.673440] CUSE: zero length info key specified [ 877.680473] CPU: 1 PID: 16590 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #86 [ 877.687764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 877.697113] Call Trace: [ 877.697136] dump_stack+0x172/0x1f0 [ 877.697156] should_fail.cold+0xa/0x1b [ 877.703343] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 877.703361] ? lock_downgrade+0x810/0x810 [ 877.703380] ? ___might_sleep+0x163/0x280 [ 877.703400] __should_failslab+0x121/0x190 [ 877.703418] should_failslab+0x9/0x14 [ 877.703432] kmem_cache_alloc+0x2b2/0x6f0 [ 877.703447] ? lock_downgrade+0x810/0x810 [ 877.703462] ? kasan_check_read+0x11/0x20 [ 877.713161] __kernfs_new_node+0xef/0x690 [ 877.713180] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 877.713201] ? wait_for_completion+0x440/0x440 [ 877.721474] ? mutex_unlock+0xd/0x10 [ 877.721489] ? kernfs_activate+0x192/0x1f0 [ 877.721506] kernfs_new_node+0x99/0x130 [ 877.729514] __kernfs_create_file+0x51/0x340 [ 877.737771] sysfs_add_file_mode_ns+0x222/0x560 [ 877.742369] CUSE: unknown device info "" [ 877.746045] sysfs_merge_group+0x1a0/0x340 [ 877.746062] ? sysfs_mount+0x1e0/0x1e0 [ 877.746073] ? kernfs_put+0x3c2/0x5d0 [ 877.746103] dpm_sysfs_add+0x164/0x210 [ 877.746116] device_add+0xa20/0x1870 [ 877.746134] ? get_device_parent.isra.0+0x570/0x570 [ 877.759134] ? __init_waitqueue_head+0x36/0x90 [ 877.759152] ? pm_runtime_init+0x364/0x420 [ 877.759170] device_register+0x1e/0x30 [ 877.765860] CUSE: zero length info key specified [ 877.767350] tty_register_device_attr+0x35c/0x740 [ 877.767369] ? hung_up_tty_compat_ioctl+0x40/0x40 [ 877.776411] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 877.776428] ? lockdep_init_map+0x10c/0x5b0 [ 877.776445] ? wait_for_completion+0x440/0x440 [ 877.776461] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 877.776481] tty_port_register_device+0x3e/0x50 [ 877.776501] rfcomm_dev_ioctl+0x15d7/0x1b60 [ 877.776521] ? rfcomm_dev_state_change+0x150/0x150 [ 877.776539] ? __local_bh_enable_ip+0x15a/0x270 [ 877.776558] rfcomm_sock_ioctl+0x90/0xb0 [ 877.788778] sock_do_ioctl+0xde/0x300 [ 877.788795] ? compat_ifr_data_ioctl+0x160/0x160 [ 877.788814] ? kasan_check_read+0x11/0x20 [ 877.796467] ? mark_held_locks+0x100/0x100 [ 877.796486] sock_ioctl+0x32b/0x610 [ 877.796502] ? dlci_ioctl_set+0x40/0x40 [ 877.796514] ? __fget+0x340/0x540 [ 877.796528] ? smk_access+0x40d/0x570 [ 877.796541] ? find_held_lock+0x35/0x130 [ 877.796557] ? smk_tskacc+0x2ba/0x390 [ 877.796571] ? dlci_ioctl_set+0x40/0x40 [ 877.810557] do_vfs_ioctl+0xd6e/0x1390 [ 877.810572] ? smk_curacc+0x7f/0xa0 [ 877.810587] ? ioctl_preallocate+0x210/0x210 [ 877.823414] ? smack_file_ioctl+0x196/0x300 [ 877.823430] ? smack_file_lock+0x240/0x240 [ 877.823443] ? __fget+0x367/0x540 [ 877.823467] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 877.823479] ? fput+0x128/0x1a0 [ 877.823497] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 877.833141] ? security_file_ioctl+0x93/0xc0 [ 877.833158] ksys_ioctl+0xab/0xd0 [ 877.833174] __x64_sys_ioctl+0x73/0xb0 [ 877.842308] do_syscall_64+0x103/0x610 [ 877.842325] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 877.842356] RIP: 0033:0x457e29 [ 877.856572] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 877.870438] RSP: 002b:00007fb6ddf5fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 877.870454] RAX: ffffffffffffffda RBX: 00007fb6ddf5fc90 RCX: 0000000000457e29 [ 877.870462] RDX: 0000000020000100 RSI: 00000000400452c8 RDI: 0000000000000005 [ 877.870472] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 877.887169] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb6ddf606d4 [ 877.887178] R13: 00000000004c0359 R14: 00000000004d1f88 R15: 0000000000000004 [ 878.064575] IPVS: ftp: loaded support on port[0] = 21 03:43:05 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0xc, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:05 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000100)={&(0x7f00000000c0)=""/24, 0x18, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0x4) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x14) 03:43:05 executing program 5: socket$alg(0x26, 0x5, 0x0) socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x1, 0xe59) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x5, &(0x7f0000000580)=0x6) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:05 executing program 1 (fault-call:5 fault-nth:17): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) [ 878.370488] CUSE: unknown device info "" [ 878.379018] CUSE: zero length info key specified [ 878.405470] FAULT_INJECTION: forcing a failure. [ 878.405470] name failslab, interval 1, probability 0, space 0, times 0 [ 878.481895] CUSE: unknown device info "" [ 878.486579] CUSE: zero length info key specified [ 878.513027] CPU: 1 PID: 16627 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #86 [ 878.520440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 878.529793] Call Trace: [ 878.532395] dump_stack+0x172/0x1f0 [ 878.536036] should_fail.cold+0xa/0x1b [ 878.539935] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 878.545054] ? lock_downgrade+0x810/0x810 [ 878.549208] ? ___might_sleep+0x163/0x280 [ 878.553478] __should_failslab+0x121/0x190 [ 878.557720] should_failslab+0x9/0x14 [ 878.561525] kmem_cache_alloc+0x2b2/0x6f0 [ 878.565688] __kernfs_new_node+0xef/0x690 [ 878.569847] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 878.574612] ? __lock_is_held+0xb6/0x140 [ 878.578763] ? device_pm_add+0x29/0x270 [ 878.582750] ? lock_acquire+0x16f/0x3f0 [ 878.586742] kernfs_new_node+0x99/0x130 [ 878.590732] __kernfs_create_file+0x51/0x340 [ 878.595152] sysfs_add_file_mode_ns+0x222/0x560 [ 878.599833] sysfs_create_file_ns+0x13d/0x1d0 [ 878.604333] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 878.609884] ? sysfs_add_file_mode_ns+0x560/0x560 [ 878.614739] ? wait_for_completion+0x440/0x440 [ 878.619343] device_create_file+0xfa/0x1e0 [ 878.623585] device_add+0x119e/0x1870 [ 878.627400] ? get_device_parent.isra.0+0x570/0x570 [ 878.632418] ? __init_waitqueue_head+0x36/0x90 [ 878.637006] ? pm_runtime_init+0x364/0x420 [ 878.641246] device_register+0x1e/0x30 [ 878.645144] tty_register_device_attr+0x35c/0x740 [ 878.649999] ? hung_up_tty_compat_ioctl+0x40/0x40 [ 878.654852] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 878.659697] ? lockdep_init_map+0x10c/0x5b0 [ 878.664051] ? wait_for_completion+0x440/0x440 [ 878.668640] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 878.673669] tty_port_register_device+0x3e/0x50 [ 878.678355] rfcomm_dev_ioctl+0x15d7/0x1b60 [ 878.682694] ? rfcomm_dev_state_change+0x150/0x150 [ 878.687647] ? __local_bh_enable_ip+0x15a/0x270 [ 878.692327] rfcomm_sock_ioctl+0x90/0xb0 [ 878.696396] sock_do_ioctl+0xde/0x300 [ 878.700203] ? compat_ifr_data_ioctl+0x160/0x160 [ 878.704980] ? kasan_check_read+0x11/0x20 [ 878.709878] ? mark_held_locks+0x100/0x100 [ 878.714121] sock_ioctl+0x32b/0x610 [ 878.717753] ? dlci_ioctl_set+0x40/0x40 [ 878.721735] ? __fget+0x340/0x540 [ 878.725192] ? smk_access+0x40d/0x570 [ 878.729003] ? find_held_lock+0x35/0x130 [ 878.733077] ? smk_tskacc+0x2ba/0x390 [ 878.736883] ? dlci_ioctl_set+0x40/0x40 [ 878.740863] do_vfs_ioctl+0xd6e/0x1390 [ 878.744757] ? smk_curacc+0x7f/0xa0 [ 878.748391] ? ioctl_preallocate+0x210/0x210 [ 878.752820] ? smack_file_ioctl+0x196/0x300 [ 878.757148] ? smack_file_lock+0x240/0x240 [ 878.761383] ? __fget+0x367/0x540 [ 878.764848] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 878.770387] ? fput+0x128/0x1a0 [ 878.773680] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 878.779225] ? security_file_ioctl+0x93/0xc0 [ 878.783648] ksys_ioctl+0xab/0xd0 [ 878.787114] __x64_sys_ioctl+0x73/0xb0 [ 878.791011] do_syscall_64+0x103/0x610 [ 878.794909] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 878.800104] RIP: 0033:0x457e29 [ 878.803300] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 878.822967] RSP: 002b:00007fb6ddf3ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 878.830679] RAX: ffffffffffffffda RBX: 00007fb6ddf3ec90 RCX: 0000000000457e29 [ 878.837964] RDX: 0000000020000100 RSI: 00000000400452c8 RDI: 0000000000000005 [ 878.845235] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 878.852506] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb6ddf3f6d4 [ 878.859776] R13: 00000000004c0359 R14: 00000000004d1f88 R15: 0000000000000004 [ 878.880737] IPVS: ftp: loaded support on port[0] = 21 03:43:07 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x100000000000000]}, &(0x7f0000000000)=0x54) 03:43:07 executing program 5: socket$alg(0x26, 0x5, 0x0) socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x1, 0xe59) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x5, &(0x7f0000000580)=0x6) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:07 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x10, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 880.905344] CUSE: unknown device info "" [ 880.920447] CUSE: zero length info key specified [ 880.963280] CUSE: unknown device info "" [ 880.970826] IPVS: ftp: loaded support on port[0] = 21 [ 880.970956] CUSE: zero length info key specified 03:43:09 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x11]}, &(0x7f0000000000)=0x54) 03:43:09 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)="f58a58a56a3b18ea201b916dae156b3957695bf7b3aae1b16f73e0eb569949a61bddd17aac30ba18fc0ecfdfddec27c4da0122efedf5131827b378d224b15558da4234f86897cc1c5073d502157ed8b4f5779a8dfbb4e1eceb0c45f50241abb645b332f0e68d021277ef6dc04e1af4b71b4feb6094af94c7f8c7a2dd65131565d5", 0x81, 0xfffffffffffffffa) r2 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r1, &(0x7f0000000240)='cifs.spnego\x00', &(0x7f0000000280)={'syz', 0x0}, r2) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VT_ACTIVATE(r3, 0x5606, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0}, &(0x7f0000000540)=0xc) setresuid(0x0, r5, 0x0) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-control\x00', 0x80082, 0x0) ioctl$TIOCSSOFTCAR(r6, 0x541a, &(0x7f00000004c0)=0x7) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000100)=0x800000000000014) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x200, 0x0) ioctl$UI_END_FF_UPLOAD(r3, 0x406855c9, &(0x7f00000003c0)={0x2, 0x66e9, {0x55, 0x1, 0x3, {0x80000000, 0xffffffff}, {0x9}, @period={0x0, 0x7, 0xffffffff, 0x4, 0x80000000, {0xb6, 0xf8a, 0x11, 0x658}, 0x3, &(0x7f0000000380)=[0x7ff, 0x8000, 0x64]}}, {0x57, 0x0, 0xd84, {0x0, 0x3}, {0xc, 0x6}, @rumble={0x38cbdad7, 0xe10}}}) 03:43:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:09 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x60, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:09 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memt\x00\x8a\x11>\xe2\xf5bYQ\xf6\xf2\x8cro\xf8&\xbdL\x18\xbb\xfa`\xa8<\x9f\xb5\x03/\xb4\x93\xd0\xa5\xa0\nf\x18\xfd-b\xc2s\xccV\x0e3', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r0, 0x4) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0xffffffff000}) 03:43:09 executing program 5: socket$alg(0x26, 0x5, 0x0) socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x1, 0xe59) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x5, &(0x7f0000000580)=0x6) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 882.957689] CUSE: unknown device info "" [ 882.976653] CUSE: zero length info key specified 03:43:09 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(r0, 0x400, 0x0) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) unshare(0x40000000) 03:43:09 executing program 5: socket$alg(0x26, 0x5, 0x0) socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x1, 0xe59) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x5, &(0x7f0000000580)=0x6) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x2, &(0x7f0000000100)) close(0xffffffffffffffff) [ 883.015976] CUSE: unknown device info "" [ 883.031440] IPVS: ftp: loaded support on port[0] = 21 [ 883.055113] CUSE: zero length info key specified 03:43:10 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x300, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:10 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)=0x14) [ 883.251598] IPVS: ftp: loaded support on port[0] = 21 03:43:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x5411, &(0x7f0000000100)) close(0xffffffffffffffff) [ 883.376857] CUSE: unknown device info "" [ 883.399835] CUSE: zero length info key specified [ 883.447575] IPVS: ftp: loaded support on port[0] = 21 [ 883.477718] CUSE: unknown device info "" [ 883.521708] CUSE: zero length info key specified [ 884.065908] IPVS: ftp: loaded support on port[0] = 21 03:43:11 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x88]}, &(0x7f0000000000)=0x54) 03:43:11 executing program 5: socket$alg(0x26, 0x5, 0x0) socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x1, 0xe59) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x5, &(0x7f0000000580)=0x6) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:11 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(r0, 0x400, 0x0) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) unshare(0x40000000) 03:43:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x541b, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:11 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f00000001c0)="0f38061ac4a379619b00000081a61d82870000c4a1465e5727c4e2699044c9d4c461015fdedbbb7fce0000c40109d5eb3646ecf3af") openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = syz_open_dev$vcsn(&(0x7f0000000380)='/dev/vcs#\x00', 0x3f, 0x240) write$P9_RVERSION(r2, &(0x7f00000003c0)={0x13, 0x65, 0xffff, 0x7, 0x6, '9P2000'}, 0x13) setresuid(0x0, r1, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000340), 0x10) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x14) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x4840, 0x0) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000280)={0x0, 0x7}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000300)={r5, 0x52ac}, 0x8) r6 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x1) ioctl$DRM_IOCTL_MARK_BUFS(r6, 0x40206417, &(0x7f0000000100)={0x1, 0x7f, 0x6, 0x4, 0x8, 0x3f}) 03:43:11 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x500, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 884.237826] CUSE: unknown device info "" [ 884.268023] CUSE: zero length info key specified 03:43:11 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f00000006c0)=0xe8) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0xde, 0x4, &(0x7f0000000480)=[{&(0x7f0000000240)="e69845787375efda96d15ef91f8168ee7df2d14468c01d5a566be37c83ac88fbfc220a4bb40decf48d955afecfef950f8192cca492b8d59225ece51a3a251f7af6440dfedb4b6ebab0702e97c10d2d4bb196b95bec04b487d8a0a0a0466472d49d10f552adff73f992b9de91a627f04f83d2304b664740f7e5e1d7419079ce2afe305b34743c3f128a20be16c0312629f10173ef08d32488f042", 0x9a, 0x1}, {&(0x7f0000000300)="b242bef1890937c95c1275c27f3c1ce3074937ea800b4c163a0376b30c1fd3cf93644b45a1790663a9ba07af8ebe2a4c3f3d43b268ea0d0f58966402859f28932f219858c3", 0x45, 0x100}, {&(0x7f0000000380)="56eec571481435c7786561dbc4b3c398e74ce3a0aeea83ef818f419949fe2081156af7c95bde5878044bf1bcc215fead43b4119de46f8daa9aa19e9295b68ed5886c63878de52891222104cb8af47761bf6fe52bafdc3b5d7994afb4a32779ada6120fa07f378cd902127e980001514969798bcdd26697db33", 0x79, 0x81}, {&(0x7f0000000400)="af54b2251c87ead4881fe7a1341d5cb801b8d3883028e3b22417f0be116994628398619f40b6eb2207660cf60f14a1b360e47a7ac958570e70d950a2a9d5824dff09a3da2bb6c8bb60e17c5212e0215d9c8563439b07a16174933398825861d6c9f63fdc557d33538743cd8c5032cd85a6", 0x71, 0x6}], 0x1840010, &(0x7f0000000880)={[{@grpjquota='grpjquota='}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@auto_da_alloc='auto_da_alloc'}, {@i_version='i_version'}, {@dax='dax'}], [{@uid_eq={'uid', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@uid_lt={'uid<', r3}}, {@euid_lt={'euid<', r4}}]}) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x40000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r5, 0x4008642b, &(0x7f00000001c0)={r6, 0xb}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000940)='./file0/file0\x00', 0x8) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r8, 0x0) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r9, 0x5423, &(0x7f0000000000)=0x14) 03:43:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x5421, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:11 executing program 5: socket$alg(0x26, 0x5, 0x0) socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x1, 0xe59) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 884.322816] CUSE: unknown device info "" [ 884.332218] IPVS: ftp: loaded support on port[0] = 21 [ 884.402269] CUSE: zero length info key specified 03:43:11 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x2, 0x8040) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f00000002c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000100)=0x6f) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000240)={r2, 0x10, &(0x7f0000000200)=[@in={0x2, 0x4e20, @loopback}]}, &(0x7f0000000280)=0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)=0x14) 03:43:11 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x600, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:11 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(r0, 0x400, 0x0) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) unshare(0x40000000) [ 884.719132] IPVS: ftp: loaded support on port[0] = 21 [ 884.794279] CUSE: unknown device info "" [ 884.798463] CUSE: zero length info key specified [ 884.836141] CUSE: unknown device info "" [ 884.840314] CUSE: zero length info key specified [ 885.007467] IPVS: ftp: loaded support on port[0] = 21 03:43:11 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x1100]}, &(0x7f0000000000)=0x54) 03:43:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x5450, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:11 executing program 5: socket$alg(0x26, 0x5, 0x0) socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x1, 0xe59) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:11 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(r0, 0x400, 0x0) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) unshare(0x40000000) 03:43:11 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) r4 = syz_open_procfs(r2, &(0x7f00000000c0)='net/stat\x00') ioctl$sock_bt_hidp_HIDPCONNADD(r4, 0x400448c8, &(0x7f0000000180)={r0, r0, 0xd4, 0x5, &(0x7f0000000100)='?\"iZb', 0x9, 0x101, 0xfff, 0x9, 0x7, 0x1, 0xcb, 'syz0\x00'}) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)=0x14) 03:43:11 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x700, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 885.149376] CUSE: unknown device info "" [ 885.166460] CUSE: zero length info key specified 03:43:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x5451, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:12 executing program 5: socket$alg(0x26, 0x5, 0x0) socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x1, 0xe59) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 885.193324] IPVS: ftp: loaded support on port[0] = 21 [ 885.205583] CUSE: unknown device info "" [ 885.234962] IPVS: ftp: loaded support on port[0] = 21 [ 885.248234] CUSE: zero length info key specified 03:43:12 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f00000001c0)='/dev/ptmx\x00'}, 0x30) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x202, 0x0) syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x8001, 0xa083) r2 = syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0x4, 0x241) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)=0x14) fsetxattr$security_smack_entry(r1, &(0x7f00000000c0)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='cpuset\x00', 0x7, 0x2) 03:43:12 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(r0, 0x400, 0x0) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) unshare(0x40000000) 03:43:12 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0xc00, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 885.498469] IPVS: ftp: loaded support on port[0] = 21 03:43:12 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(r0, 0x400, 0x0) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) unshare(0x40000000) [ 885.617164] CUSE: unknown device info "" [ 885.622400] CUSE: zero length info key specified [ 886.023925] CUSE: unknown device info "" [ 886.032797] IPVS: ftp: loaded support on port[0] = 21 [ 886.048462] CUSE: zero length info key specified 03:43:15 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x8800]}, &(0x7f0000000000)=0x54) 03:43:15 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) clone(0x12102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(r0, 0x400, 0x0) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) unshare(0x40000000) 03:43:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x5452, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:15 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x80, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x4000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x7fff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x14) 03:43:15 executing program 5: socket$alg(0x26, 0x5, 0x0) socket$alg(0x26, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:15 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x2000, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 888.183670] CUSE: unknown device info "" [ 888.211757] CUSE: zero length info key specified [ 888.246921] IPVS: ftp: loaded support on port[0] = 21 03:43:15 executing program 5: socket$alg(0x26, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x5460, &(0x7f0000000100)) close(0xffffffffffffffff) [ 888.270257] CUSE: unknown device info "" [ 888.280018] IPVS: ftp: loaded support on port[0] = 21 [ 888.324597] CUSE: zero length info key specified 03:43:15 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000100)) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x14) 03:43:15 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x6000, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:15 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x8901, &(0x7f0000000100)) close(0xffffffffffffffff) [ 888.625956] CUSE: unknown device info "" [ 888.636269] CUSE: zero length info key specified [ 888.666572] CUSE: unknown device info "" [ 888.670744] CUSE: zero length info key specified [ 888.885235] IPVS: ftp: loaded support on port[0] = 21 03:43:15 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x1000000]}, &(0x7f0000000000)=0x54) 03:43:15 executing program 4: syz_open_procfs$namespace(0x0, 0x0) write$P9_RREADDIR(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'caif0\x00', 0x4801}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in={0x2, 0x4e20}, @in={0x2, 0x4e21, @local}], 0x2a1751ace1ac5352) close(r1) 03:43:15 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x8902, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:15 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000240)=0x3, 0x4) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f00000001c0)={r0, 0x2, 0x5, "9057caff618e9f0af6eccfdf2035de4eec3f52c176d47f5c9f41aba69863daaee138b86eda8c993f85f23ebd01cfafc1a3e127df360085db68fab3f624850ce8cc117d2d2308e58909dacbf9cbd7407392346fd40ef91561af"}) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) mbind(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x3, &(0x7f0000000280)=0x9, 0x3, 0x3) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)=0x14) 03:43:15 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x1000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 889.021873] CUSE: unknown device info "" 03:43:15 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x8903, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:15 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='io.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x14) 03:43:16 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x2000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 889.043753] CUSE: zero length info key specified [ 889.060706] CUSE: unknown device info "" [ 889.066938] CUSE: zero length info key specified [ 889.260989] CUSE: unknown device info "" [ 889.273125] CUSE: zero length info key specified 03:43:16 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 889.305969] CUSE: unknown device info "" 03:43:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x8904, &(0x7f0000000100)) close(0xffffffffffffffff) [ 889.355652] CUSE: zero length info key specified 03:43:16 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x3000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 890.162485] CUSE: unknown device info "" [ 890.167058] CUSE: zero length info key specified [ 890.176312] CUSE: unknown device info "" [ 890.180531] CUSE: zero length info key specified 03:43:19 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'caif0\x00', 0x4801}) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) close(r0) unshare(0x40000400) 03:43:19 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x11000000]}, &(0x7f0000000000)=0x54) 03:43:19 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x8906, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:19 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x2263, 0x400000800) ioctl$BLKFRASET(r3, 0x1264, &(0x7f0000000100)=0x100) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)=0x14) 03:43:19 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x4000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 892.970566] CUSE: unknown device info "" [ 892.990084] IPVS: ftp: loaded support on port[0] = 21 [ 893.006236] CUSE: zero length info key specified 03:43:19 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x8907, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:19 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x5000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 893.019819] CUSE: unknown device info "" [ 893.024134] CUSE: zero length info key specified 03:43:20 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f00000000c0), &(0x7f0000000100)=0x40) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x400002, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f00000001c0)={0x5, 0x800, 0x6, 0x3, 0x16, 0x4, 0x6, 0x8, 0x3, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write$apparmor_current(r2, &(0x7f0000000200)=@hat={'permhat ', 0x3, 0x5e, ['[*/\x00', '\x00']}, 0x20) setresuid(0x0, r4, 0x0) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000240)={0x3, r2}) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) setns(r2, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)=0x10) 03:43:20 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 893.212753] CUSE: unknown device info "" [ 893.222863] CUSE: zero length info key specified [ 893.246569] CUSE: unknown device info "" 03:43:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x8940, &(0x7f0000000100)) close(0xffffffffffffffff) [ 893.265991] CUSE: zero length info key specified 03:43:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000001140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x1a000, &(0x7f00000000c0)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x14, 0x40000000042, 0x105}, 0xbf}}, 0x0) 03:43:21 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:21 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x6000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x8941, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:21 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f00000001c0)={r3, 0x3f, 0x1, [0x4c24]}, 0xa) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)=0x14) 03:43:21 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x88000000]}, &(0x7f0000000000)=0x54) [ 894.957354] IPVS: ftp: loaded support on port[0] = 21 [ 894.969130] CUSE: unknown device info "" [ 894.984748] CUSE: zero length info key specified [ 895.003069] CUSE: unknown device info "" 03:43:21 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 895.009342] CUSE: zero length info key specified 03:43:21 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = fcntl$dupfd(r1, 0x406, r1) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/mISDNtimer\x00', 0x404000, 0x0) ioctl$VHOST_SET_VRING_NUM(r3, 0x4008af10, &(0x7f0000000340)={0x3, 0x81}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x8000, 0x0) ioctl$TIOCGLCKTRMIOS(r4, 0x5456, &(0x7f0000000100)={0x81, 0x1, 0x7, 0x1000, 0xb, 0x9f1d, 0x800000000, 0x8, 0x4080000, 0x7, 0x20, 0xd7e5}) setresuid(0x0, r2, r2) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)=0x14) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e21, 0x7fffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6}}, 0x6, 0x400}, &(0x7f0000000240)=0x90) fchdir(r0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000280)={0x20, 0x1, 0x4, 0x6, 0xfffffffffffffffd, 0x81, 0x4, 0x20, r6}, 0x20) 03:43:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x894c, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:22 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x7000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:22 executing program 4: socket$unix(0x1, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) dup(0xffffffffffffffff) getsockname(0xffffffffffffffff, 0x0, 0x0) r0 = gettid() shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffb000/0x1000)=nil) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) shmat(r1, &(0x7f0000ff7000/0x4000)=nil, 0xfffffffffffffffd) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) mount$9p_xen(0x0, 0x0, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x1000000000016) 03:43:22 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 895.319208] CUSE: unknown device info "" [ 895.329161] CUSE: zero length info key specified [ 895.361600] CUSE: unknown device info "" 03:43:22 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 895.414875] CUSE: zero length info key specified 03:43:22 executing program 4: r0 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0xc01c7c02, 0x0) 03:43:22 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x4001, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000180)={0x0, 0x42, "ab76fb369a36bcaafb25ae74083a1a53bb202807703cec2039de17ad10e9a78cd15c64b266b5bf9badacddf24e751ae45c4698787443c0b672030af260276dcc48f1"}, &(0x7f0000000200)=0x4a) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000240)=@assoc_value={r2, 0x5}, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x8) ioctl$BLKTRACESTOP(r5, 0x1275, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000000)=0x14) 03:43:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x8980, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:22 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x8000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 895.653570] CUSE: unknown device info "" [ 895.670749] CUSE: zero length info key specified [ 895.710466] CUSE: unknown device info "" [ 895.738282] CUSE: zero length info key specified [ 895.913306] IPVS: ftp: loaded support on port[0] = 21 03:43:22 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x100000000000000]}, &(0x7f0000000000)=0x54) 03:43:22 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x8981, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:22 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f0000000240)=0xffffffffffffff0a) setresuid(0x0, r2, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x14) 03:43:22 executing program 4: socket$alg(0x26, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:22 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0xc000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 896.172075] CUSE: unknown device info "" [ 896.197825] CUSE: zero length info key specified 03:43:23 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:23 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f00000003c0)={0x9, @null=' \x00'}, 0x12) connect$x25(r0, &(0x7f0000000000)={0x9, @null=' \x00'}, 0x12) sendto$x25(r0, 0x0, 0x0, 0x81, &(0x7f0000000080)={0x9, @null=' \x00'}, 0x12) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180), 0xfffffffffffffff8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000001c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="02000a00020006000000000000000100f7f288b160b308f00300e428"], &(0x7f0000000100)=0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000140)={r2, 0x101}, 0x8) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00'}) [ 896.228093] CUSE: unknown device info "" [ 896.244514] IPVS: ftp: loaded support on port[0] = 21 [ 896.257613] CUSE: zero length info key specified 03:43:23 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x100, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x13) 03:43:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x8982, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:23 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x10000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:23 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 896.614133] CUSE: unknown device info "" [ 896.660250] CUSE: zero length info key specified [ 896.731260] CUSE: unknown device info "" [ 896.779072] CUSE: zero length info key specified [ 897.110905] IPVS: ftp: loaded support on port[0] = 21 03:43:24 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x1100000000000000]}, &(0x7f0000000000)=0x54) 03:43:24 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x101002, 0x0) recvfrom$packet(r0, &(0x7f0000000140)=""/146, 0x92, 0x20, 0x0, 0x0) r1 = socket$packet(0x11, 0x40800000000003, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000000)=0x100, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'erspan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x3) sendto$inet6(r1, &(0x7f0000001740)="030300000300600000000000fff55b4202938207d9fb3780398d5375000000007929301ee616d5c01843e06590080053c0e385472da7222a2bb401000000c3b500352b0f118d0000f5cfe606f6925cbf34658ea132797b1abc5dc62600009b000000faffffff00000000aeb4", 0x6c, 0x0, 0x0, 0x0) 03:43:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x8983, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:24 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:24 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) ioctl$sock_inet6_udp_SIOCINQ(r5, 0x541b, &(0x7f0000000100)) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)=0x14) getsockopt$EBT_SO_GET_ENTRIES(r5, 0x0, 0x81, &(0x7f0000000280)={'nat\x00', 0x0, 0x3, 0xae, [], 0x4, &(0x7f0000000180)=[{}, {}, {}, {}], &(0x7f00000001c0)=""/174}, &(0x7f0000000300)=0x78) 03:43:24 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x20000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 897.302673] CUSE: unknown device info "" [ 897.310579] CUSE: zero length info key specified [ 897.353019] CUSE: unknown device info "" 03:43:24 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x89a0, &(0x7f0000000100)) close(0xffffffffffffffff) [ 897.389389] IPVS: ftp: loaded support on port[0] = 21 [ 897.409491] CUSE: zero length info key specified 03:43:24 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x200, 0x400000) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000040)={0x0, 0x0, 0x6}) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f0000000080)={r1}) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.nlink\x00', &(0x7f0000000140)=""/229, 0xe5) ioctl$SIOCGETNODEID(r0, 0x89e1, &(0x7f0000000240)={0x2}) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000300)={0x8, &(0x7f00000002c0)=[{}, {}, {0x0}, {}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_DMA(r0, 0xc0406429, &(0x7f0000000440)={r3, 0x2, &(0x7f0000000340)=[0x3, 0x800], &(0x7f0000000380)=[0x22d], 0x20, 0x2, 0x7fffffff, &(0x7f00000003c0)=[0x4f097a02, 0x2], &(0x7f0000000400)=[0x3, 0x5, 0x100000000, 0x776, 0xaba9]}) r4 = getpid() fcntl$setown(r0, 0x8, r4) getpid() syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) ioctl$TUNSETOWNER(r2, 0x400454cc, r5) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000540)) ioctl$BLKSECTGET(r2, 0x1267, &(0x7f0000000580)) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000005c0), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000640)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000006c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000600), 0x2, r7, 0x10, 0x1, @in={0x2, 0x4e23, @remote}}}, 0xa0) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000780)='trusted.overlay.upper\x00', &(0x7f00000007c0)={0x0, 0xfb, 0x26, 0x1, 0x4, "e94952f9bcb37592c723ec518c6674cf", "fb9e5ce1529dc4d8e72389290e0623a4e2"}, 0x26, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000800)={'gretap0\x00', 0x100}) getpeername$tipc(r0, &(0x7f0000000840)=@name, &(0x7f0000000880)=0x10) setxattr$system_posix_acl(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='system.posix_acl_access\x00', &(0x7f0000000940)={{}, {0x1, 0x4}, [{0x2, 0x7, r5}], {0x4, 0x4}, [{0x8, 0x7, r6}], {0x10, 0x3}, {0x20, 0x4}}, 0x34, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000980)=0x13, 0x4) ioctl$VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f00000009c0)={0x3, 0x5, 0x4, 0xa, {0x0, 0x2710}, {0x2, 0x0, 0x1, 0x6, 0x4, 0x4, "2de2cfc2"}, 0x101, 0x2, @offset=0x800, 0x4}) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x3, 0x105110, r2, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)='trusted.overlay.origin\x00', &(0x7f0000000ac0)='y\x00', 0x2, 0x2) write$binfmt_aout(r0, &(0x7f0000000b00)={{0x0, 0x81d6, 0x2, 0x60, 0x3ad, 0x8000, 0x13, 0x2}, "8510a361fb721a29936008d0a47f903c1301b9afb0d1b06f145259f7b3441b940b87741f4be8d535c3bf1680e0ae636b1836aa155977f2098d9bcb7ae18cbc31dfc906efa0ad2588f48b2f13e4cc966806ce1399bcab9dcef03c4da19662df4a4abdf72b9ce34e42f5deff6d032c49d81b78b51efe5dabd69baa404c89e4aac1941c65f91b08a42c8e58f1dd526a1f9daf37aa24b74644c80f6c", [[], [], [], [], [], []]}, 0x6ba) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000011c0)={0x0, 0x4}, &(0x7f0000001200)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000001240)={r8, 0x81c, 0xfff, 0xef}, 0x10) 03:43:24 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x1, 0x0) ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) fsetxattr(r0, &(0x7f0000000180)=@random={'trusted.', '/dev/sequencer\x00'}, &(0x7f00000001c0)='GPLuser\x00', 0x8, 0x2) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)=0x14) 03:43:24 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x60000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:24 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 897.721934] CUSE: unknown device info "" [ 897.737183] CUSE: zero length info key specified [ 897.788187] CUSE: unknown device info "" [ 897.804864] CUSE: zero length info key specified [ 898.130443] IPVS: ftp: loaded support on port[0] = 21 03:43:25 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400203) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10000, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) connect$packet(r3, &(0x7f00000001c0)={0x11, 0x17, r4, 0x1, 0xb8}, 0x14) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)=0x14) 03:43:25 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x89a1, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$usb(0x0, 0x0, 0x10000) bind$alg(r0, &(0x7f0000000b40)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) r2 = add_key$keyring(&(0x7f0000000ac0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) ppoll(&(0x7f0000000000)=[{}, {0xffffffffffffffff, 0x200}, {}, {0xffffffffffffffff, 0x100}], 0x4, &(0x7f0000000bc0)={0x0, 0x1c9c380}, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r2) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="ab0000000000", 0xfffffffffffffec7) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000c80)={'bpq0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="1a00000001000000f1b2000002000000000000000000000000000000000000007241c79026437c367a0cdc7680f7030772e376d1ac8e7184f46e85098e0dd1fadca88be7474f4f5516ad08c87ba0afe4a24a7c34d790ce51639f3bbec5185628ee54c741f4b27d7a952b7810ee47f5aebae4f96dd565841d1ee3567067f5a8f32e1e2761851c6cca0a43b6b22b0ed0f3bca5d9"]}) clock_gettime(0x0, &(0x7f0000000900)) rseq(&(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x3, 0x1000, 0x3, 0x20}, 0x3}, 0x20, 0x1, 0x0) r3 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x2, &(0x7f0000004780)=""/245, 0xf5}}], 0x1, 0x0, &(0x7f0000008000)={0x0, 0x989680}) fstat(r3, 0x0) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)) ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f0000000300)={0x3, @default}) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x1f34}, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={r4, 0x4}, &(0x7f0000000180)=0x8) 03:43:25 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:25 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x8800000000000000]}, &(0x7f0000000000)=0x54) 03:43:25 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) [ 898.509330] CUSE: unknown device info "" [ 898.527552] CUSE: zero length info key specified [ 898.578620] IPVS: ftp: loaded support on port[0] = 21 [ 898.580179] CUSE: unknown device info "" [ 898.596557] CUSE: zero length info key specified 03:43:25 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) r1 = dup2(r0, r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000a80)="d85e678e676090b1343eb9c52bd02479d0747d8b2ab1410220300dba233c5193d6240d4a4d3d2a693cc7b07ce79ebbae29f214bee98043109616a4205ae885b9fa8c3b79353fa61bf3da3d814e673a4e0524a241d81a07f6dd09e1d0e34871ddf209e2e0ea4539e15d", 0x69}], 0x1) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e24, @multicast1}}, 0x6, 0x4, 0x0, 0x100, 0x22}, &(0x7f0000000080)=0x98) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000580)='bbr\x00') getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000480)={r2, 0x20000000, 0x7, 0x2, 0x2, 0x7, 0x5, 0x1, {r3, @in={{0x2, 0x4e20, @loopback}}, 0x8, 0x3, 0x4c9dd6c2, 0xcac, 0x2}}, &(0x7f0000000540)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffcd2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x2}}, 0x20) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r1, 0xc, 0x2}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000200)={0x8, 0x120, 0xfa00, {0x4, {0xfffffffffffffffd, 0x5, "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", 0xcd, 0x3ff, 0x3ff, 0x1, 0x9, 0xfff}}}, 0x128) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 03:43:25 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) accept(r1, &(0x7f00000000c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, &(0x7f0000000180)=0x80) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x14) 03:43:25 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 03:43:25 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c9, &(0x7f0000000100)) close(0xffffffffffffffff) [ 898.890846] CUSE: unknown device info "" [ 898.932982] CUSE: zero length info key specified 03:43:25 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 03:43:25 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) syz_open_pts(r3, 0x40000) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r4, 0x80045530, &(0x7f0000000200)=""/110) r5 = request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)='/dev/dlm-control\x00', 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000340)={r5, 0xfffffffffffffff9, 0x20}, &(0x7f0000000380)={'enc=', 'pkcs1', ' hash=', {'sha3-256\x00'}}, &(0x7f0000000400)="5b52490304d18950c15ababc5a20c65ee087691b65b37e2d68636442d85a1ab7ef076cd1c6578573d164662db690fef5d9134bc77ab504ba3f0d81f1f9bca7d6c63812fd3e4dc60ca3ccc5e2ecb44787b18e1050cea9b438721951a57966d605a52d45a8471442bb3bc7518d8b1dce6301aa", &(0x7f0000000480)=""/137) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x40000, 0x0) getsockname$tipc(r6, &(0x7f0000000100), &(0x7f0000000180)=0x10) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000000)=0x14) [ 898.977738] CUSE: unknown device info "" [ 898.987569] CUSE: zero length info key specified 03:43:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x40049409, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:26 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:26 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x300000000000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 899.342426] CUSE: unknown device info "" [ 899.357820] CUSE: zero length info key specified [ 899.375094] CUSE: unknown device info "" [ 899.389491] CUSE: zero length info key specified [ 899.559620] IPVS: ftp: loaded support on port[0] = 21 03:43:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x4020940d, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:26 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) socket(0x0, 0x804, 0xffffffff) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f0000000100)) setresuid(0x0, r2, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)=0x14) 03:43:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c9, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:26 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:26 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x0, 0x11]}, &(0x7f0000000000)=0x54) 03:43:26 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x800452d2, &(0x7f0000000100)) close(0xffffffffffffffff) [ 899.768829] IPVS: ftp: loaded support on port[0] = 21 [ 899.807632] CUSE: unknown device info "" [ 899.820292] CUSE: zero length info key specified [ 899.840031] CUSE: unknown device info "" 03:43:26 executing program 0: socketpair$unix(0x1, 0x4001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x14) 03:43:26 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 899.858080] CUSE: zero length info key specified 03:43:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c9, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:26 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x500000000000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x800452d3, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:27 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) 03:43:27 executing program 0: socketpair$unix(0x1, 0x400000800000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x80000, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x5) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) [ 900.152428] CUSE: unknown device info "" [ 900.164986] CUSE: zero length info key specified 03:43:27 executing program 4: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) ioctl$KVM_SET_CLOCK(r0, 0x4030ae7b, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getsockopt$inet_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000380)=""/89, &(0x7f0000000140)=0x59) ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f0000000280)=""/214) mkdirat(r1, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r1, &(0x7f00000001c0)='.//ile0\x00', 0x1) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000000c0)='./file0/f.le.\x00') 03:43:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0xc0045878, &(0x7f0000000100)) close(0xffffffffffffffff) [ 900.233725] CUSE: unknown device info "" [ 900.237902] CUSE: zero length info key specified [ 900.559824] IPVS: ftp: loaded support on port[0] = 21 03:43:27 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x0, 0x88]}, &(0x7f0000000000)=0x54) 03:43:27 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) 03:43:27 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x600000000000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:27 executing program 4: syz_mount_image$hfs(&(0x7f0000000100)='hfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="63726561746f723da53f8c1697266ee3a7b10eef6c612bf53abf2c00de18053b401e16fde2279cf65b80664803e73a211f71dd38ff01000053872789c6017ca492a959c6dd0183940000000000000000a830f8100575eedf89098bfea6afdf8054f86fa845438ed51eb679b75921646bfe549d998c8cd5c2da212395f6b3c5dbebc982a56fc676630b12223598fe5280e462b511ce3c2b8bcad1134af4aedf80c601e42b48bb607cc4179f916d3c165f77fd616dca7fe098f17c6528deb020867c64ffe943fe8d93c87941a579b612de893beb7fab0c267e5caf1ed4d6504088814584e26e66d7da94bdcb4f6faeaad19764890b1b0fefeda31cf28aefe11b7b4c1a847da992cd0f4bfcfddc89b33b128bf4c74fcdd1ebffcd67b21ee98cc301e2b271f449ecaaf2b506ed73b77d26e5824f8e429cda9dca724c68635e1023e06b2f1aa0932a5184186b24912b373809d177ec4ec50071b9692099d21f3095eeda269d58e82dc5f1430fdba470de4cfd695bee3c89d6d55064a15b27dbe76e16683e158a9b30155f88d7b3bcb9"]) 03:43:27 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x0, 0x400) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000100)={0x1, 0xffff, 0x7, 0x1, 0x6, 0x5, 0x8, 0x1, 0x7, 0x0, 0x5, 0xee}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)=0x14) 03:43:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0xc0045878, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:27 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) [ 900.761384] hfs: creator requires a 4 character value [ 900.775694] hfs: unable to parse mount options [ 900.796634] CUSE: unknown device info "" [ 900.799665] IPVS: ftp: loaded support on port[0] = 21 [ 900.808231] CUSE: zero length info key specified [ 900.822332] CUSE: unknown device info "" [ 900.841754] CUSE: zero length info key specified 03:43:27 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) [ 900.873826] hfs: creator requires a 4 character value [ 900.879495] hfs: unable to parse mount options 03:43:27 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x14) syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') 03:43:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0xc0189436, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:27 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x700000000000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:27 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x2) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="100000de000f335d5500000000000000"], 0x10}}], 0x1, 0x0) [ 901.138262] CUSE: unknown device info "" [ 901.168996] CUSE: zero length info key specified [ 901.185987] CUSE: unknown device info "" [ 901.202669] CUSE: zero length info key specified [ 901.365396] IPVS: ftp: loaded support on port[0] = 21 03:43:28 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vfio/vfio\x00', 0x4000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x63f) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0xff, 0x800) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f0000000180)={{0x84, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e22, 0x3, 'nq\x00', 0x39, 0x7, 0x7c}, {@multicast1, 0x4e21, 0x10003, 0x2, 0x1, 0x100000000}}, 0x44) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r1, 0xaead) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)=0x14) 03:43:28 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 03:43:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0xc020660b, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:28 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x208000, 0x0) openat$cgroup_type(r0, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_crypto(0x10, 0x3, 0x15) getsockopt$netlink(r1, 0x10e, 0x9, 0x0, &(0x7f0000000080)) 03:43:28 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x0, 0x1100]}, &(0x7f0000000000)=0x54) 03:43:28 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) r2 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x0, 0x2) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000240)) [ 901.599657] CUSE: unknown device info "" [ 901.633435] CUSE: zero length info key specified 03:43:28 executing program 0: socketpair$unix(0x1, 0x3ffffffffffffff, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x14) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x80, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x65, &(0x7f0000000100)=[@in6={0xa, 0x4e24, 0x5, @local, 0x100000001}], 0x1c) [ 901.654619] CUSE: unknown device info "" [ 901.671359] CUSE: zero length info key specified 03:43:28 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 03:43:28 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$inet6_buf(r0, 0x29, 0x2d, 0x0, &(0x7f00000000c0)) [ 901.704911] IPVS: ftp: loaded support on port[0] = 21 03:43:28 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0xc00000000000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) dup2(r0, r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:28 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0x0, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:28 executing program 4: r0 = socket$inet(0x2, 0x200000004, 0x5) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000080)=0x1f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@broute={'broute\x00', 0x20, 0x2, 0x328, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000080], 0x0, &(0x7f0000000040), &(0x7f0000000500)=ANY=[@ANYBLOB="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"]}, 0x3a2) 03:43:28 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f0000000100)) setresuid(0x0, r2, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x14) [ 902.027151] CUSE: unknown device info "" [ 902.031341] CUSE: zero length info key specified [ 902.066493] CUSE: unknown device info "" [ 902.093652] CUSE: zero length info key specified 03:43:29 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 902.455553] CUSE: unknown device info "" [ 902.459781] CUSE: zero length info key specified [ 902.513599] CUSE: unknown device info "" [ 902.517785] CUSE: zero length info key specified [ 902.527686] IPVS: ftp: loaded support on port[0] = 21 03:43:29 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x0, 0x8800]}, &(0x7f0000000000)=0x54) 03:43:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = accept(r0, &(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f0000000280)=0x80) getsockname$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000300)=0x1c) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:29 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0x0, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:29 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$rds(0x15, 0x5, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x180, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, &(0x7f0000000240), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x800, 'ifb0\x00', 'dummy0\x00', 'ip_vti0\x00', 'ip6tnl0\x00', @remote, [], @link_local, [], 0xb8, 0xb8, 0xf0, [@ip={'ip\x00', 0x20, {{@loopback, @dev, 0x0, 0x0, 0x0, 0x84, 0x20, 0x0, 0x0, 0x0, 0x3}}}]}}, @snat={'snat\x00', 0x10, {{@dev}}}}]}]}, 0x1f8) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x5, 0x420200) 03:43:29 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x400, 0x0) write$P9_RREAD(r0, &(0x7f0000000180)={0x100b, 0x75, 0x2, {0x1000, "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"}}, 0x100b) socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)=0x14) io_setup(0x5, &(0x7f0000000100)=0x0) io_submit(r6, 0x4, &(0x7f0000001500)=[&(0x7f0000001280)={0x0, 0x0, 0x0, 0xf, 0x3dff, r3, &(0x7f00000011c0)="8c43c2b6169f80d48c00c9ced6fa0b4676b8476999e5d653a7452df9d229081c5d5bb2daa68d6246cc053bd5ce6f4f1dfad2d897fed91dc5e2855be2bf4013a1d7cdf3b0c750864f80a3646f13e2a5cede5c2e0e41e2532e17381eceeb903164fa62306f9907ec71862d875cce078b469b77ff208c2849de0f07aad40521e98d0128838342332a890e", 0x89, 0xfffffffffffffff4, 0x0, 0x2, 0xffffffffffffff9c}, &(0x7f0000001300)={0x0, 0x0, 0x0, 0x3, 0x3f, r1, &(0x7f00000012c0)="82a8a42de2ce055ad64eacfdfd09ec2277e2e27a3dd775797c73ce8ff8260873bc29539a2e7f88d4a578b153495875c673b890f78912", 0x36, 0x10001, 0x0, 0x1, r0}, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, 0x20, r0, &(0x7f0000001340)="57a4b296534c0df42c77a29d0352dfab1df8e073e51af0f5d666c7ca1d8ba72e78ba7ee050342c878c1588f40882ca2757f6e07af0fe05dbbad0772cefd02194a94db8736eecf042ee67fdfeba25c102bf40a73dae7d48173f250dcb1a12eee045ab47fda43c029deba04dc8c36a6d5a6237d616af208444c206e5ee6a45704eb1", 0x81, 0x10001, 0x0, 0x2, r0}, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x6, 0x8, r2, &(0x7f0000001440)="40fa251bdb0a0fd3f8b374021e55aafc72eda58d88e1740221c3df37e3b29a769bb2fdb8416fe3141eb433ce7dad13fa19b123c5b6beef08ec5594b45b4dd00790c9854d97d6573219d777dbb44a82bfa3772efbd12b4fcd29a15adec7a6720c09e4", 0x62, 0x1, 0x0, 0x1}]) 03:43:29 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 903.122864] CUSE: unknown device info "" [ 903.146042] CUSE: zero length info key specified [ 903.152029] IPVS: ftp: loaded support on port[0] = 21 [ 903.167251] CUSE: unknown device info "" 03:43:30 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x9, 0x100) dup3(r0, 0xffffffffffffffff, 0xfffffffffffffffd) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c0045002, &(0x7f0000000200)=0x1000) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@random="59cc9ee6e8e1", @random="164f1c10fcad", [], {@ipv6={0x86dd, {0x0, 0x6, "05f526", 0x8, 0x0, 0x0, @empty={[0x0, 0x1f4, 0x100000000000000]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 03:43:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0xffffffff00000000) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r2, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:30 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0x0, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 903.192691] CUSE: zero length info key specified 03:43:30 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x6000000000000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:30 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000cab000)=0xfffffffffffffd1b) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vcs\x00', 0x1, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f00000005c0)={0x8, 0x200, 0x4, 0x4}, 0x8) setresuid(0x0, r2, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)=0x14) ioctl$TIOCMSET(r4, 0x5418, &(0x7f00000000c0)=0x3dde) 03:43:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200), &(0x7f0000000240)=0x4) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) [ 903.441991] CUSE: unknown device info "" [ 903.457343] CUSE: zero length info key specified [ 903.481849] CUSE: unknown device info "" [ 903.501744] CUSE: zero length info key specified [ 903.929070] IPVS: ftp: loaded support on port[0] = 21 03:43:31 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x0, 0x1000000]}, &(0x7f0000000000)=0x54) 03:43:31 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") ioctl$EVIOCGABS0(r0, 0x80184540, 0x0) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14, 0x80800) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x16, 0x2, &(0x7f0000000080)=ANY=[@ANYBLOB="180009000000a16cf79fee5db2f8546c19dac3e8b4adb83322951000"], &(0x7f00000000c0)='GPL\x00', 0x7fffffff, 0xb, &(0x7f0000000100)=""/11, 0x41100, 0x39a1d2625cd3d486, [], r3, 0x6}, 0x48) clone(0x2000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) ioctl$TCSBRK(r2, 0x5409, 0x3) 03:43:31 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:31 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:31 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x4040, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x14) 03:43:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)={0x6, 0x0, [{0x5000, 0xf7, &(0x7f0000000280)=""/247}, {0x100004, 0xac, &(0x7f0000000380)=""/172}, {0x0, 0xc3, &(0x7f0000000440)=""/195}, {0x4000, 0x87, &(0x7f0000000540)=""/135}, {0x7000, 0xd6, &(0x7f0000000600)=""/214}, {0x4000, 0xad, &(0x7f0000000700)=""/173}]}) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x3, 0x100) ioctl$IMGETCOUNT(r2, 0x80044943, &(0x7f0000000240)) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) [ 904.241613] CUSE: unknown device info "" [ 904.249229] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 904.269785] CUSE: zero length info key specified [ 904.280803] CUSE: unknown device info "" 03:43:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = syz_open_dev$dri(&(0x7f0000000300)='/dev/dri/card#\x00', 0x2, 0x200) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000340)={0x7fff, 0x0, 0x3, 0x10001}) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000380)={0x81, r3, 0x10001, 0x5}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000280)=0x8, &(0x7f00000002c0)=0x4) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) r4 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x0, 0x20181) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0x9) close(0xffffffffffffffff) 03:43:31 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 904.300572] CUSE: zero length info key specified [ 904.311125] IPVS: ftp: loaded support on port[0] = 21 03:43:31 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = accept4$tipc(0xffffffffffffff9c, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x80000) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r3, r3, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)=0x14) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x0, 0x0) ioctl$UFFDIO_API(r5, 0xc018aa3f, &(0x7f00000001c0)={0xaa, 0x8}) 03:43:31 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x2, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 904.554817] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 03:43:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6, 0x7fffffff) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x141080, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000480)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r2, 0x8991, &(0x7f0000000000)={'bond0\x00', @ifru_names='bond_slave_1\x00'}) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000000680)={0x0, 0x1, [0xfff, 0x101, 0x3ff, 0x40, 0x0, 0xfffffffffffffffb, 0x8, 0x4f]}) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f00000004c0)) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x20a000, 0x0) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f0000000380)="e2da5cdea423495c8b5663b2d9e462f4e65c25cc8b2ba5e1349cd9ae758d94c045f53f48860fd0b3d8013a69034f6ac0d6e1e98dfe38d2d9e2e2c54d473c67bfa22bbf07fadb6002cda4dd466bf8b4ac1fd7837039b702b9d0fa204a8e5df87c3de67d40844e3ddd3c120aee61b90f3b98210922d8d4271c6df39457ffa88a8a1c33837414408c58e56e3fc11ec40ec466928864d45fe30bbdca4189941c975bc6fe8fb0e6bf8e2a58131d1b5d088066c68b8a6ee0c4e1fea78983de57627ebf6f449a310f966c64391d936f99802fb9320ae1cc") r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/sequencer2\x00', 0x40042, 0x0) sendto$inet(r0, &(0x7f00000000c0)="8dec431bb44aff53a310b4eabef65b9ca28574570c8753d962784ce7563c1f448215fd237bf4c9159a98e9205a38a1fef116825d2a67dccc355557378e26b4e71c9ead8245ce8f8727e4d5e348d6b048462955248e97e362bb149adcd5ad849873b82111c2ecfa383140f9d4c99f525041a886277a6592dbc6b9108911e88a440b93f5c0fae544676b44a19bf06aa255a549db9cb0a9221a90f33fec43b1d074bf", 0xa1, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000580)='fou\x00') sendmsg$FOU_CMD_DEL(r4, &(0x7f0000000640)={&(0x7f0000000540), 0xc, &(0x7f0000000600)={&(0x7f0000000740)=ANY=[@ANYBLOB="000028bd7000fddbdf2502000000080003003b000000080001004e230000"], 0x1}, 0x1, 0x0, 0x0, 0x20044000}, 0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0x5b2, &(0x7f0000000300)={&(0x7f0000000780)=ANY=[@ANYBLOB="3c4703ce437fda06aa9ede4723bff76a47fc470541ab433414a8682417b501ac03a3b4b06c489a090000000000000024e5b8a38d24ff2a2f531b8f6be83163c9422cbcc97535a7200a970b39a73df5dd21ac7dbd281bf3a20b1ab70b4c08c43dd80f2944438cc24aa5f864623565"], 0x1}, 0x1, 0x0, 0x0, 0x8050}, 0x40) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, @perf_config_ext={0xd1, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$session_to_parent(0x12) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x200) dup2(r5, 0xffffffffffffffff) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0xc81, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x1, 0x40100) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000300)={0x0, @remote, @loopback}, &(0x7f0000000340)=0xc) sendmsg$nl_route(r7, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0000010000000030e1d035b385af2a8b4c510e9d91dd88977cdbf35dfd153e455765394e223dbbc577e9f4fb665eba75dbcacc22b7e70b0b40b031887c1591a1bd29921e0e81f19a0ca98748136eecea289e2b3369690300926144842f2a991366000000000000"], 0x1}}, 0x4008000) ioctl$sock_proto_private(r6, 0x80089ec, &(0x7f0000000140)="039625617620978a4df541244054545eefb285b44d2198c37642636f3bd6084339c6e79154e7a4e1e8a3a316d5a4d756fa828508c3eaae4df2759d4d16de576413772f248c74aae160e44749d604a7af5290efc74ba837ec71ff4bfb5f9a2d51403ecc6b5a4bb2dab710e3367549b45cd0b3fed1c251372400872f340ee3b348964d022f3224519d06adad720a5650c9b04292955ae6fd364adebee641bc911bcdd907f409e8200d95b946789c69b1d8876c") syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0xff, 0x80004) syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x4080) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) [ 904.616373] CUSE: unknown device info "" 03:43:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) [ 904.669498] CUSE: zero length info key specified [ 904.733951] CUSE: unknown device info "" [ 904.787342] CUSE: zero length info key specified [ 904.893203] bond0: Releasing backup interface bond_slave_1 [ 905.201181] IPVS: ftp: loaded support on port[0] = 21 [ 905.353068] IPVS: ftp: loaded support on port[0] = 21 [ 905.679854] IPVS: ftp: loaded support on port[0] = 21 03:43:34 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x0, 0x11000000]}, &(0x7f0000000000)=0x54) 03:43:34 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:34 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='cpuset\x00') ioctl$KVM_GET_API_VERSION(r1, 0xae00, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) connect$caif(r4, &(0x7f0000000240)=@util={0x25, "0de8deb0bb4147318d7cc717b7e3232d"}, 0x18) getsockopt$netrom_NETROM_T4(r4, 0x103, 0x6, &(0x7f0000000100)=0x5, &(0x7f0000000180)=0x4) setresuid(0x0, r3, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)=0x14) openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x80000, 0x0) 03:43:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x20000, 0x0) ioctl$SG_GET_PACK_ID(r2, 0x227c, &(0x7f0000000240)) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r2, 0x28, 0x6, &(0x7f0000000280)={0x0, 0x7530}, 0x10) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000300)={0x0, 0xcc, 0x20}, &(0x7f0000000340)=0xc) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000380)={r4, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) 03:43:34 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 908.118616] CUSE: unknown device info "" [ 908.144028] CUSE: zero length info key specified [ 908.166295] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 908.190698] IPVS: ftp: loaded support on port[0] = 21 [ 908.197854] CUSE: unknown device info "" 03:43:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r0, 0x400452c8, &(0x7f0000000400)) close(0xffffffffffffffff) [ 908.222874] CUSE: zero length info key specified 03:43:35 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x20, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, 0x20}}, 0x0) 03:43:35 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:35 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x30, &(0x7f00000000c0)=[@in={0x2, 0x4e21, @remote}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x4e22, @multicast1}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f00000001c0)={r4}, &(0x7f0000000200)=0x8) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x14) 03:43:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000480)="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", 0x115, 0x0, 0x0, 0x5f) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xac50be8ce3dcf860, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r2, 0x400443c8, &(0x7f0000000040)={r0, 0x1000}) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) [ 908.457372] CUSE: unknown device info "" [ 908.463569] CUSE: zero length info key specified [ 908.489316] CUSE: unknown device info "" [ 908.508936] CUSE: zero length info key specified [ 908.812848] IPVS: ftp: loaded support on port[0] = 21 03:43:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6, 0x7fffffff) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x141080, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000480)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r2, 0x8991, &(0x7f0000000000)={'bond0\x00', @ifru_names='bond_slave_1\x00'}) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000000680)={0x0, 0x1, [0xfff, 0x101, 0x3ff, 0x40, 0x0, 0xfffffffffffffffb, 0x8, 0x4f]}) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f00000004c0)) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x20a000, 0x0) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f0000000380)="e2da5cdea423495c8b5663b2d9e462f4e65c25cc8b2ba5e1349cd9ae758d94c045f53f48860fd0b3d8013a69034f6ac0d6e1e98dfe38d2d9e2e2c54d473c67bfa22bbf07fadb6002cda4dd466bf8b4ac1fd7837039b702b9d0fa204a8e5df87c3de67d40844e3ddd3c120aee61b90f3b98210922d8d4271c6df39457ffa88a8a1c33837414408c58e56e3fc11ec40ec466928864d45fe30bbdca4189941c975bc6fe8fb0e6bf8e2a58131d1b5d088066c68b8a6ee0c4e1fea78983de57627ebf6f449a310f966c64391d936f99802fb9320ae1cc") r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/sequencer2\x00', 0x40042, 0x0) sendto$inet(r0, &(0x7f00000000c0)="8dec431bb44aff53a310b4eabef65b9ca28574570c8753d962784ce7563c1f448215fd237bf4c9159a98e9205a38a1fef116825d2a67dccc355557378e26b4e71c9ead8245ce8f8727e4d5e348d6b048462955248e97e362bb149adcd5ad849873b82111c2ecfa383140f9d4c99f525041a886277a6592dbc6b9108911e88a440b93f5c0fae544676b44a19bf06aa255a549db9cb0a9221a90f33fec43b1d074bf", 0xa1, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000580)='fou\x00') sendmsg$FOU_CMD_DEL(r4, &(0x7f0000000640)={&(0x7f0000000540), 0xc, &(0x7f0000000600)={&(0x7f0000000740)=ANY=[@ANYBLOB="000028bd7000fddbdf2502000000080003003b000000080001004e230000"], 0x1}, 0x1, 0x0, 0x0, 0x20044000}, 0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0x5b2, &(0x7f0000000300)={&(0x7f0000000780)=ANY=[@ANYBLOB="3c4703ce437fda06aa9ede4723bff76a47fc470541ab433414a8682417b501ac03a3b4b06c489a090000000000000024e5b8a38d24ff2a2f531b8f6be83163c9422cbcc97535a7200a970b39a73df5dd21ac7dbd281bf3a20b1ab70b4c08c43dd80f2944438cc24aa5f864623565"], 0x1}, 0x1, 0x0, 0x0, 0x8050}, 0x40) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, @perf_config_ext={0xd1, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$session_to_parent(0x12) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x200) dup2(r5, 0xffffffffffffffff) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0xc81, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x1, 0x40100) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000300)={0x0, @remote, @loopback}, &(0x7f0000000340)=0xc) sendmsg$nl_route(r7, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0000010000000030e1d035b385af2a8b4c510e9d91dd88977cdbf35dfd153e455765394e223dbbc577e9f4fb665eba75dbcacc22b7e70b0b40b031887c1591a1bd29921e0e81f19a0ca98748136eecea289e2b3369690300926144842f2a991366000000000000"], 0x1}}, 0x4008000) ioctl$sock_proto_private(r6, 0x80089ec, &(0x7f0000000140)="039625617620978a4df541244054545eefb285b44d2198c37642636f3bd6084339c6e79154e7a4e1e8a3a316d5a4d756fa828508c3eaae4df2759d4d16de576413772f248c74aae160e44749d604a7af5290efc74ba837ec71ff4bfb5f9a2d51403ecc6b5a4bb2dab710e3367549b45cd0b3fed1c251372400872f340ee3b348964d022f3224519d06adad720a5650c9b04292955ae6fd364adebee641bc911bcdd907f409e8200d95b946789c69b1d8876c") syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0xff, 0x80004) syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x4080) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) 03:43:35 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x5, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 908.989822] CUSE: unknown device info "" [ 909.010873] CUSE: zero length info key specified [ 909.036930] CUSE: unknown device info "" [ 909.057484] CUSE: zero length info key specified [ 909.098739] IPVS: ftp: loaded support on port[0] = 21 03:43:36 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x0, 0x88000000]}, &(0x7f0000000000)=0x54) 03:43:36 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x20, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, 0x20}}, 0x0) 03:43:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = socket(0x9, 0xa, 0x19a) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f0000000200)=0xfffffffffffffffa, 0x4) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r2, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:36 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) lsetxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f0000000180)=@v1={0x1000000, [{0x7fffffff, 0xffff}]}, 0xc, 0x2) setresuid(0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) fchmod(r2, 0x10) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x14) 03:43:36 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x6, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x18000, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r1, 0x5, 0x2}, 0x14) msgctl$IPC_STAT(0x0, 0x4, 0x0) [ 909.465079] CUSE: unknown device info "" [ 909.492810] CUSE: zero length info key specified 03:43:36 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x20, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, 0x20}}, 0x0) [ 909.522663] CUSE: unknown device info "" [ 909.530905] CUSE: zero length info key specified [ 909.555301] IPVS: ftp: loaded support on port[0] = 21 03:43:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f3188b070") r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x402, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) close(0xffffffffffffffff) 03:43:36 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x7, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:36 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x20000000403, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4e, 0x0, 0x2a1) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000080)=0x6) getsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000040), &(0x7f0000000140)=0x4) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) mlockall(0x1) ioctl$SG_GET_LOW_DMA(r2, 0x227a, &(0x7f0000000000)) ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, 0x0) mmap(&(0x7f0000428000/0x2000)=nil, 0x2000, 0x0, 0x8032, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r3, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x100a}], 0x1) shmat(0x0, &(0x7f0000429000/0x3000)=nil, 0x1000) 03:43:36 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x14) 03:43:36 executing program 5 (fault-call:3 fault-nth:0): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 909.855475] CUSE: unknown device info "" [ 909.859657] CUSE: zero length info key specified [ 909.882685] CUSE: unknown device info "" [ 909.925916] FAULT_INJECTION: forcing a failure. [ 909.925916] name failslab, interval 1, probability 0, space 0, times 0 [ 909.947461] CUSE: zero length info key specified [ 910.043983] CPU: 0 PID: 17766 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #86 [ 910.051297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 910.060667] Call Trace: [ 910.063265] dump_stack+0x172/0x1f0 [ 910.066912] should_fail.cold+0xa/0x1b [ 910.070821] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 910.075935] ? lock_downgrade+0x810/0x810 [ 910.080096] ? ___might_sleep+0x163/0x280 [ 910.084257] __should_failslab+0x121/0x190 [ 910.088503] should_failslab+0x9/0x14 [ 910.092324] kmem_cache_alloc_node+0x264/0x710 [ 910.096925] __alloc_skb+0xd5/0x5e0 [ 910.100560] ? skb_scrub_packet+0x440/0x440 [ 910.104900] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 910.110527] ? netlink_autobind.isra.0+0x228/0x310 [ 910.115479] netlink_sendmsg+0x97b/0xd70 [ 910.119899] ? netlink_unicast+0x720/0x720 [ 910.124155] ? smack_socket_sendmsg+0xb1/0x1a0 [ 910.128749] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 910.134296] ? security_socket_sendmsg+0x93/0xc0 [ 910.139075] ? netlink_unicast+0x720/0x720 [ 910.143326] sock_sendmsg+0xdd/0x130 [ 910.147046] ___sys_sendmsg+0x806/0x930 [ 910.151032] ? copy_msghdr_from_user+0x430/0x430 [ 910.155799] ? lock_downgrade+0x810/0x810 [ 910.159958] ? kasan_check_read+0x11/0x20 [ 910.164115] ? __fget+0x367/0x540 [ 910.167590] ? iterate_fd+0x360/0x360 [ 910.171399] ? lock_downgrade+0x810/0x810 [ 910.175577] ? __fget_light+0x1a9/0x230 [ 910.179565] ? __fdget+0x1b/0x20 [ 910.182940] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 910.188484] __sys_sendmsg+0x105/0x1d0 [ 910.192379] ? __ia32_sys_shutdown+0x80/0x80 [ 910.196800] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 910.202346] ? fput+0x128/0x1a0 [ 910.205637] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 910.210397] ? do_syscall_64+0x26/0x610 [ 910.214370] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 910.214385] ? do_syscall_64+0x26/0x610 [ 910.214406] __x64_sys_sendmsg+0x78/0xb0 [ 910.214424] do_syscall_64+0x103/0x610 [ 910.214439] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 910.224435] RIP: 0033:0x457e29 [ 910.224449] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 910.224456] RSP: 002b:00007f1bb41e5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 910.224468] RAX: ffffffffffffffda RBX: 00007f1bb41e5c90 RCX: 0000000000457e29 [ 910.224477] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 910.224484] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 910.224492] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1bb41e66d4 [ 910.224499] R13: 00000000004c54d4 R14: 00000000004d93b0 R15: 0000000000000004 [ 910.874217] IPVS: ftp: loaded support on port[0] = 21 03:43:37 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x0, 0x100000000000000]}, &(0x7f0000000000)=0x54) 03:43:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000004c0)=[{&(0x7f0000000200)=""/140, 0x8c}, {&(0x7f00000002c0)=""/125, 0x7d}, {&(0x7f0000000340)=""/121, 0x79}, {&(0x7f00000003c0)=""/70, 0x46}, {&(0x7f0000000440)=""/99, 0x63}], 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:37 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x8, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:37 executing program 0: socketpair$unix(0x1, 0x400000000000007, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x14) 03:43:37 executing program 5 (fault-call:3 fault-nth:1): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 911.079021] CUSE: unknown device info "" [ 911.092981] FAULT_INJECTION: forcing a failure. [ 911.092981] name failslab, interval 1, probability 0, space 0, times 0 [ 911.100993] CUSE: zero length info key specified [ 911.108325] IPVS: ftp: loaded support on port[0] = 21 [ 911.175800] CUSE: unknown device info "" [ 911.183726] CPU: 0 PID: 17783 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #86 [ 911.191030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 911.200389] Call Trace: [ 911.202021] CUSE: zero length info key specified [ 911.202990] dump_stack+0x172/0x1f0 [ 911.203010] should_fail.cold+0xa/0x1b [ 911.203028] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 911.220712] ? lock_downgrade+0x810/0x810 [ 911.224871] ? ___might_sleep+0x163/0x280 [ 911.229030] __should_failslab+0x121/0x190 [ 911.233279] should_failslab+0x9/0x14 [ 911.237080] kmem_cache_alloc_node_trace+0x270/0x720 [ 911.237099] ? __alloc_skb+0xd5/0x5e0 [ 911.237117] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 911.237137] __kmalloc_node_track_caller+0x3d/0x70 [ 911.237154] __kmalloc_reserve.isra.0+0x40/0xf0 [ 911.237170] __alloc_skb+0x10b/0x5e0 [ 911.237186] ? skb_scrub_packet+0x440/0x440 [ 911.237200] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 911.237225] ? netlink_autobind.isra.0+0x228/0x310 [ 911.251645] netlink_sendmsg+0x97b/0xd70 [ 911.251667] ? netlink_unicast+0x720/0x720 [ 911.251689] ? smack_socket_sendmsg+0xb1/0x1a0 [ 911.251705] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 911.251722] ? security_socket_sendmsg+0x93/0xc0 [ 911.251737] ? netlink_unicast+0x720/0x720 [ 911.251753] sock_sendmsg+0xdd/0x130 [ 911.311036] ___sys_sendmsg+0x806/0x930 [ 911.315026] ? copy_msghdr_from_user+0x430/0x430 [ 911.320604] ? lock_downgrade+0x810/0x810 [ 911.324764] ? kasan_check_read+0x11/0x20 [ 911.328926] ? __fget+0x367/0x540 [ 911.332389] ? iterate_fd+0x360/0x360 [ 911.336189] ? lock_downgrade+0x810/0x810 [ 911.340351] ? __fget_light+0x1a9/0x230 [ 911.344331] ? __fdget+0x1b/0x20 [ 911.347701] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 911.353255] __sys_sendmsg+0x105/0x1d0 [ 911.357155] ? __ia32_sys_shutdown+0x80/0x80 [ 911.361572] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 911.367374] ? fput+0x128/0x1a0 [ 911.370672] ? trace_hardirqs_on_thunk+0x1a/0x1c 03:43:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x14) [ 911.375434] ? do_syscall_64+0x26/0x610 [ 911.379424] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 911.384795] ? do_syscall_64+0x26/0x610 [ 911.388787] __x64_sys_sendmsg+0x78/0xb0 [ 911.392860] do_syscall_64+0x103/0x610 [ 911.396765] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 911.401948] RIP: 0033:0x457e29 [ 911.405145] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 911.424338] RSP: 002b:00007f1bb41e5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 911.424354] RAX: ffffffffffffffda RBX: 00007f1bb41e5c90 RCX: 0000000000457e29 [ 911.424363] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 911.424372] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 911.424381] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1bb41e66d4 [ 911.424390] R13: 00000000004c54d4 R14: 00000000004d93b0 R15: 0000000000000004 03:43:38 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0xc, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:38 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101000) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000140)={&(0x7f0000fff000/0x1000)=nil, 0x1000}) socketpair$unix(0x1, 0x80005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)=0x14) [ 911.671068] CUSE: unknown device info "" [ 911.713117] CUSE: zero length info key specified [ 911.761965] CUSE: unknown device info "" 03:43:38 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x800, 0x0) ioctl$VIDIOC_STREAMOFF(r4, 0x40045613, &(0x7f0000000100)) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x14) [ 911.819119] CUSE: zero length info key specified [ 912.422705] IPVS: ftp: loaded support on port[0] = 21 03:43:40 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000040)) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020100040800000000000000000000000300f6ffffffffff01000000e00000010000000000000000030005000000000002000000e00000010000000000000000"], 0x40}}, 0x0) 03:43:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x30, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000140)={0x7, {{0x2, 0x4e20, @broadcast}}, 0x1, 0x4, [{{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x11}}}, {{0x2, 0x4e22, @local}}, {{0x2, 0x4e21, @multicast1}}, {{0x2, 0x4e23, @remote}}]}, 0x290) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) close(0xffffffffffffffff) 03:43:40 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x10, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 913.185346] CUSE: unknown device info "" [ 913.202506] CUSE: zero length info key specified [ 913.243485] CUSE: unknown device info "" [ 913.247684] CUSE: zero length info key specified 03:43:40 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x0, 0x1100000000000000]}, &(0x7f0000000000)=0x54) 03:43:40 executing program 5 (fault-call:3 fault-nth:2): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r2, r2, r2) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$sock_x25_SIOCDELRT(r4, 0x890c, &(0x7f0000000180)={@null=' \x00', 0x0, 'netdevsim0\x00'}) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x16) 03:43:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x40000, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x8c, r2, 0x0, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}]}, @IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xfff}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xa07d}]}, 0x8c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r3, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:40 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x60, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:40 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x3, 0x2) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000300)={{0x1, 0x0, 0x100000000, 0xb7b1, '\x00', 0x6900000}, 0x1, [0x200, 0xfffffffffffffff9, 0x3dac, 0xfffffffffffffffd, 0x2c, 0xffffffff, 0x9, 0x8, 0x8, 0x100000000, 0x7, 0xfffffffffffff801, 0xfffffffffffffffc, 0x788, 0x5a, 0x0, 0x5, 0x7, 0xae, 0x3ff, 0x4f0c, 0x6f96, 0x10001, 0x3, 0x1000, 0x6, 0x81, 0x3, 0x8edc, 0x4, 0x8000, 0x400, 0x6c78, 0x1, 0xfffffffffffffffc, 0x3, 0x81, 0x81, 0x40, 0x4, 0x4, 0x7, 0x2, 0x7ff, 0x4f, 0x6e, 0x6, 0x101, 0xb3f0, 0x5, 0x400, 0xffffffffffffc0d6, 0x8, 0x4, 0x1ff, 0x2, 0x3, 0x7, 0x6, 0xffff, 0x1, 0x5, 0x100000001, 0x2, 0x4, 0x9, 0x2525705e, 0xf5, 0x8, 0x2, 0x9, 0xfffffffffffffffe, 0x8001, 0x1, 0xfffffffffffffeff, 0x100000000, 0x2, 0x1, 0x60fa, 0x2e, 0x10000, 0x129, 0x3, 0x5, 0x401, 0x1af, 0x9, 0x401, 0x2, 0x3ff, 0xffff, 0x6, 0x2, 0x10001, 0x7, 0x3f, 0x2, 0x8, 0x100000000, 0xe5, 0x7, 0x3f6, 0x0, 0x7, 0x4, 0x800, 0x1f, 0x1, 0xffff, 0x1, 0x3, 0x100000001, 0x4, 0x1ff, 0x1, 0x4, 0x1f, 0x80000000, 0x692e, 0x401, 0x400, 0x1, 0xca, 0x0, 0x6000000, 0xbd2, 0xccc9, 0x9]}) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 913.453577] FAULT_INJECTION: forcing a failure. [ 913.453577] name failslab, interval 1, probability 0, space 0, times 0 [ 913.501474] CPU: 1 PID: 17863 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #86 [ 913.508793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 913.518151] Call Trace: [ 913.521532] dump_stack+0x172/0x1f0 [ 913.525179] should_fail.cold+0xa/0x1b [ 913.529087] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 913.534204] ? lock_downgrade+0x810/0x810 [ 913.538361] ? ___might_sleep+0x163/0x280 [ 913.542519] __should_failslab+0x121/0x190 [ 913.546761] should_failslab+0x9/0x14 [ 913.550576] __kmalloc+0x2dc/0x740 [ 913.554142] ? membarrier_private_expedited+0x438/0x500 [ 913.559517] ? nla_memcpy+0xb0/0xb0 [ 913.563231] ? fib_nl2rule.isra.0+0x347/0x1ff0 [ 913.567829] fib_nl2rule.isra.0+0x347/0x1ff0 [ 913.572253] ? fib_rules_lookup+0xa90/0xa90 [ 913.576580] ? nla_parse+0x45/0x60 [ 913.580134] fib_nl_newrule+0x2cb/0x1d70 [ 913.584283] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 913.588711] ? fib_rules_seq_read+0x110/0x110 [ 913.593220] ? __mutex_lock+0x3cd/0x1310 [ 913.597282] ? kernel_text_address+0x73/0xf0 [ 913.601700] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 913.606145] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 913.611686] ? fib_rules_seq_read+0x110/0x110 [ 913.616188] rtnetlink_rcv_msg+0x465/0xb00 [ 913.621172] ? rtnetlink_put_metrics+0x560/0x560 [ 913.625937] ? netlink_deliver_tap+0x22d/0xbf0 [ 913.630520] ? find_held_lock+0x35/0x130 [ 913.634600] netlink_rcv_skb+0x17a/0x460 [ 913.638678] ? rtnetlink_put_metrics+0x560/0x560 [ 913.643467] ? netlink_ack+0xb50/0xb50 [ 913.647357] ? kasan_check_read+0x11/0x20 [ 913.651514] ? netlink_deliver_tap+0x254/0xbf0 [ 913.656106] rtnetlink_rcv+0x1d/0x30 [ 913.659826] netlink_unicast+0x536/0x720 [ 913.663903] ? netlink_attachskb+0x770/0x770 [ 913.668312] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 913.673332] ? __check_object_size+0x3d/0x42f [ 913.677847] netlink_sendmsg+0x8ae/0xd70 [ 913.681924] ? netlink_unicast+0x720/0x720 [ 913.686172] ? smack_socket_sendmsg+0xb1/0x1a0 [ 913.690759] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 913.696308] ? security_socket_sendmsg+0x93/0xc0 [ 913.701075] ? netlink_unicast+0x720/0x720 [ 913.705316] sock_sendmsg+0xdd/0x130 [ 913.709042] ___sys_sendmsg+0x806/0x930 [ 913.713024] ? copy_msghdr_from_user+0x430/0x430 [ 913.717794] ? lock_downgrade+0x810/0x810 [ 913.722718] ? kasan_check_read+0x11/0x20 [ 913.726872] ? __fget+0x367/0x540 [ 913.730337] ? iterate_fd+0x360/0x360 [ 913.734142] ? lock_downgrade+0x810/0x810 [ 913.738305] ? __fget_light+0x1a9/0x230 [ 913.742285] ? __fdget+0x1b/0x20 [ 913.745657] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 913.751201] __sys_sendmsg+0x105/0x1d0 [ 913.755091] ? __ia32_sys_shutdown+0x80/0x80 [ 913.759504] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 913.765042] ? fput+0x128/0x1a0 [ 913.768334] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 913.773092] ? do_syscall_64+0x26/0x610 [ 913.777066] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 913.782431] ? do_syscall_64+0x26/0x610 [ 913.786417] __x64_sys_sendmsg+0x78/0xb0 [ 913.790481] do_syscall_64+0x103/0x610 [ 913.794378] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 913.799566] RIP: 0033:0x457e29 [ 913.802767] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 913.822359] RSP: 002b:00007f1bb41e5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 913.830069] RAX: ffffffffffffffda RBX: 00007f1bb41e5c90 RCX: 0000000000457e29 [ 913.837341] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 913.844614] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 03:43:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) open(&(0x7f0000000200)='./file0\x00', 0x2e02c0, 0x20) close(0xffffffffffffffff) [ 913.851881] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1bb41e66d4 [ 913.859152] R13: 00000000004c54d4 R14: 00000000004d93b0 R15: 0000000000000004 [ 913.868522] CUSE: unknown device info "" [ 913.872714] CUSE: zero length info key specified [ 913.880475] IPVS: ftp: loaded support on port[0] = 21 03:43:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x400000, 0x0) write$sndseq(r1, &(0x7f00000003c0)=[{0x5ca, 0x54a3, 0xfffffffffffffff8, 0xffff, @tick=0x6, {0x9fe, 0x7fffffff}, {0x31, 0xaa2}, @ext={0x56, &(0x7f0000000280)="3f75389b42911f128ee4885b8840d047e14e85fe37d959fed114e0e544a8c1162c315a856c5d97f9bbf855ffa381476461df1bd0282e3300f943bd8609fb5989110496decea2d7f26b63c78cc6e8fce0986268e9ad12"}}, {0x1, 0x401, 0x2, 0x1, @tick=0x9, {0x401, 0x8}, {0xfffffffffffffffa, 0x7f}, @ext={0x8f, &(0x7f0000000300)="4cb4b780f7460bc575825b0ab230e17732b481c4a5cb78f963e28ba1a6ce31af33e7b0496ca2d65b2160313196433a78bcaa6f13ee4067aa69c79dd802e651cc41d13474e03db91f04dc5c5ab7b04d2eea0289d57c3001de9dc3f2da45282095cc34fd0873bb14f7aadc2f3ca00db4d2564b6045278136e1f228fa788f5fb818948184bb335524d3c8aacac5a494bc"}}, {0x2, 0x1, 0x5, 0x5, @tick=0x23b, {0x1000, 0xff18}, {0xb89, 0x5}, @addr={0x33}}], 0x90) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r2, 0x400452c8, &(0x7f0000000100)) r3 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x3, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x1f) close(0xffffffffffffffff) inotify_init() 03:43:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x19, 0x1, 0x87) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x5, 0x858, [0x20000200, 0x0, 0x0, 0x20000360, 0x20000650], 0x0, &(0x7f0000000080), &(0x7f0000000200)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x0, 0x1, 0xe9ff, 'hwsim0\x00', 'ipddp0\x00', 'ip6_vti0\x00', 'erspan0\x00', @dev={[], 0x25}, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty, [0xff, 0x0, 0xff, 0x0, 0x0, 0xff], 0xc0, 0xf8, 0x130, [@ipvs={'ipvs\x00', 0x28, {{@ipv6=@rand_addr="802bbf233a09eb0a9899eb24533c5911", [0xffffffff, 0xff000000, 0xffffff00, 0xff000000], 0x4e20, 0x32, 0x1, 0x4e24, 0x28, 0x31}}}]}, [@snat={'snat\x00', 0x10, {{@dev={[], 0x16}, 0x401f98eb4ce5f28c}}}]}, @snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x2, [{{{0x0, 0xc, 0x11, 'syzkaller0\x00', 'nr0\x00', 'nr0\x00', 'team_slave_0\x00', @dev={[], 0xe}, [0x0, 0xff, 0xff, 0x0, 0x0, 0xff], @empty, [0xff, 0x0, 0x0, 0xff, 0x0, 0xff], 0xf0, 0x128, 0x178, [@time={'time\x00', 0x18, {{0x400, 0x9, 0x1a63, 0x14d71, 0x6, 0x100000001, 0x1}}}, @devgroup={'devgroup\x00', 0x18, {{0x8, 0x1, 0x0, 0x800, 0x3}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x2, 'syz0\x00', 0x8}}}}, {{{0x0, 0x36, 0x889f, 'irlan0\x00', 'veth0_to_bridge\x00', 'hsr0\x00', 'nr0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, [0x0, 0x0, 0xff, 0xff, 0xff, 0xff], @random="e823691021e7", [0xff, 0xff, 0x0, 0x0, 0xff, 0x28b50224865cdf73], 0xd8, 0x110, 0x148, [@cgroup0={'cgroup\x00', 0x8, {{0x8, 0x1}}}, @mac={'mac\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}}}]}, [@snat={'snat\x00', 0x10, {{@random="166bfd30d10e"}}}]}, @arpreply={'arpreply\x00', 0x10, {{@dev={[], 0x22}, 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x2, [{{{0x11, 0x10, 0x6001, 'teql0\x00', 'nr0\x00', 'caif0\x00', 'veth0_to_bond\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xc112d179819e76a, 0xff], @empty, [0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x70, 0xa8}}, @common=@mark={'mark\x00', 0x10, {{0xffffffc0, 0xfffffffffffffffd}}}}, {{{0x9, 0x9, 0x8b00, 'eql\x00', 'syz_tun\x00', 'lo\x00', 'netdevsim0\x00', @remote, [0x0, 0xff, 0x0, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0x0, 0x0, 0x0, 0xff], 0x2f8, 0x2f8, 0x330, [@bpf0={'bpf\x00', 0x210, {{0x40, [{0x3c, 0x9, 0x80, 0x4}, {0x11, 0x29, 0xc000000000, 0x9}, {0xe81d, 0x598, 0x200, 0xfffffffffffff800}, {0xbf0c, 0x101, 0x40, 0x3d7}, {0x3, 0x6, 0x9, 0x4}, {0x80000000, 0x2, 0x0, 0xfffffffffffffff8}, {0x4, 0x6, 0x8, 0xffff}, {0x6c, 0x94, 0xf4e, 0x1000000000000}, {0x8, 0x0, 0x4, 0x4}, {0x73, 0x5, 0xfc1, 0x1000}, {0x5, 0x2, 0x101, 0x9e}, {0x80, 0xfffffffffffeffff, 0x1ff, 0x1f}, {0x7, 0x6, 0xfffffffffffffe00, 0xb59}, {0x7, 0x8a, 0x3, 0xd}, {0x5, 0x76f7, 0x7, 0x3f}, {0x80000001, 0x0, 0x3f, 0x800}, {0x6, 0x8, 0x4, 0x4}, {0x200, 0x10000000, 0x8, 0x100}, {0x9, 0x81, 0x847, 0x6}, {0x2, 0x5e, 0x6, 0x100}, {0x8d4c, 0x6, 0x1ff, 0x1000}, {0x9, 0x4, 0x4, 0x6}, {0x9, 0x6, 0xffff, 0x10000}, {0xffffffffffff8001, 0x3, 0xa, 0xffffffff}, {0xa1, 0x4, 0x1, 0x10001}, {0x187, 0x1, 0x401, 0xffffffff}, {0x8, 0x7d4d, 0x1, 0xffffffff7fffffff}, {0x9000, 0x9a, 0xffffffffffffff0e, 0x7}, {0x5, 0x800, 0x40, 0x400}, {0x35, 0x40, 0x40, 0x4}, {0x3, 0x100000001, 0x8, 0x400}, {0x7ff, 0x5d49, 0x9}, {0x100000000, 0xe0, 0x800, 0x53fa}, {0xfa, 0x2, 0x611, 0x800}, {0x3, 0xf81, 0xfffffffffffffffb, 0x80000001}, {0x8, 0x9, 0x2, 0x2}, {0x1, 0x1, 0x8000, 0x40}, {0x1, 0x13, 0x9, 0x4}, {0x3, 0x0, 0x1, 0x40}, {0x401, 0x6, 0x7fffffff, 0x100000000}, {0xf9f, 0x1, 0x1, 0x7}, {0x5, 0xbb3, 0x80000000, 0x1}, {0x8, 0x2, 0x5, 0xc819}, {0x4, 0xb59, 0x19b3, 0x10000}, {0xbeb, 0x100000000, 0x9, 0x4}, {0x1, 0x10001, 0x3f, 0x2}, {0x200, 0x80000000, 0x7fff, 0x613}, {0x2, 0xfffffffffffffff0, 0x80000001, 0x8}, {0x10000, 0x1da0, 0x3, 0x3}, {0x6, 0xffffffffffffff40, 0x100000001, 0x4}, {0x3a9, 0x5, 0x6, 0x7dc1294a}, {0x3, 0x0, 0x1ff, 0xfffffffffffffff7}, {0x8, 0xa1da, 0x5, 0x8}, {0xffff, 0x8, 0x0, 0x100000000}, {0x2, 0x100000000, 0x9, 0xff}, {0x9, 0x5ea, 0x5dbbc4f8, 0x2}, {0x81, 0x1f, 0x0, 0xa2ff}, {0x1, 0x10001, 0xffff, 0xa49}, {0x8, 0xffff, 0x8, 0x8}, {0x6, 0x1, 0xffffffff, 0x2}, {0x6, 0x6, 0x101, 0xc332}, {0x9c0, 0x8, 0xfffffffffffff2db, 0xffffffffffffffff}, {0x0, 0x7fffffff, 0x100000001, 0x400}, {0x20, 0x100000000, 0x8, 0x7}], 0x1}}}, @ipvs={'ipvs\x00', 0x28, {{@ipv6=@remote, [0xffffffff, 0xff, 0x0, 0xff000000], 0x4e24, 0x3b, 0x5, 0x4e20, 0x0, 0x4}}}]}}, @snat={'snat\x00', 0x10, {{@broadcast, 0xffffffffffffffff}}}}]}]}, 0x8d0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x10080, 0x0) ioctl$TIOCMBIC(r2, 0x5417, &(0x7f0000000040)=0x1f) socket$key(0xf, 0x3, 0x2) setsockopt$inet6_opts(r2, 0x29, 0x39, &(0x7f0000000140)=@routing={0x7f, 0xa, 0x2, 0xffffffffffffffe0, 0x0, [@mcast2, @rand_addr="8840b65e7b0c898a72b8d94e53506cbd", @empty, @local, @mcast1]}, 0x58) [ 914.026416] CUSE: unknown device info "" [ 914.030603] CUSE: zero length info key specified 03:43:40 executing program 5 (fault-call:3 fault-nth:3): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:41 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x406, r0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000400)={0x0, 0x3a, "d861965aa021ae980f0d7f5fc70a7926c329d88f7fe3f71c3b897b27520bf46f4b560843e9977d7269c92a4b9980d21e81b5f5f8aa1ead3fe2f5"}, &(0x7f0000000480)=0x42) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000004c0)={r3, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x16}}}}, &(0x7f0000000580)=0x84) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r7 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x4924c0, 0x0) sendmsg$nl_xfrm(r7, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@delsa={0x3c, 0x11, 0x20, 0x70bd29, 0x25dfdbfb, {@in=@local, 0x4d3, 0x2, 0x32}, [@coaddr={0x14, 0xe, @in=@empty}]}, 0x3c}, 0x1, 0x0, 0x0, 0x850}, 0x40) setresuid(0x0, r5, 0x0) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x800000, &(0x7f00000002c0)={{'fd', 0x3d, r7}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x90000000000000}}, {@max_read={'max_read', 0x3d, 0x6f75f384}}], [{@audit='audit'}, {@obj_type={'obj_type', 0x3d, '#nodev/md5sum'}}, {@obj_user={'obj_user', 0x3d, '/dev/qat_adf_ctl\x00'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@dont_hash='dont_hash'}]}}) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000000)=0x14) 03:43:41 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x300, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 914.189887] FAULT_INJECTION: forcing a failure. [ 914.189887] name failslab, interval 1, probability 0, space 0, times 0 [ 914.227619] CPU: 0 PID: 17896 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #86 [ 914.234944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 914.244307] Call Trace: [ 914.246920] dump_stack+0x172/0x1f0 [ 914.250569] should_fail.cold+0xa/0x1b [ 914.254471] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 914.259584] ? lock_downgrade+0x810/0x810 [ 914.263741] ? ___might_sleep+0x163/0x280 [ 914.267900] __should_failslab+0x121/0x190 [ 914.272145] should_failslab+0x9/0x14 [ 914.275951] kmem_cache_alloc_node+0x264/0x710 [ 914.280551] ? find_held_lock+0x35/0x130 [ 914.284624] ? atomic_notifier_call_chain+0xc6/0x190 [ 914.289746] __alloc_skb+0xd5/0x5e0 [ 914.293386] ? skb_scrub_packet+0x440/0x440 [ 914.297715] ? kasan_check_read+0x11/0x20 [ 914.301885] notify_rule_change+0xac/0x220 [ 914.306131] fib_nl_newrule+0x169a/0x1d70 [ 914.310297] ? fib_rules_seq_read+0x110/0x110 [ 914.314799] ? _raw_spin_unlock+0x2d/0x50 [ 914.319283] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 914.323727] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 914.329270] ? fib_rules_seq_read+0x110/0x110 [ 914.333775] rtnetlink_rcv_msg+0x465/0xb00 [ 914.338027] ? rtnetlink_put_metrics+0x560/0x560 [ 914.342794] ? netlink_deliver_tap+0x22d/0xbf0 [ 914.347383] ? find_held_lock+0x35/0x130 [ 914.351461] netlink_rcv_skb+0x17a/0x460 [ 914.355529] ? rtnetlink_put_metrics+0x560/0x560 [ 914.360296] ? netlink_ack+0xb50/0xb50 [ 914.364189] ? kasan_check_read+0x11/0x20 [ 914.368351] ? netlink_deliver_tap+0x254/0xbf0 [ 914.372954] rtnetlink_rcv+0x1d/0x30 [ 914.376675] netlink_unicast+0x536/0x720 [ 914.380746] ? netlink_attachskb+0x770/0x770 [ 914.385162] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 914.390188] ? __check_object_size+0x3d/0x42f [ 914.394697] netlink_sendmsg+0x8ae/0xd70 [ 914.398776] ? netlink_unicast+0x720/0x720 [ 914.398797] ? smack_socket_sendmsg+0xb1/0x1a0 [ 914.407584] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 914.407601] ? security_socket_sendmsg+0x93/0xc0 [ 914.407616] ? netlink_unicast+0x720/0x720 [ 914.407632] sock_sendmsg+0xdd/0x130 [ 914.407647] ___sys_sendmsg+0x806/0x930 [ 914.407664] ? copy_msghdr_from_user+0x430/0x430 [ 914.435074] ? lock_downgrade+0x810/0x810 [ 914.439241] ? kasan_check_read+0x11/0x20 [ 914.443402] ? __fget+0x367/0x540 [ 914.446867] ? iterate_fd+0x360/0x360 [ 914.450672] ? lock_downgrade+0x810/0x810 [ 914.454838] ? __fget_light+0x1a9/0x230 [ 914.458821] ? __fdget+0x1b/0x20 [ 914.462197] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 914.467753] __sys_sendmsg+0x105/0x1d0 [ 914.471650] ? __ia32_sys_shutdown+0x80/0x80 [ 914.476077] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 914.481624] ? fput+0x128/0x1a0 [ 914.484922] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 914.489694] ? do_syscall_64+0x26/0x610 [ 914.494183] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 914.499560] ? do_syscall_64+0x26/0x610 [ 914.503551] __x64_sys_sendmsg+0x78/0xb0 [ 914.507632] do_syscall_64+0x103/0x610 [ 914.511532] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 914.514321] CUSE: unknown device info "" [ 914.516719] RIP: 0033:0x457e29 [ 914.516735] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 914.516744] RSP: 002b:00007f1bb41e5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 914.516759] RAX: ffffffffffffffda RBX: 00007f1bb41e5c90 RCX: 0000000000457e29 [ 914.516770] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 914.521971] CUSE: zero length info key specified [ 914.524767] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 914.524777] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1bb41e66d4 [ 914.524786] R13: 00000000004c54d4 R14: 00000000004d93b0 R15: 0000000000000004 [ 914.611113] IPVS: ftp: loaded support on port[0] = 21 [ 914.712225] CUSE: unknown device info "" [ 914.726816] CUSE: zero length info key specified 03:43:43 executing program 5 (fault-call:3 fault-nth:4): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x0, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000240)) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) connect$rds(r1, &(0x7f0000000280)={0x2, 0x4e21, @rand_addr=0x134}, 0x10) ioctl$FS_IOC_GETFSLABEL(r2, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2000000000000038, &(0x7f0000000140)=[{0x20, 0x0, 0xfff, 0xfffffffffffff000}, {0x6}]}, 0x10) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x4, 0x400c40) ioctl$DRM_IOCTL_GET_MAGIC(r2, 0x80046402, &(0x7f0000000080)) 03:43:43 executing program 0: socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x9, 0x4000) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f0000000100)={0x3, 0x1, 0x4, 0x0, 0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x282, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)=0x14) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f00000001c0)=0x1, 0x4) 03:43:43 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x0, 0x8800000000000000]}, &(0x7f0000000000)=0x54) 03:43:43 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x500, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 916.968430] CUSE: unknown device info "" [ 916.982718] FAULT_INJECTION: forcing a failure. [ 916.982718] name failslab, interval 1, probability 0, space 0, times 0 [ 916.986151] CUSE: zero length info key specified 03:43:43 executing program 4: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x8000007f}, 0xff3e) r0 = socket(0x13, 0x801, 0x3) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000001}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000801}, 0x8000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r2) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r3, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0}]) r4 = socket(0x4, 0x8000f, 0x84) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r4, 0x80045400, &(0x7f00000000c0)) setsockopt(r4, 0x107, 0x5, &(0x7f0000001000), 0xc5) getsockopt$netrom_NETROM_N2(r4, 0x103, 0x3, &(0x7f0000000000)=0x5, &(0x7f0000000040)=0x4) socket(0xf, 0xa, 0x3) [ 917.041430] CPU: 0 PID: 17937 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #86 [ 917.048758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 917.049113] IPVS: ftp: loaded support on port[0] = 21 [ 917.058110] Call Trace: [ 917.058136] dump_stack+0x172/0x1f0 [ 917.058162] should_fail.cold+0xa/0x1b [ 917.058181] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 917.058204] ? lock_downgrade+0x810/0x810 [ 917.058230] ? ___might_sleep+0x163/0x280 [ 917.058249] __should_failslab+0x121/0x190 [ 917.058270] should_failslab+0x9/0x14 [ 917.095209] kmem_cache_alloc_node_trace+0x270/0x720 [ 917.100328] ? __alloc_skb+0xd5/0x5e0 [ 917.104141] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 917.109608] __kmalloc_node_track_caller+0x3d/0x70 [ 917.114548] __kmalloc_reserve.isra.0+0x40/0xf0 [ 917.119230] __alloc_skb+0x10b/0x5e0 [ 917.122949] ? skb_scrub_packet+0x440/0x440 [ 917.127286] ? kasan_check_read+0x11/0x20 [ 917.131448] notify_rule_change+0xac/0x220 [ 917.135695] fib_nl_newrule+0x169a/0x1d70 [ 917.139867] ? fib_rules_seq_read+0x110/0x110 [ 917.144379] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 917.148827] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 917.154488] ? fib_rules_seq_read+0x110/0x110 [ 917.158999] rtnetlink_rcv_msg+0x465/0xb00 [ 917.163246] ? rtnetlink_put_metrics+0x560/0x560 [ 917.168020] ? netlink_deliver_tap+0x22d/0xbf0 [ 917.172610] ? find_held_lock+0x35/0x130 [ 917.176682] netlink_rcv_skb+0x17a/0x460 [ 917.181029] ? rtnetlink_put_metrics+0x560/0x560 [ 917.185795] ? netlink_ack+0xb50/0xb50 [ 917.189695] ? kasan_check_read+0x11/0x20 [ 917.193862] ? netlink_deliver_tap+0x254/0xbf0 [ 917.198458] rtnetlink_rcv+0x1d/0x30 [ 917.202176] netlink_unicast+0x536/0x720 [ 917.206246] ? netlink_attachskb+0x770/0x770 [ 917.210660] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 917.215683] ? __check_object_size+0x3d/0x42f [ 917.220208] netlink_sendmsg+0x8ae/0xd70 [ 917.224281] ? netlink_unicast+0x720/0x720 [ 917.228529] ? smack_socket_sendmsg+0xb1/0x1a0 [ 917.233116] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 03:43:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000200)='pids.current\x00', 0x0, 0x0) ioctl$sock_rose_SIOCDELRT(r1, 0x890c, &(0x7f0000000240)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0xfffffffffffffff7, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={'nr', 0x0}, 0x1, [@default, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r2, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) [ 917.238659] ? security_socket_sendmsg+0x93/0xc0 [ 917.243421] ? netlink_unicast+0x720/0x720 [ 917.247660] sock_sendmsg+0xdd/0x130 [ 917.251382] ___sys_sendmsg+0x806/0x930 [ 917.255871] ? copy_msghdr_from_user+0x430/0x430 [ 917.260638] ? lock_downgrade+0x810/0x810 [ 917.264800] ? kasan_check_read+0x11/0x20 [ 917.268959] ? __fget+0x367/0x540 [ 917.272432] ? iterate_fd+0x360/0x360 [ 917.276238] ? lock_downgrade+0x810/0x810 [ 917.280678] ? __fget_light+0x1a9/0x230 [ 917.284669] ? __fdget+0x1b/0x20 [ 917.288039] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 917.293592] __sys_sendmsg+0x105/0x1d0 [ 917.297487] ? __ia32_sys_shutdown+0x80/0x80 [ 917.301908] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 917.307443] ? fput+0x128/0x1a0 [ 917.310742] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 917.315503] ? do_syscall_64+0x26/0x610 [ 917.315518] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 917.315532] ? do_syscall_64+0x26/0x610 [ 917.315553] __x64_sys_sendmsg+0x78/0xb0 [ 917.315570] do_syscall_64+0x103/0x610 [ 917.315587] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 917.315598] RIP: 0033:0x457e29 [ 917.315610] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 917.315620] RSP: 002b:00007f1bb41e5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 917.324929] RAX: ffffffffffffffda RBX: 00007f1bb41e5c90 RCX: 0000000000457e29 [ 917.324939] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 917.324948] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 917.324957] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1bb41e66d4 [ 917.324972] R13: 00000000004c54d4 R14: 00000000004d93b0 R15: 0000000000000004 03:43:44 executing program 5 (fault-call:3 fault-nth:5): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:44 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x600, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) r2 = syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x100, 0x4000) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)={0xfc, r3, 0x122, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1000}]}, @TIPC_NLA_BEARER={0xd0, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x32c0000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'irlan0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x20}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @multicast2}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x0, @empty, 0x2}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @rand_addr=0x9}}, {0x14, 0x2, @in={0x2, 0x4e20, @multicast1}}}}]}]}, 0xfc}, 0x1, 0x0, 0x0, 0x14}, 0x40045) 03:43:44 executing program 0: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000400)={0x0, 0x81}, &(0x7f0000000440)=0x8) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$xdp(0x2c, 0x3, 0x0) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f0000000580)) r5 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f00000005c0)={0x0, {0x2, 0x4e22, @broadcast}, {0x2, 0x0, @remote}, {0x2, 0x4e22, @multicast1}, 0x200, 0x7, 0x3, 0x0, 0x0, &(0x7f00000000c0)='bridge_slave_1\x00', 0x0, 0x7}) close(r5) ioctl$FS_IOC_FSGETXATTR(r4, 0x801c581f, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$int_out(r1, 0x2, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000280)=@assoc_id=r2, &(0x7f0000000340)=0x4) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x5002}) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000100)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xfffffffffffffffe}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="28000000100020f8e405000100009d92a1d952", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x28}}, 0x0) r8 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x2007fff) ioctl$TIOCSPGRP(r6, 0x5410, &(0x7f0000000000)) write$P9_RXATTRCREATE(r8, &(0x7f0000000140)={0x10000022b}, 0xca) write$P9_RSETATTR(r8, &(0x7f0000000040)={0x7, 0x1b, 0x2}, 0x33d) mount(&(0x7f0000000700)=ANY=[@ANYBLOB="2e2f66696c653000060ea974b8dce77697b1e2691bb0ebe5d82912c0b338a310c61662cd104ec49a2f7454e5b660536c3ff00cf1702220e2c85082abd69d541ca81922865a4cfeafaa5b8a541c6e2dd065b0b5759ef0ae58624f61beae2e5a0cf36af2533e642dd8c542e74c5e8a79c646be5151a25a305d76d7ec4384ef00cb0ff8b2"], &(0x7f00000004c0)='./bus/file0\x00', &(0x7f0000000500)='gfs2\x00', 0x18, &(0x7f0000000540)='^mime_typewlan1\x00') 03:43:44 executing program 4: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x8000007f}, 0xff3e) r0 = socket(0x13, 0x801, 0x3) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000001}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000801}, 0x8000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r2) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r3, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0}]) r4 = socket(0x4, 0x8000f, 0x84) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r4, 0x80045400, &(0x7f00000000c0)) setsockopt(r4, 0x107, 0x5, &(0x7f0000001000), 0xc5) getsockopt$netrom_NETROM_N2(r4, 0x103, 0x3, &(0x7f0000000000)=0x5, &(0x7f0000000040)=0x4) socket(0xf, 0xa, 0x3) [ 917.767633] CUSE: unknown device info "" 03:43:44 executing program 4: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x8000007f}, 0xff3e) r0 = socket(0x13, 0x801, 0x3) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000001}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000801}, 0x8000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r2) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r3, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0}]) r4 = socket(0x4, 0x8000f, 0x84) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r4, 0x80045400, &(0x7f00000000c0)) setsockopt(r4, 0x107, 0x5, &(0x7f0000001000), 0xc5) getsockopt$netrom_NETROM_N2(r4, 0x103, 0x3, &(0x7f0000000000)=0x5, &(0x7f0000000040)=0x4) socket(0xf, 0xa, 0x3) [ 917.814813] CUSE: zero length info key specified 03:43:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x83, 0x10000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x6, 0xb24b, 0x3be1, 0x480000000000000, 0x3}, &(0x7f0000000280)=0x14) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000002c0)=r2, 0x4) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r3, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) [ 918.098593] IPVS: ftp: loaded support on port[0] = 21 03:43:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000200)={'lo\x00', {0x2, 0x4e24, @multicast2}}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:45 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x0, 0x0, 0x11]}, &(0x7f0000000000)=0x54) 03:43:45 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x700, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:45 executing program 4: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x8000007f}, 0xff3e) r0 = socket(0x13, 0x801, 0x3) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000001}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000801}, 0x8000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r2) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r3, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0}]) r4 = socket(0x4, 0x8000f, 0x84) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r4, 0x80045400, &(0x7f00000000c0)) setsockopt(r4, 0x107, 0x5, &(0x7f0000001000), 0xc5) getsockopt$netrom_NETROM_N2(r4, 0x103, 0x3, &(0x7f0000000000)=0x5, &(0x7f0000000040)=0x4) socket(0xf, 0xa, 0x3) 03:43:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) mincore(&(0x7f0000ffa000/0x4000)=nil, 0x4000, &(0x7f0000000380)=""/122) close(0xffffffffffffffff) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x1, 0x450440) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e21, @multicast2}}, 0x8000, 0x1, 0x7, 0x8, 0x14}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000002c0)={r3, @in={{0x2, 0x4e21, @local}}, 0x80, 0x6, 0x0, 0x3, 0x20}, &(0x7f00000000c0)=0x98) [ 918.554533] CUSE: unknown device info "" [ 918.558749] CUSE: zero length info key specified [ 918.578128] IPVS: ftp: loaded support on port[0] = 21 [ 918.611161] CUSE: unknown device info "" [ 918.616625] CUSE: zero length info key specified 03:43:45 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000240)={0x4, @time, 0xffffffffffffffff, {0x2}, 0x2, 0x0, 0x71}) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:45 executing program 4: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x8000007f}, 0xff3e) r0 = socket(0x13, 0x801, 0x3) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000001}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000801}, 0x8000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r2) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r3, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0}]) r4 = socket(0x4, 0x8000f, 0x84) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r4, 0x80045400, &(0x7f00000000c0)) setsockopt(r4, 0x107, 0x5, &(0x7f0000001000), 0xc5) getsockopt$netrom_NETROM_N2(r4, 0x103, 0x3, &(0x7f0000000000)=0x5, &(0x7f0000000040)=0x4) 03:43:45 executing program 0: r0 = socket$inet(0x2, 0x800, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e1f, @multicast2}, 0x10) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x2000, 0x0) ioctl$TIOCNXCL(r1, 0x540d) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10) bind$bt_sco(r1, &(0x7f0000000080)={0x1f, {0x7, 0x81, 0x0, 0x7, 0x4, 0x101}}, 0x8) 03:43:45 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x2}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:45 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0xc00, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:45 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x0, 0x101001) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f0000000240)=""/216) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r0, &(0x7f0000000ac0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000340)="3b084aa645556b70288816777d87060ed02f95365b0d8a818568616dfef197cd9d6de38a80dc1ee62b2221b0c2a6e218fb39d5c642f40b330d8c51295dc5c1aefd122cbc2b9dc7baa41efe0d86cb80dc86441874424e9e72003dabec23beedc34706377294c0b6ff83882cd80de74a824fc8e9c2f883f7f793384261c8e51f285172e1167d38281899449e22998ed141c3a34ae51d534a9892e0de509d7b47b32757b84353b456b91a792a30a0f6548ff5b09b10d53921f09bb4d9a64366d27f08480e69d704104423affb6bca6ae52957b25628a7b55cad36c7290e", 0xdc}, {&(0x7f0000000440)="4cf73ed33c8c8d3efe58a26e04cd67405cd082893e9914a87a1520b8f7e017f0c2cdf5efdc0ce4dd254d5a381f", 0x2d}, {&(0x7f0000000480)="6d9cba8d2a20a472eebd23833f05c035daec81adb054aa2928173482132c194788d761d6702af4ae1c2ff7863f82b3b7c80dad5e636df6a46ec7ff1c785776dccd2a2f8f4273f2a14714f02064069fe813f101b9f20d40b0e567fe31856a5234015b884489340ca5e1383c3bb7831bf7d88f2ff0e915f0af0e0d6085479eb7d741537cd6667e6eddf9682faa931b280f24daa89a671e128848ecc67af2a2c1e6f32479196200c9b2140c92e6a5c3718755aa9646362c2ebcb89ed27b0d0aebf5a9798ed889136b49c022c19b45a4924c6eb3609225c31afea5010abd6aab8339854d5761b2f588fb7fabffe58f6d", 0xee}], 0x3, &(0x7f00000005c0)=[{0xf8, 0x111, 0x1b, "112a478cd25206c80df58cfd22593b9015a057496abff0928ffa9227d43b245f1fbbaebd430a89f9f0ddc6115db0fce8529a97ba523be4f86848018a5b7b725219467b511700c59dd43040e0113b25491fbe205318d574d6d497de62c9d02b679eec0cadb8438637140097c2354ec86b2f76011fd26f3f12c46652f3d0035aedfd5e6534f31265f533dd2024bc9a5e8ae30c6065d5547f38020345298118673d305f9b059569f21cdcb5bc84888598b29db190842efa5cebae22b7c8369d396bf48d0ef4d61d93583eba23254ff0e13344f22914461b5ba555c23b83e305c0e334d4"}, {0x20, 0x11, 0x5, "b29086df5a5be6f33661dd069a"}, {0xd8, 0x88, 0x8000, "c85be6291173889e9f6b9459442577fdc7941b60709f1206d020d254a75a7f8581a01d1619394557405e9b6433c2e6e9fbb581dec6857d1bc46a001e00b6b9daf38ad5c422927cf17c9f7b34693231373e1f0cefa1a9b80e652d6b74452d50ad8ef0d2639ef67909cc20ec536a6d5e21e79a3af0378bbf2ac0d969d1dc9849bd8af63446b03db9146f23c78a9970b1162e41a070c86329828eecbcb7d7e15ae92d9004e4c1acf4a58d3d7239cb43d047aff69622e52a1c65a2ec86b61d1defe591e0"}, {0x100, 0x10d, 0x401, "ee0f85e683060e7c6e2f693232af7629d2fbca6b67c3f1c223c49f35ec13af54ff5de39aaeb8ab6564c301559f5600d1fd1dcce65bdaf7689b7d19614da7df7cf3f70d1772f22c5f3da144563d3e10664f106ca64123f3ea830b5cc7f2e16d9a4becccf43501b03bdc5344fd416958cfdf451f6e490ce290bc0e789a6f69e5ae6eef2011818b73139f404cd1fc3d5d45947abd0a9025d5fd9735b531bf68fc89e5859a184ee064f29989a0dd07454c73261c1c64f22433e01452d18770d65123772f0410c6da2caef93f436fea951aa4e0eb022d2e063d44f9a40993ca1105d69502ae010204dab8588a566e5d69dad7"}, {0xf8, 0x116, 0x8, "c1de9bf0b5f2e6941f0eb70120c9034d73ae979b5b5fd64f544478f9e9fc41598e5326cc9139593532619fc0e6fbf3c569ed214d5351e0b39b627904a1d5881b20488adb37099d828da1fae1b8c6a58a52454ffe8613d40a01ebe435064b6b1961c693471e7154597924b3c29dc849acbf8f40cdb3c5a26ec1c0dc06334761b4ea06d48320c3b4b5d37c804b4fa796f6084f8d9345996b3430b87cf8aa9de79b3edfb865558283bc92425126f196750f9e06d603141056086b073b3564fa9e38f0c9ff786c790f590f18d1e6d0eab95e30163b878ed707dd51238ee58afdbe2aeabbe2eb1fff"}, {0x18, 0x0, 0x5c, "0937ff3e56332743"}, {0x68, 0x102, 0x3, "775bb0d34736d937183ae3b45af61082b804c1928a2f51aa04eb47d007bc62e2d15f26f5cf886582851969b1606bdc1d40e284681bb41f5ff2a4a4a8a7e76af62b93871f94b0fb4a58102687ffa481c234109155278d68"}, {0x88, 0x1ff, 0x1, "01e48fe76feb4382b99a8393f943bd47435024e58c76b35feb0e4cf47b537c07c4ff525c6f94b299ab24b640a52b83f2c1d181bad75b42b8431410699d3573c28c6242482b6e240ada88e0941df675bcd194293884751adc19806c66f9b871ae5b43d45f3d3ce5a0d6f17ced0a68d13b5954787d61dec8"}], 0x4f0}, 0x4}], 0x1, 0x40000) ioctl$FS_IOC_GETFSLABEL(r2, 0x400452c8, &(0x7f0000000100)) setsockopt$inet_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000b00)="c79222ba470f1b401db33ac9a0fbc73cb9c25bdf7f39583c5ad33f5fbda824f963533e2a3c6dc3c9acc797f38e56e509ba346270df18f5c946ffd2cd6679cad5bb8a92b18c56aeab04756fe752e85afe1d622162f67f5d01323ed953946d5fd7e42ffb3cd5df5e6dc1821cb3ea0378e9469b1f20a27a23ec590eea87a222aec6562808e058e785dc48eea9608a7d177d76b2c4", 0x93) close(0xffffffffffffffff) 03:43:45 executing program 4: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x8000007f}, 0xff3e) r0 = socket(0x13, 0x801, 0x3) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000001}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000801}, 0x8000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r2) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r3, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0}]) r4 = socket(0x4, 0x8000f, 0x84) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r4, 0x80045400, &(0x7f00000000c0)) setsockopt(r4, 0x107, 0x5, &(0x7f0000001000), 0xc5) [ 919.096795] CUSE: unknown device info "" [ 919.116316] CUSE: zero length info key specified [ 919.139040] IPVS: ftp: loaded support on port[0] = 21 [ 919.144614] CUSE: unknown device info "" [ 919.148778] CUSE: zero length info key specified 03:43:46 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x0, 0x0, 0x88]}, &(0x7f0000000000)=0x54) 03:43:46 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x3}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4108000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r2, 0x0, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x20000000000}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24040040}, 0x48000) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r3, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:46 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x2000, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:46 executing program 4: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x8000007f}, 0xff3e) r0 = socket(0x13, 0x801, 0x3) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000001}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000801}, 0x8000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r2) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r3, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0}]) r4 = socket(0x4, 0x8000f, 0x84) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r4, 0x80045400, &(0x7f00000000c0)) 03:43:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000140)=0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f0000000240)=""/197) io_submit(r1, 0x0, &(0x7f0000000080)) [ 919.501185] CUSE: unknown device info "" [ 919.508458] IPVS: ftp: loaded support on port[0] = 21 [ 919.517787] CUSE: zero length info key specified [ 919.556500] CUSE: unknown device info "" 03:43:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2, &(0x7f0000000340)="0adcc550e2bdec65c6cf4f72dd003fbb0eac6f26a91c9b41ae01f5c799508f6389") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) uname(&(0x7f0000000380)=""/130) close(0xffffffffffffffff) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20\x00', 0x8000, 0x0) ioctl$SIOCX25GSUBSCRIP(r2, 0x89e0, &(0x7f0000000240)={'team_slave_0\x00', 0x8, 0x8}) [ 919.587738] CUSE: zero length info key specified 03:43:46 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x4}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:46 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt(r0, 0x3a, 0x1, &(0x7f0000000280)="1621f1067abddd71d8756767f2d37eb458f31bc2c297fcddd02c0a72d7f366c71d", 0x21) setrlimit(0xf, &(0x7f0000000000)={0xfffffffffffff800, 0xfffffffffffff800}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x80, 0x0) ioctl$SIOCX25GFACILITIES(r1, 0x89e2, &(0x7f0000000080)) 03:43:46 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x6000, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:46 executing program 4: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x8000007f}, 0xff3e) r0 = socket(0x13, 0x801, 0x3) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000001}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000801}, 0x8000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r2) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r3, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0}]) socket(0x4, 0x8000f, 0x84) [ 919.805125] CUSE: unknown device info "" 03:43:46 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0xa}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 919.834842] CUSE: zero length info key specified [ 919.852852] CUSE: unknown device info "" [ 919.858639] CUSE: zero length info key specified [ 920.144836] IPVS: ftp: loaded support on port[0] = 21 03:43:47 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x0, 0x0, 0x1100]}, &(0x7f0000000000)=0x54) 03:43:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:47 executing program 0: r0 = socket$inet6(0xa, 0x200000006, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x4e20, @loopback}, 0x10) 03:43:47 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x1000000, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:47 executing program 4: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x8000007f}, 0xff3e) r0 = socket(0x13, 0x801, 0x3) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000001}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000801}, 0x8000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r2) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r3, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0}]) 03:43:47 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x200000d0}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 920.309592] CUSE: unknown device info "" [ 920.329505] CUSE: zero length info key specified 03:43:47 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0x1, 0x28, &(0x7f00000000c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r1, 0x3, 0x8}, 0xc) bind$can_raw(r0, &(0x7f0000000100), 0x10) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)='\x00\x00\x00\x00', 0x4) fsetxattr(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="747275738865643e65746830d6"], &(0x7f0000000080)='{\x00', 0x2, 0x3) 03:43:47 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 920.353697] IPVS: ftp: loaded support on port[0] = 21 [ 920.362278] CUSE: unknown device info "" [ 920.387652] CUSE: zero length info key specified 03:43:47 executing program 4: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x8000007f}, 0xff3e) r0 = socket(0x13, 0x801, 0x3) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000001}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000801}, 0x8000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r2) io_submit(r3, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0}]) 03:43:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x80001, 0x0) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:47 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x2000000, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:47 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x3}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 920.620212] CUSE: unknown device info "" [ 920.637154] CUSE: zero length info key specified [ 920.665031] CUSE: unknown device info "" [ 920.708690] CUSE: zero length info key specified [ 920.886981] IPVS: ftp: loaded support on port[0] = 21 03:43:47 executing program 4: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x8000007f}, 0xff3e) r0 = socket(0x13, 0x801, 0x3) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000001}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000801}, 0x8000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r2) io_submit(r3, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0}]) 03:43:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = syz_open_dev$admmidi(&(0x7f0000000380)='/dev/admmidi#\x00', 0x3, 0x0) setsockopt$inet_tcp_buf(r2, 0x6, 0x0, &(0x7f00000003c0)="13c1b4732aa7cf48b89a84ab1a3b304552ae812972d4cd8a00afb441126f797445180a2e6b0b019d7cf41ded5772e6a8540c69c9746818b49ad28ecb3bb4bedce87f5992c91a70fc2597ca75604a5e8e5a6388f705974441af8c0b95a408fd3976e450c90dceedf8c549a88cbfab55c1bd82dda0997bd6976fb9030651f98e32109ff5dcea755c5eedd74c6aede6d5449c8e802e1fd6ab62a2e874dd286119e8ef4685a3e353e61c1536ca765b85480000000000000000000000000000", 0xbd) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) socket$unix(0x1, 0x2, 0x0) close(0xffffffffffffffff) 03:43:47 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x1ff, 0x20a80) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000080)=0x1, 0x4) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r3, 0xae44, 0x8bef) 03:43:47 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:47 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x0, 0x0, 0x8800]}, &(0x7f0000000000)=0x54) 03:43:47 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x3000000, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 921.020224] CUSE: unknown device info "" [ 921.046467] CUSE: zero length info key specified 03:43:47 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x5}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 921.099212] CUSE: unknown device info "" [ 921.102259] IPVS: ftp: loaded support on port[0] = 21 [ 921.110705] CUSE: zero length info key specified 03:43:48 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x3, 0x0) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) dup2(r1, r0) 03:43:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = syz_open_dev$admmidi(&(0x7f00000004c0)='/dev/admmidi#\x00', 0x200, 0x20000) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r2, 0x408c5333, &(0x7f0000000500)={0xfffffffffffffffd, 0xfff, 0x5, 'queue1\x00', 0xffffffffffff0000}) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r3, 0x11, 0x1, &(0x7f0000000300)=""/167, &(0x7f00000003c0)=0xa7) ioctl$VIDIOC_S_HW_FREQ_SEEK(r3, 0x40305652, &(0x7f0000000440)={0x40, 0x7, 0x0, 0x1000000000, 0x7, 0x0, 0x7}) ioctl$sock_bt_bnep_BNEPCONNDEL(r3, 0x400442c9, &(0x7f0000000200)={0x5, @dev={[], 0x1f}}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/mixer\x00', 0x200000, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') bind$netrom(r4, &(0x7f0000000240)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x2}, [@default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}, 0x48) 03:43:48 executing program 4: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x8000007f}, 0xff3e) r0 = socket(0x13, 0x801, 0x3) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000001}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000801}, 0x8000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r2) io_submit(r3, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0}]) 03:43:48 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x4000000, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:48 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x6}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") getpeername$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, &(0x7f00000000c0)=0x10) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x22) setsockopt$sock_timeval(r1, 0x1, 0xa, &(0x7f0000000080)={0x0, 0x7530}, 0x10) [ 921.382027] CUSE: unknown device info "" [ 921.403596] CUSE: zero length info key specified 03:43:48 executing program 4: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x8000007f}, 0xff3e) r0 = socket(0x13, 0x801, 0x3) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000001}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000801}, 0x8000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r3, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0}]) 03:43:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) r2 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x5, 0x40800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000240)) [ 921.441939] CUSE: unknown device info "" [ 921.448398] CUSE: zero length info key specified 03:43:48 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x80, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f00000001c0)={0x6, 0x74a, 0x1, 0x0, 0x5}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x3) r2 = syz_open_pts(r0, 0x0) r3 = getpgid(0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000480)=0x0) tgkill(r3, r4, 0x24) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000280)={0x144, r5, 0x300, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x54, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffffffffffe1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}]}, @TIPC_NLA_BEARER={0xa4, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x9, @empty}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x7, @ipv4={[], [], @empty}, 0xfffffffffffffff9}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x10001, @local, 0xa000000}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x25, @mcast2, 0x7}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'veth0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}]}]}, 0x144}, 0x1, 0x0, 0x0, 0x80}, 0x4) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0x80ffffff}) [ 921.809910] IPVS: ftp: loaded support on port[0] = 21 03:43:48 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:48 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x5000000, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:48 executing program 4: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x8000007f}, 0xff3e) r0 = socket(0x13, 0x801, 0x3) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000001}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000801}, 0x8000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r3, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0}]) 03:43:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:48 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x0, 0x0, 0x1000000]}, &(0x7f0000000000)=0x54) 03:43:48 executing program 0: syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x1000, 0x4000) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x442080) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x100, 0x0) syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x3, 0x2) pipe(&(0x7f0000000280)={0xffffffffffffffff}) sendmsg$unix(r0, 0x0, 0x0) personality(0x0) r1 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f00000003c0)=0xc30) r2 = socket(0x2, 0x80000, 0x2f) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000000)={0x6}, 0x4) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000002c0)={0x0, 0x4}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000400)={r3, @in={{0x2, 0x4e23, @empty}}, 0x5, 0x80000001, 0x1, 0x401, 0x12}, 0x98) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x101, 0x2, 0x6, 0x7, 0x1}, &(0x7f0000000080)=0x14) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f00000000c0)={r4, 0x4c5}, &(0x7f0000000100)=0x8) 03:43:48 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x9}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 921.906669] CUSE: unknown device info "" [ 921.921240] CUSE: zero length info key specified [ 921.932272] CUSE: unknown device info "" [ 921.970670] CUSE: zero length info key specified [ 921.984830] IPVS: ftp: loaded support on port[0] = 21 03:43:48 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x6000000, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:49 executing program 4: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x8000007f}, 0xff3e) r0 = socket(0x13, 0x801, 0x3) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000001}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000801}, 0x8000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r3, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0}]) 03:43:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x1, 0x10801) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000080)) perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:43:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000300)='\x00', 0x0) keyctl$update(0x2, r1, &(0x7f0000000340)="17611f1731f488799bc9ad0ec46fabbf1c3d687e3d42e06febc0742d47b6cd47effdc2153b259e6146e6bd397c1b", 0x2e) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x4000000000000002, 0x3) ioctl$FS_IOC_GETFSLABEL(r2, 0x400452c8, &(0x7f0000000100)) r3 = syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x20000) setsockopt$TIPC_DEST_DROPPABLE(r3, 0x10f, 0x81, &(0x7f00000004c0)=0x1, 0x4) r4 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x616, 0x0) ioctl$PPPIOCGFLAGS1(r4, 0x8004745a, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000500)={0x0, 0x8}, &(0x7f0000000540)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000580)={r5, @in6={{0xa, 0x4e20, 0x3, @local, 0x2}}}, &(0x7f0000000640)=0x84) accept4$netrom(r4, &(0x7f0000000400)={{0x3, @netrom}, [@null, @default, @remote, @remote, @null, @default, @default, @default]}, &(0x7f0000000380)=0x48, 0x80800) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) close(r0) ioctl$TIOCGWINSZ(r4, 0x5413, &(0x7f00000003c0)) ioctl$DRM_IOCTL_MODE_GETCRTC(r4, 0xc06864a1, 0xfffffffffffffffd) 03:43:49 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0xa}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 922.199065] CUSE: unknown device info "" [ 922.214282] CUSE: zero length info key specified [ 922.263648] CUSE: unknown device info "" [ 922.293241] CUSE: zero length info key specified 03:43:49 executing program 0: gettid() clock_nanosleep(0x2, 0x0, &(0x7f00000000c0)={0x77359400}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1000000000016) tkill(r0, 0x10) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000100)) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x400200, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x20, &(0x7f0000000080)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000140)=0xffffffffffffff2c) r5 = fcntl$dupfd(r3, 0x426, r2) fcntl$setstatus(r3, 0x4, 0x2000) write$binfmt_misc(r5, &(0x7f00000001c0)={'syz0', "b849fca0411c4e1c6dcf67c458fb1fc6eca18dd2561dae27a48362253304ddcd985aaae2af407bcc87fb5822ac5c2251ab44a5c6ad913f6f1d69fbee69363620f9589d01161e4c53185a3d88f951af68e1ac36cb02624cd06e8b7c91933c6b47"}, 0x64) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={r4, 0x8}, 0x8) 03:43:49 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0xb}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:49 executing program 4: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x8000007f}, 0xff3e) r0 = socket(0x13, 0x801, 0x3) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000001}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000801}, 0x8000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0}]) 03:43:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000200)) close(0xffffffffffffffff) r2 = open(&(0x7f0000000140)='./file0\x00', 0x4883, 0x2) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000180)={0x0, 0x7fffffff}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000300)={r3, 0x10001}, 0x8) [ 922.702095] IPVS: ftp: loaded support on port[0] = 21 03:43:49 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x0, 0x0, 0x11000000]}, &(0x7f0000000000)=0x54) 03:43:49 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x7000000, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:49 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) write$P9_RREAD(r0, &(0x7f0000000380)={0xd2, 0x75, 0x1, {0xc7, "158d2996c5aeabd808f0987b8329992a471ffe098e0298c166e850558e4af4f230461bd47eec6cb9e90878d93736255229be8902cb5d5149de0917b934d508603a17b966fcb24a7aa481b3b6209b92840028e8a43a1ee46c204435578b395a4bd4301386cd3fa3991dbf6a98b5bba256132a66d4db9fc207dd0ebadf2a34b453ed6cfc4511a6fb950030d7f0636445f918114c0934dd20d241981c6aa5b218f9a7602d43d11232e56056018523feddbd149c93173e4e7f05e46ba3673a8f3d30e9cadfd33b239b"}}, 0xd2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0xd52c, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000a40)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) write$P9_RGETATTR(r3, &(0x7f0000000200)={0xa0}, 0xa0) write$P9_RREADDIR(r3, &(0x7f0000000600)=ANY=[@ANYBLOB], 0x0) 03:43:49 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0xf}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:49 executing program 4: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x8000007f}, 0xff3e) r0 = socket(0x13, 0x801, 0x3) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000001}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000801}, 0x8000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0}]) [ 922.837879] CUSE: unknown device info "" [ 922.876920] CUSE: zero length info key specified [ 922.995476] CUSE: unknown device info "" 03:43:49 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x6, 0xa0000) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="8971db4ee3d6d80983e49b7cf11168e99eec31ebb6050339600800901ba658d7f3b1f67f8c40019b4f53f8bc5b3609b026a9fe2f1cb7791165c92f87dbf2496bb8bac6b161c57f36ca5a3993eb83e85bbe1fa0fc49fbc6a9e8cf0eb3ce7d72a31272f0d2b57ac2b656f0ba8576cf5d97bd306e4f48da52c727", 0x79) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000500)={'security\x00', 0x4, [{}, {}, {}, {}]}, 0x68) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00', 0x7, 0x4, 0x460, 0x238, 0x120, 0x238, 0x378, 0x378, 0x378, 0x4, &(0x7f0000000580), {[{{@uncond, 0xf0, 0x120}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x80000000, 0x870, 0x22, 0x2}}}, {{@arp={@empty, @empty, 0xff, 0x0, @mac=@broadcast, {[0xff, 0x72aa8cb49e08f06f, 0x0, 0xff]}, @empty, {[0x0, 0x0, 0xff, 0xff, 0xff, 0xff]}, 0x1, 0x4, 0xbbe, 0x54f, 0x7, 0x8, 'rose0\x00', 'ip6_vti0\x00', {}, {}, 0x0, 0x28}, 0xf0, 0x118}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@arp={@empty, @loopback, 0xff, 0x56f3be011c418643, @mac=@broadcast, {[0xff, 0x0, 0xff, 0x0, 0xff]}, @mac=@random="64b40a89c59d", {[0x0, 0x0, 0x0, 0xff, 0xff, 0xff]}, 0x3ff, 0x8, 0x9, 0x200, 0x8, 0x100000001, 'ip6gre0\x00', 'hsr0\x00', {0xff}, {}, 0x0, 0x100}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @broadcast, @local, 0xf}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4b0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r2, 0x400452c8, &(0x7f0000000300)) close(0xffffffffffffffff) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') ioctl$SIOCAX25OPTRT(r0, 0x89e7, &(0x7f0000000480)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2, 0x44}) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f00000004c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES16=r3, @ANYBLOB="080026bd7000fcdbdf25030000003c00090008000100feffffff080001004406000008000100ffffffff08000200050000000800010002000000080001000900000008000200000000000c000700080002000000000014000100080003009521000008000300008000001400090008000200000000000800010000000000"], 0x84}, 0x1, 0x0, 0x0, 0x40}, 0x24004814) connect$inet(r1, &(0x7f0000000200)={0x2, 0x4e22, @loopback}, 0x10) 03:43:49 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:49 executing program 4: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x8000007f}, 0xff3e) r0 = socket(0x13, 0x801, 0x3) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000001}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000801}, 0x8000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0}]) [ 923.042190] IPVS: ftp: loaded support on port[0] = 21 [ 923.048907] CUSE: zero length info key specified 03:43:50 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x8000000, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:50 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) write$P9_RREAD(r0, &(0x7f0000000380)={0xd2, 0x75, 0x1, {0xc7, "158d2996c5aeabd808f0987b8329992a471ffe098e0298c166e850558e4af4f230461bd47eec6cb9e90878d93736255229be8902cb5d5149de0917b934d508603a17b966fcb24a7aa481b3b6209b92840028e8a43a1ee46c204435578b395a4bd4301386cd3fa3991dbf6a98b5bba256132a66d4db9fc207dd0ebadf2a34b453ed6cfc4511a6fb950030d7f0636445f918114c0934dd20d241981c6aa5b218f9a7602d43d11232e56056018523feddbd149c93173e4e7f05e46ba3673a8f3d30e9cadfd33b239b"}}, 0xd2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0xd52c, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000a40)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) write$P9_RGETATTR(r3, &(0x7f0000000200)={0xa0}, 0xa0) write$P9_RREADDIR(r3, &(0x7f0000000600)=ANY=[@ANYBLOB], 0x0) [ 923.204526] CUSE: unknown device info "" 03:43:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) r2 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000240)={0xc, 0x10, 0xe, 0x19, 0x1, 0x5, 0x4, 0x137, 0x1}) close(0xffffffffffffffff) [ 923.252712] CUSE: zero length info key specified [ 923.278555] CUSE: unknown device info "" [ 923.335299] CUSE: zero length info key specified [ 923.618966] IPVS: ftp: loaded support on port[0] = 21 03:43:50 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x0, 0x0, 0x88000000]}, &(0x7f0000000000)=0x54) 03:43:50 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x11}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:50 executing program 4: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x8000007f}, 0xff3e) r0 = socket(0x13, 0x801, 0x3) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000001}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000801}, 0x8000) io_setup(0x8, &(0x7f0000000040)=0x0) close(0xffffffffffffffff) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) 03:43:50 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0xc000000, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:50 executing program 0: syz_emit_ethernet(0x99, &(0x7f00000001c0)={@broadcast, @link_local, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @dev, @empty, @empty, @broadcast}}}}, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x200, 0x180) write$P9_RUNLINKAT(r0, &(0x7f0000000040)={0x7, 0x4d, 0x1}, 0x7) ioctl$CAPI_CLR_FLAGS(r0, 0x80044325, &(0x7f0000000080)) 03:43:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000200)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212ce29b88deda57295605ca6ac29579996ed371d9a45528ba8c85f0a2a7bb2b57cf60fa05b6d57e6bced7836c72f3ffa6ee07803f2974e201157fa7ae61dea986347620116b2e5dd1cc7f4f603cef4abd92fe9b6f8bca6c302d5cb2e1d81e9701c6af689c7102287a4bc37a0f5da43aef96e0000000000000000000000000000", 0x194, 0xfffffffffffffffb, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) setsockopt$ax25_SO_BINDTODEVICE(r1, 0x101, 0x19, &(0x7f0000000000)=@netrom={'nr', 0x0}, 0x10) close(0xffffffffffffffff) [ 923.783445] CUSE: unknown device info "" [ 923.803620] CUSE: zero length info key specified 03:43:50 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x12}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:50 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x24) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000400)={0x0, 0x9, 0x80, [], &(0x7f00000003c0)=0x6}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r2, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) ioctl$KDENABIO(r0, 0x4b36) r3 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0xfffffffffffffffc, 0x200180) ioctl$RTC_WIE_OFF(r3, 0x7010) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r3, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80040402}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r4, 0x400, 0x70bd2c, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x9}}, ["", "", "", "", "", "", ""]}, 0x24}}, 0x4000) 03:43:50 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) connect$pptp(r1, &(0x7f00000003c0)={0x18, 0x2, {0x2, @multicast1}}, 0x1e) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) recvmmsg(r1, &(0x7f0000004900)=[{{&(0x7f0000000440)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000680)=[{&(0x7f00000004c0)=""/214, 0xd6}, {&(0x7f00000005c0)=""/179, 0xb3}, {&(0x7f0000000a00)=""/4096, 0x1000}], 0x3}, 0x6}, {{&(0x7f00000006c0)=@ipx, 0x80, &(0x7f0000000780)=[{&(0x7f0000000740)}, {&(0x7f0000000840)=""/196, 0xc4}], 0x2, &(0x7f0000001a00)=""/244, 0xf4}, 0x6}, {{0x0, 0x0, &(0x7f0000002cc0)=[{&(0x7f0000001b00)=""/4096, 0x1000}, {&(0x7f0000002b00)=""/203, 0xcb}, {&(0x7f00000007c0)=""/43, 0x2b}, {&(0x7f0000000940)=""/74, 0x4a}, {&(0x7f0000002c00)=""/9, 0x9}, {&(0x7f0000002c40)=""/120, 0x78}], 0x6, &(0x7f0000002d40)=""/90, 0x5a}, 0x100000001}, {{&(0x7f0000002dc0)=@isdn, 0x80, &(0x7f0000003140)=[{&(0x7f0000002e40)=""/198, 0xc6}, {&(0x7f0000002f40)=""/179, 0xb3}, {&(0x7f0000003000)=""/64, 0x40}, {&(0x7f0000003040)=""/130, 0x82}, {&(0x7f0000003100)=""/33, 0x21}], 0x5}, 0x10001}, {{0x0, 0x0, &(0x7f0000003280)=[{&(0x7f00000031c0)=""/155, 0x9b}], 0x1}, 0x100}, {{&(0x7f00000032c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000003540)=[{&(0x7f0000003340)=""/173, 0xad}, {&(0x7f0000003400)=""/38, 0x26}, {&(0x7f0000003440)=""/245, 0xf5}], 0x3, &(0x7f0000003580)=""/62, 0x3e}}, {{&(0x7f00000035c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f00000038c0)=[{&(0x7f0000003640)=""/207, 0xcf}, {&(0x7f0000003740)=""/174, 0xae}, {&(0x7f0000003800)=""/165, 0xa5}], 0x3, &(0x7f0000003900)=""/4096, 0x1000}, 0xd7ae}], 0x7, 0x40002001, &(0x7f0000004ac0)) sendto$inet(r0, 0x0, 0x0, 0x200007fc, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f00000000c0)="1a8c443d3a568c81cc096aa87edab0f1b182da383fd71795f41053261e63b0b9f1283f7431b6146106716c21b43625f9194bf4b6a5dba53c46b82862a2f804121cda7e6be8fd507bb1545de629746d878f10be8036e98a270c42d6458f97b342303464e94ccb6d6f4f81941e3f3fa371596cdf17e160c992140c9dc81362f019f017", 0x82, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)=""/248, 0xf8}], 0x1}, 0x0) recvmsg(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000080)=""/47, 0x2f}], 0x1}, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000740)=0x5, 0x4) sendto$inet(r0, &(0x7f0000000180)="e8de7e2e9294d55beb0c705b3c8ae362fe60be817114efc48adf8a70e4d04d53ec942aaf3d610f6e9d872b647c9f4350068c0bdea24095c81c3163027e4803a0095bbb35cc2883efcb2dc48db1587d7583c516df2142eb65e8e97c646b5b42588a0c7e700959d07ee39c37c55420ccf5fefe6bf28aedd1453571e7dcbffd383986bce122a86ac9059cf58906b3defdd1180cb180b2c880d5a50553a40c74ce6b738754dabc7c0a866148aedfcb3f0b39b0c69eca64b9", 0xb6, 0x800, &(0x7f0000000340)={0x2, 0x4e21, @loopback}, 0x10) [ 923.864013] CUSE: unknown device info "" [ 923.875265] IPVS: ftp: loaded support on port[0] = 21 [ 923.882721] CUSE: zero length info key specified 03:43:50 executing program 4: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x8000007f}, 0xff3e) r0 = socket(0x13, 0x801, 0x3) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000001}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000801}, 0x8000) io_setup(0x8, &(0x7f0000000040)=0x0) close(0xffffffffffffffff) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) 03:43:50 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x10000000, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:50 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x13}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 924.142041] CUSE: unknown device info "" [ 924.161063] CUSE: zero length info key specified [ 924.516459] IPVS: ftp: loaded support on port[0] = 21 03:43:51 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0xf0}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) exit(0x7) 03:43:51 executing program 4: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x8000007f}, 0xff3e) r0 = socket(0x13, 0x801, 0x3) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000001}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000801}, 0x8000) io_setup(0x8, &(0x7f0000000040)=0x0) close(0xffffffffffffffff) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) 03:43:51 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x20000000, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:51 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x0, 0x0, 0x100000000000000]}, &(0x7f0000000000)=0x54) 03:43:51 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="95002000000000000000060000000000000000f6ff000000"], &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x19\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xcdV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0xc3, &(0x7f0000000300)=""/195, 0x0, 0x4}, 0x48) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) [ 924.720571] CUSE: unknown device info "" 03:43:51 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x1, 0x2) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=@newlink={0x3c, 0x10, 0x707, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0xc, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0xc001}]]}}}]}, 0xffffffffffffff3b}}, 0x4) r1 = socket(0x10, 0x100000000080002, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000080)={'nat\x00'}, &(0x7f0000000100)=0x78) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x17, &(0x7f0000000100)}], 0x49249249249293a, 0x0) 03:43:51 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x300}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 924.762105] CUSE: zero length info key specified [ 924.779302] CUSE: unknown device info "" [ 924.792347] IPVS: ftp: loaded support on port[0] = 21 [ 924.793850] CUSE: zero length info key specified 03:43:51 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x60000000, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:51 executing program 4: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x8000007f}, 0xff3e) socket(0x13, 0x801, 0x3) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 03:43:51 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vfio/vfio\x00', 0x20200, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000002340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x54, r4, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x34, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfffffffffffffffb}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'irlan0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1e}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xe436}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f00000002c0)={0x0, 0x0, 0x2080, {0x80ffff00000000}, [], "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", "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"}) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r5, 0xc0a85352, &(0x7f0000000040)={{0x8, 0x7}, 'port1\x00', 0xe3, 0x14, 0x100000000, 0x7c, 0x4000000000000007, 0x2, 0x1, 0x0, 0x1, 0xff}) [ 924.976522] CUSE: unknown device info "" 03:43:51 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x500}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 925.000253] CUSE: zero length info key specified [ 925.032510] CUSE: unknown device info "" [ 925.071320] CUSE: zero length info key specified 03:43:52 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x600}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 925.463059] IPVS: ftp: loaded support on port[0] = 21 03:43:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:52 executing program 4: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x8000007f}, 0xff3e) socket(0x13, 0x801, 0x3) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 03:43:52 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 925.620776] CUSE: unknown device info "" [ 925.627817] CUSE: zero length info key specified 03:43:52 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x0, 0x0, 0x1100000000000000]}, &(0x7f0000000000)=0x54) 03:43:52 executing program 0: write(0xffffffffffffffff, &(0x7f0000000080)="91b700800000000000", 0xfffffffffffffdd1) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x4, 0x200000) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) epoll_create(0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) pause() epoll_create(0x5) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000140)="66b9810000400f322ed30cbad104ec660f38df2b0fe21526660ff85e503ede1b0f20c06635000000800f22c0b800088ec00fae470b", 0x35}], 0x1, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:43:52 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x900}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r1 = syz_open_dev$cec(&(0x7f0000000200)='/dev/cec#\x00', 0x2, 0x2) bind$vsock_dgram(r1, &(0x7f0000000240)={0x28, 0x0, 0x0, @host}, 0x10) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x3) ioctl$FS_IOC_GETFSLABEL(r2, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) ioctl$VIDIOC_G_AUDIO(r1, 0x80345621, &(0x7f0000000280)) [ 925.662466] CUSE: unknown device info "" [ 925.681726] CUSE: zero length info key specified 03:43:52 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:52 executing program 4: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x8000007f}, 0xff3e) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 03:43:52 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0xa00}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x101002, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r2, 0x400452c8, &(0x7f0000000100)) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0xa00, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r3, 0x54a1) close(0xffffffffffffffff) [ 925.859737] IPVS: ftp: loaded support on port[0] = 21 [ 925.896857] CUSE: unknown device info "" [ 925.935077] CUSE: zero length info key specified 03:43:52 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 925.986184] CUSE: unknown device info "" [ 926.049701] CUSE: zero length info key specified 03:43:53 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0xb00}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000200)="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", 0x289, 0x0, 0x0, 0xec) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:53 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x300000000000000, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 926.358194] CUSE: unknown device info "" [ 926.384350] CUSE: zero length info key specified [ 926.423219] CUSE: unknown device info "" [ 926.435679] CUSE: zero length info key specified [ 926.623243] IPVS: ftp: loaded support on port[0] = 21 03:43:53 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x0, 0x0, 0x8800000000000000]}, &(0x7f0000000000)=0x54) 03:43:53 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 03:43:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x10400) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f0000000280)=0x10) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r2, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:53 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0xc5f}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:53 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:53 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) close(r1) r3 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7f, 0x2) ioctl$TIOCGWINSZ(r3, 0x5413, &(0x7f0000000080)) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000040)=0x1) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000100), &(0x7f0000000140)=0x4) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f000001e000/0x18000)=nil, 0x0, 0xf2, 0x0, 0x0, 0x0) 03:43:53 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0xf00}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 926.848062] CUSE: unknown device info "" [ 926.852253] CUSE: zero length info key specified [ 926.884828] IPVS: ftp: loaded support on port[0] = 21 03:43:53 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 03:43:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) readlinkat(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/116, 0x74) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:53 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) r2 = geteuid() lstat(&(0x7f0000000640)='./bus\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r1, &(0x7f0000000740)={0xa0, 0x19, 0x1, {0x2000, {0x0, 0x1, 0x1}, 0x142, r2, r3, 0x4, 0xaa0, 0x4d62, 0x6, 0x3f, 0x43e3, 0x3, 0x9, 0x3, 0x9, 0x101, 0xffff, 0x6, 0x5, 0xfffffffffffff800}}, 0xa0) r4 = perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa00000400, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r4, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000000400)=0xe8) setresuid(r5, r7, r5) r8 = getuid() syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000180)="113fb3e437480265ed8dc8d44a94cb1903b56d70830a22198194fe69a6fea2ae4e396fa404e22734e8926a6faac9c28d628856d5835859a31743147bf1431345d696b2662b96599b554cd52b51715d9bc0bd769bc4f6adb1872368b140f57d3b44aa9e31c1c28c2e60cdeef6ea73efd50dab4fd25680da6ade4c34f1f210d3d52f247ac3af21f3ce61e266add871ce6988c038c7df0d1fa6d2cca2", 0x9b, 0x4}], 0x1000080, &(0x7f0000000440)={[{@gid={'gid', 0x3d, r6}}, {@dir_umask={'dir_umask', 0x3d, 0x7fffffff}}, {@dir_umask={'dir_umask', 0x3d, 0xab}}, {@creator={'creator', 0x3d, "a48d73ba"}}, {@creator={'creator', 0x3d, "75bc0b06"}}], [{@context={'context', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@fowner_lt={'fowner<', r7}}, {@subj_role={'subj_role', 0x3d, '-'}}, {@obj_user={'obj_user', 0x3d, 'rpc_pipefs\x00'}}, {@fowner_lt={'fowner<', r8}}]}) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) accept4$vsock_stream(r1, &(0x7f0000000540)={0x28, 0x0, 0x2711, @reserved}, 0x10, 0x800) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) stat(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)) [ 926.933887] CUSE: unknown device info "" [ 926.944435] CUSE: zero length info key specified 03:43:53 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x500000000000000, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:54 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x1100}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 927.137073] hfs: unable to parse mount options [ 927.167728] CUSE: unknown device info "" [ 927.183655] rpcbind: RPC call returned error 22 [ 927.192126] CUSE: zero length info key specified [ 927.224377] hfs: unable to parse mount options [ 927.242372] CUSE: unknown device info "" [ 927.260009] CUSE: zero length info key specified [ 927.273586] rpcbind: RPC call returned error 22 [ 927.444178] IPVS: ftp: loaded support on port[0] = 21 03:43:54 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 03:43:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x3) tee(r0, r0, 0x2, 0xc) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) 03:43:54 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x1200}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:54 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1d}, 0x291) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0xffffff80, 0x2f, 0x1a0}}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000140)={{{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000340)={{{@in=@multicast1, @in=@local, 0x4e20, 0x3, 0x4e20, 0x6, 0xa, 0x20, 0xa0, 0x0, r2, r3}, {0x6, 0x8000, 0x3f, 0x100000000, 0x100, 0x5, 0x6, 0x4}, {0x0, 0x7ff, 0x7f, 0x7fff}, 0x8, 0x0, 0x0, 0x1, 0x1, 0x3}, {{@in6=@rand_addr="4eddb694ded1a62fb1a12332ea7cc6eb", 0x4d4, 0x7e}, 0xa, @in=@remote, 0x3506, 0x2, 0x3, 0xf397, 0x100000001, 0x100, 0x9e}}, 0xe8) 03:43:54 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x0, 0x0, 0x0, 0x11]}, &(0x7f0000000000)=0x54) 03:43:54 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x600000000000000, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:54 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x1300}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 927.547681] CUSE: unknown device info "" [ 927.566547] CUSE: zero length info key specified [ 927.581956] IPVS: ftp: loaded support on port[0] = 21 03:43:54 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vfio/vfio\x00', 0x624100, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000340)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000003c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000280)=[{0x19, 0x0, [0x1ff, 0x5, 0x8, 0x7, 0x1, 0x7, 0x40, 0x1, 0xffff, 0xfffffffffffffff8, 0x6fc2, 0x5a72c21c, 0x9, 0x0, 0x40, 0x7]}, {0x2, 0x0, [0x0, 0x5, 0x100000000, 0x9, 0x92d, 0x217, 0x80, 0x0, 0x4, 0x6, 0x5852, 0x100, 0xaa, 0x3f, 0xd4, 0x7]}], r1, 0x1, 0x1, 0x90}}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r2, 0x400452c8, &(0x7f0000000100)) ioctl$int_out(r3, 0x2, &(0x7f0000000200)) fcntl$getflags(r2, 0x409) close(0xffffffffffffffff) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x7ff, 0x8}, 0xc) fadvise64(r4, 0x0, 0xfffffffffffffffe, 0x7) 03:43:54 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) write$P9_RMKDIR(r0, &(0x7f0000000100)={0x14, 0x49, 0x1, {0xc5, 0x0, 0x5}}, 0x14) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f00000002c0)=0xc) rt_sigqueueinfo(r4, 0x2b, &(0x7f0000000300)={0x1a, 0x3, 0x3}) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, &(0x7f0000000140)="360f303e0f01df6766c7442400000000006766c7442402020000006766c744240600000000670f011c240f20c06635200000000f22c0263356470f0764f30f2a342e260f0f970a008e0f08660f5808", 0x4f}], 0x1, 0x0, &(0x7f0000000200), 0x0) accept4$llc(r0, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x10, 0x0) socket$inet(0x2b, 0x1, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x11a, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000000), &(0x7f0000000080)=0x8) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) r5 = shmget$private(0x0, 0x1000, 0x100, &(0x7f0000483000/0x1000)=nil) shmat(r5, &(0x7f0000ffb000/0x2000)=nil, 0x4000) r6 = shmget(0x0, 0x3000, 0x54000000, &(0x7f00002a2000/0x3000)=nil) r7 = shmget(0x3, 0x1000, 0x4, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_LOCK(r7, 0xb) r8 = shmget$private(0x0, 0x1000, 0x7e, &(0x7f000088d000/0x1000)=nil) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) shmctl$SHM_UNLOCK(r8, 0xc) mlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) shmctl$SHM_UNLOCK(r6, 0xc) [ 927.608182] CUSE: unknown device info "" [ 927.618062] CUSE: zero length info key specified 03:43:54 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x700000000000000, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:54 executing program 4: socketpair$unix(0x1, 0x3, 0x0, 0x0) io_setup(0x8, &(0x7f0000000040)=0x0) close(0xffffffffffffffff) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) [ 927.823985] CUSE: unknown device info "" [ 927.831627] CUSE: zero length info key specified 03:43:54 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x5f0c}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:54 executing program 4: socketpair$unix(0x1, 0x3, 0x0, 0x0) io_setup(0x8, &(0x7f0000000040)=0x0) close(0xffffffffffffffff) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) [ 928.007122] CUSE: unknown device info "" [ 928.016609] CUSE: zero length info key specified 03:43:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000200)) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:55 executing program 4: socketpair$unix(0x1, 0x3, 0x0, 0x0) io_setup(0x8, &(0x7f0000000040)=0x0) close(0xffffffffffffffff) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) 03:43:55 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x7e8e}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 928.371879] IPVS: ftp: loaded support on port[0] = 21 03:43:55 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x0, 0x0, 0x0, 0x88]}, &(0x7f0000000000)=0x54) 03:43:55 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:55 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) write$P9_RMKDIR(r0, &(0x7f0000000100)={0x14, 0x49, 0x1, {0xc5, 0x0, 0x5}}, 0x14) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f00000002c0)=0xc) rt_sigqueueinfo(r4, 0x2b, &(0x7f0000000300)={0x1a, 0x3, 0x3}) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, &(0x7f0000000140)="360f303e0f01df6766c7442400000000006766c7442402020000006766c744240600000000670f011c240f20c06635200000000f22c0263356470f0764f30f2a342e260f0f970a008e0f08660f5808", 0x4f}], 0x1, 0x0, &(0x7f0000000200), 0x0) accept4$llc(r0, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x10, 0x0) socket$inet(0x2b, 0x1, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x11a, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000000), &(0x7f0000000080)=0x8) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) r5 = shmget$private(0x0, 0x1000, 0x100, &(0x7f0000483000/0x1000)=nil) shmat(r5, &(0x7f0000ffb000/0x2000)=nil, 0x4000) r6 = shmget(0x0, 0x3000, 0x54000000, &(0x7f00002a2000/0x3000)=nil) r7 = shmget(0x3, 0x1000, 0x4, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_LOCK(r7, 0xb) r8 = shmget$private(0x0, 0x1000, 0x7e, &(0x7f000088d000/0x1000)=nil) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) shmctl$SHM_UNLOCK(r8, 0xc) mlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) shmctl$SHM_UNLOCK(r6, 0xc) 03:43:55 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x0, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 03:43:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(r1) 03:43:55 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x8100}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 928.713016] IPVS: ftp: loaded support on port[0] = 21 03:43:55 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x0, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 928.738935] CUSE: unknown device info "" [ 928.746988] CUSE: zero length info key specified 03:43:55 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x0, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 928.834299] CUSE: unknown device info "" [ 928.838482] CUSE: zero length info key specified 03:43:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x9, 0x8000) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000240)=[@sack_perm, @mss={0x2, 0x7}], 0x2) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r2, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:55 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x8e7e}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:55 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:55 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, 0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 929.140679] CUSE: unknown device info "" [ 929.158676] CUSE: zero length info key specified [ 929.230372] CUSE: unknown device info "" [ 929.243815] CUSE: zero length info key specified [ 929.360777] IPVS: ftp: loaded support on port[0] = 21 03:43:56 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x0, 0x0, 0x0, 0x1100]}, &(0x7f0000000000)=0x54) 03:43:56 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, 0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 03:43:56 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0xf000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:56 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:56 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:56 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x97, 0x0, 0xffffffffffffffff, 0x11, [0x7, 0x1100, 0x0, 0x0, 0x320]}, 0x2c) mknod(&(0x7f0000000200)='./file0\x00', 0x1020, 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x100008002) tkill(r1, 0x1b) ioctl$KVM_PPC_GET_PVINFO(r0, 0x4080aea1, &(0x7f0000000040)=""/137) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:43:56 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, 0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 03:43:56 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x34000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 929.679896] CUSE: unknown device info "" [ 929.684236] CUSE: zero length info key specified [ 929.690851] IPVS: ftp: loaded support on port[0] = 21 [ 929.717271] CUSE: unknown device info "" 03:43:56 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setopts(0x3, r1, 0x0, 0x100000000a07000) [ 929.743869] CUSE: zero length info key specified 03:43:56 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(0xffffffffffffffff) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 03:43:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:56 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 929.990490] CUSE: unknown device info "" [ 929.995799] CUSE: zero length info key specified [ 930.037945] CUSE: unknown device info "" [ 930.048938] CUSE: zero length info key specified [ 930.170672] IPVS: ftp: loaded support on port[0] = 21 03:43:57 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x0, 0x0, 0x0, 0x8800]}, &(0x7f0000000000)=0x54) 03:43:57 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x9, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x2e0200, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x40000000}) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x9, 0x420400) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") ioctl$sock_inet_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) r3 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) poll(&(0x7f00000002c0)=[{r3}], 0x1, 0x2) 03:43:57 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x400300}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x31, 0x0, 0x300) r2 = socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f00000001c0)) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r3, &(0x7f0000000440)="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", 0xfffffffffffffd21, 0x1fffffffffffc, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) fsetxattr$trusted_overlay_origin(r2, &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x3) ioctl$FS_IOC_GETFSLABEL(r4, 0x400452c8, &(0x7f0000000200)) close(0xffffffffffffffff) 03:43:57 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(0xffffffffffffffff) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 03:43:57 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) socket$vsock_dgram(0x28, 0x2, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/mixer\x00', 0x20001, 0x0) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f00000002c0)) close(0xffffffffffffffff) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x101000, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r3, 0xc0045540, &(0x7f0000000240)=0x6) 03:43:57 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0xf0ffff}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:57 executing program 0: bind$ax25(0xffffffffffffffff, &(0x7f00000000c0)={{0x3, @remote, 0x1}, [@null, @netrom, @netrom, @null, @netrom, @rose, @default, @default]}, 0x48) [ 930.290975] CUSE: unknown device info "" [ 930.300023] CUSE: zero length info key specified [ 930.311172] IPVS: ftp: loaded support on port[0] = 21 [ 930.315538] CUSE: unknown device info "" [ 930.321412] CUSE: zero length info key specified 03:43:57 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000, {0x0, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:57 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(0xffffffffffffffff) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 03:43:57 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$TCSETSW(r0, 0x40085112, 0x0) [ 930.571228] CUSE: unknown device info "" [ 930.619675] CUSE: zero length info key specified [ 930.634925] CUSE: unknown device info "" [ 930.665934] CUSE: zero length info key specified [ 930.890308] IPVS: ftp: loaded support on port[0] = 21 03:43:57 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x0, 0x0, 0x0, 0x1000000]}, &(0x7f0000000000)=0x54) 03:43:57 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:57 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 03:43:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) r2 = creat(&(0x7f0000000200)='./file0\x00', 0x24) ioctl$BLKBSZGET(r2, 0x80081270, &(0x7f0000000240)) close(0xffffffffffffffff) 03:43:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x40001000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r1, &(0x7f00000005c0), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000080), 0x1d0) close(r1) 03:43:57 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 931.096679] CUSE: unknown device info "" [ 931.101197] CUSE: zero length info key specified [ 931.122621] CUSE: unknown device info "" 03:43:58 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 931.144207] CUSE: zero length info key specified 03:43:58 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 03:43:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) sendto$inet6(r1, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r2, 0x400452c8, &(0x7f0000000100)) r3 = dup2(r0, r2) ioctl$EVIOCRMFF(r3, 0x40044581, &(0x7f0000000200)=0x2) ioctl$SG_GET_RESERVED_SIZE(r3, 0x2272, &(0x7f0000000240)) close(0xffffffffffffffff) 03:43:58 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x3, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:43:58 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x3000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:58 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 931.346933] CUSE: unknown device info "" [ 931.376504] CUSE: zero length info key specified [ 931.412792] CUSE: unknown device info "" [ 931.438558] CUSE: zero length info key specified 03:43:59 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x0, 0x0, 0x0, 0x11000000]}, &(0x7f0000000000)=0x54) 03:43:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="ee0adc1f123c163f3188b0") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) 03:43:59 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:43:59 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x4, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 932.403847] CUSE: unknown device info "" [ 932.423530] CUSE: zero length info key specified [ 932.462336] CUSE: unknown device info "" [ 932.476992] CUSE: zero length info key specified [ 933.301462] IPVS: ftp: loaded support on port[0] = 21 [ 933.304191] IPVS: ftp: loaded support on port[0] = 21 03:44:04 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x5000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:04 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 03:44:04 executing program 1: r0 = socket$caif_seqpacket(0x25, 0x5, 0x5) flock(r0, 0xd) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x400, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000240)=0x1) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x400452c8, &(0x7f0000000100)) close(r0) 03:44:04 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:04 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x101) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDGKBMETA(r2, 0x4b62, 0x0) pipe2(0x0, 0x0) sendto(r1, &(0x7f0000000140)="4234f4ead9b780c236a56296d98487417c719748b00b115387c1ff7088db2c4f978cb50400c7775c2fdf16daa1129f995dafce836d87ec98125229498c74565a9b9fbb9a1a8af9394e9005bac3a7e9c675c9f112e80ec56ec6f90ffe0dcf0fd86f99879f2ec8763d6b6b62ef87f01d7d557d80ab4009c22804cb3511d6ee09bf", 0x80, 0x4004000, &(0x7f00000001c0)=@nfc={0x27, 0x0, 0x1, 0x6}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getpid() sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) set_thread_area(0x0) close(r0) accept4(r1, 0x0, &(0x7f0000000000), 0x0) recvmmsg(r0, &(0x7f0000008d80)=[{{&(0x7f0000004b80)=@nl, 0xfe64, &(0x7f00000003c0)=[{&(0x7f00000002c0)=""/212}], 0x0, &(0x7f0000006140)=""/105, 0x69}}], 0x8000000000003bf, 0x2, 0x0) 03:44:04 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x0, 0x0, 0x0, 0x88000000]}, &(0x7f0000000000)=0x54) 03:44:04 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x6000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 937.212376] CUSE: unknown device info "" [ 937.222869] CUSE: zero length info key specified [ 937.225102] IPVS: ftp: loaded support on port[0] = 21 [ 937.248862] CUSE: unknown device info "" [ 937.267833] CUSE: zero length info key specified 03:44:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x8, 0x444200) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000240)={0x3, @pix={0xffff, 0x7fffffff, 0x4745504a, 0x5, 0x2, 0x2134, 0x7, 0x4, 0x1, 0x2, 0x3, 0xbf7f151bd2acb975}}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r2, 0x400452c8, &(0x7f0000000100)) openat$full(0xffffffffffffff9c, &(0x7f0000000380)='/dev/full\x00', 0x400000, 0x0) close(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') 03:44:04 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 03:44:04 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 937.382478] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:44:04 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 937.504062] CUSE: unknown device info "" [ 937.524825] CUSE: zero length info key specified 03:44:04 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x9000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:04 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 03:44:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0xa4185796b133bebc, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000200)={0x1, 0x3e000000000}, 0x8) [ 937.583682] CUSE: unknown device info "" [ 937.602940] CUSE: zero length info key specified 03:44:04 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x101) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x0, 0x0, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDGKBMETA(r2, 0x4b62, 0x0) pipe2(0x0, 0x0) sendto(r1, &(0x7f0000000140)="4234f4ead9b780c236a56296d98487417c719748b00b115387c1ff7088db2c4f978cb50400c7775c2fdf16daa1129f995dafce836d87ec98125229498c74565a9b9fbb9a1a8af9394e9005bac3a7e9c675c9f112e80ec56ec6f90ffe0dcf0fd86f99879f2ec8763d6b6b62ef87f01d7d557d80ab4009c22804cb3511d6ee09bf", 0x80, 0x4004000, &(0x7f00000001c0)=@nfc={0x27, 0x0, 0x1, 0x6}, 0x80) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getpid() sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) set_thread_area(0x0) close(r0) accept4(r1, 0x0, &(0x7f0000000000), 0x0) recvmmsg(r0, &(0x7f0000008d80)=[{{&(0x7f0000004b80)=@nl, 0xfe64, &(0x7f00000003c0)=[{&(0x7f00000002c0)=""/212}], 0x0, &(0x7f0000006140)=""/105, 0x69}}], 0x8000000000003bf, 0x2, 0x0) 03:44:04 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x7, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x4000000000003, 0x3) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000240)={{0x2, 0x0, 0x345, 0x2, 0x7fff}, 0x1, 0x5, 'id1\x00', 'timer1\x00', 0x0, 0x7fff, 0x1, 0x5, 0x9}) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) setsockopt(r2, 0x36e8, 0x3, &(0x7f0000000340)="ce8849c704abedc42520fbac908733abf9f1f8f3d4043daf33170961d4668b9abd115be9edc8df6eec98d2e8952dfe26914223d9c6a74be16693ebfa", 0xfffffffffffffeef) close(0xffffffffffffffff) [ 937.842718] CUSE: unknown device info "" [ 937.864074] CUSE: zero length info key specified [ 937.893326] CUSE: unknown device info "" [ 937.907789] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 937.939107] CUSE: zero length info key specified [ 938.049022] IPVS: ftp: loaded support on port[0] = 21 03:44:05 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x0, 0x0) 03:44:05 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0xa000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) fstatfs(r0, &(0x7f0000000200)=""/154) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000000300)={0x96, 0x1, 0x401, 0xe69e}, 0x10) close(0xffffffffffffffff) 03:44:05 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x8, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:05 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, &(0x7f0000000000)=0x54) 03:44:05 executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000006000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x400, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r2, 0x4008af14, &(0x7f0000000040)={0x3, 0x10001}) ioctl$LOOP_SET_CAPACITY(r2, 0x4c07) r3 = gettid() rt_sigprocmask(0x0, &(0x7f0000057ff8)={0xfffffffffffffffe}, 0x0, 0x8) timer_create(0x3, &(0x7f000049efa0)={0x0, 0x14, 0x4, @tid=r3}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f00009c8000)={{}, {0x0, 0x9}}, 0x0) ioctl$KDADDIO(r2, 0x4b34, 0x1) [ 938.415378] CUSE: unknown device info "" 03:44:05 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0xb000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 938.445900] CUSE: zero length info key specified [ 938.484840] IPVS: ftp: loaded support on port[0] = 21 03:44:05 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x13, &(0x7f0000000040)=',(/em0({}security+\x00'}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000100)=':!') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000080)=r0, 0x4) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x5a) close(r2) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000140)={0x0, 0x0}) r4 = getpid() r5 = perf_event_open(&(0x7f0000000240)={0x1000002, 0xfffffffffffffe41, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, r4, 0x0, 0xffffffffffffffff, 0x0) msgget(0x1, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080), 0x0}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000540)='sit0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f0, &(0x7f0000000140)='sit0\x00') sendmsg(r6, &(0x7f0000003a00)={0x0, 0x0, &(0x7f00000039c0)=[{&(0x7f00000038c0)="967cd8b02bcfdb2b0e1af281874d4605ae447c5a4aa65fcbf4a34454711d87ae82065a87e6611f14f00cf067021c58cad893f47fc9ee9a2a8e73b37a3f364bba01c40acf6da57d3e7b5ab9f644b65918ee9897d73a9a607b1bb67c001148d9f480ff2aeaf35d23afa0d5f1df8c65a58b474007ac844a9f051476d0cf5d4bd0de8236711d18367787c222defc43aef826f39d269bc661d72e5b90ef3581ae97dd725a7e765b90895b0e699c3289744119c2465ee778f800e8c535b4b4c3aa69b8308b0111b3dfe07eedaacd16bbeba8e901d5dc9e84afddc43e8c53f362768480ef70", 0xe2}], 0x1, 0x0, 0x0, 0x40080}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398417f1a}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r6, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)=r8, 0x4) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x0) socketpair(0xd, 0x0, 0x81, &(0x7f0000000180)) perf_event_open(&(0x7f0000000440)={0x7, 0x70, 0x0, 0xfd7, 0xffffffff, 0x401, 0x0, 0x2, 0x8, 0x8, 0x3, 0x2, 0xffffffffffffa37a, 0x40b, 0x10000000, 0xb, 0x80000000, 0xe6, 0x8, 0xfffffffffffffffc, 0xb3, 0x3c3, 0x2, 0x20, 0xffff, 0x8, 0x9, 0x0, 0x1, 0xa3dc, 0x2, 0x1, 0xff, 0x20, 0x1, 0x59bf, 0x2, 0x32, 0x0, 0x3f, 0x2, @perf_bp={&(0x7f0000000400), 0x2}, 0x34820, 0x3f, 0x0, 0x4, 0x401, 0x2, 0x3}, r4, 0x3, r7, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f1, &(0x7f0000000140)='sit0\x00') ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x6) recvmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) [ 938.497465] CUSE: unknown device info "" 03:44:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) modify_ldt$read_default(0x2, &(0x7f0000000200)=""/149, 0x95) 03:44:05 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x0, 0x0) [ 938.551690] CUSE: zero length info key specified 03:44:05 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0xf000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:05 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0xc, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000200)={'vlan0\x00', 0xffffffffffffff80}) r2 = getpgid(0x0) fcntl$lock(r1, 0x26, &(0x7f0000000240)={0x2, 0x7, 0x4, 0x5, r2}) close(r1) 03:44:05 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x0, 0x0) [ 938.817235] CUSE: unknown device info "" [ 938.821423] CUSE: zero length info key specified [ 938.836590] CUSE: unknown device info "" [ 938.864996] CUSE: zero length info key specified 03:44:05 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:05 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x10, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 939.087161] CUSE: unknown device info "" [ 939.110763] CUSE: zero length info key specified [ 939.129030] CUSE: unknown device info "" [ 939.151285] CUSE: zero length info key specified [ 939.321132] IPVS: ftp: loaded support on port[0] = 21 03:44:06 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}, &(0x7f0000000000)=0x54) 03:44:06 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x0, &(0x7f0000000600)) 03:44:06 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x11000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6(0xa, 0x2, 0x1) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="113fc5586a3a5e0cd73475f70f6bc75f0d6d9cbbe74c099b0151ac538e61e6af01a9d1ed150fca63860203424f4a888becbbac4076833563b65b31145dab78f3b38dc53464c60e7f9cb37b4c911578e41908cbeaf4f53a37d8d29bf34eb0097d867504d4d9a89f1eec06b6c891cf96a6aedbd8e896008c0d24d6168f8400e71616fef95f5e9fdbfbe9ada203a75de4b76354c71f911b36333857fd", 0x9b, 0xfffffffffffffffa) r3 = add_key$user(&(0x7f0000000380)='user\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)="a3348db3db6763be0409633b4b42b9d62405397e78ac2536d97081018d17ec1333354dae12c52742af63f6bcc909f0e1df7af5e9c7c6b39b632b0e6e1783458346793643fdfec9e02cd82602aa72b1b8e94553ae19a11a0ec634588a945560365fc005fbc192b8d0266eebe36f050e4084a51dbcb29435be63083c7c29c61eed41a4d6ab3cc88a1844271c15f1d46d524f973ac25b800037ee56141c536b6867b77607d0028364d1a8ff26c853f5649d068f107e242270626ceaa6bb43ede04005e3e7e747cf45e30d757b5440644b12018153bd93109135d9117ed611c71f292352de4cbe1c62fa294c", 0xea, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000340)='rxrpc\x00', &(0x7f0000000500)=@keyring={'key_or_keyring:', r3}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r4, 0x400452c8, &(0x7f0000000100)) ioctl$DRM_IOCTL_MAP_BUFS(r4, 0xc0186419, &(0x7f0000001740)={0x3, &(0x7f0000000540)=""/4, &(0x7f00000016c0)=[{0x8, 0x1000, 0x9, &(0x7f0000000580)=""/4096}, {0x4, 0xa3, 0x4, &(0x7f0000001580)=""/163}, {0x401, 0x6f, 0x2, &(0x7f0000001640)=""/111}]}) r5 = dup(r1) ioctl$DRM_IOCTL_FREE_BUFS(r5, 0x4010641a, &(0x7f00000017c0)={0x4, &(0x7f0000001780)=[0x100, 0x6, 0x100, 0x9]}) close(0xffffffffffffffff) 03:44:06 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x60, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:06 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x12000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x1000, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000340)={0x0, 0x1, 0x6, @remote}, 0x10) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="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"], 0x1b0}, 0x1, 0x0, 0x0, 0x8000}, 0x10) [ 939.653704] IPVS: ftp: loaded support on port[0] = 21 03:44:06 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x0, &(0x7f0000000600)) [ 939.701594] CUSE: unknown device info "" [ 939.719191] CUSE: zero length info key specified [ 939.755490] CUSE: unknown device info "" [ 939.787949] CUSE: zero length info key specified 03:44:06 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x300, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) syz_open_dev$sndctrl(&(0x7f0000000240)='/dev/snd/controlC#\x00', 0x1ff, 0x10000) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x3) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x4, 0x800) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) 03:44:06 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x13000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:06 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x0, &(0x7f0000000600)) [ 940.027605] CUSE: unknown device info "" [ 940.078883] CUSE: zero length info key specified [ 940.137479] CUSE: unknown device info "" [ 940.151147] CUSE: zero length info key specified [ 940.352909] IPVS: ftp: loaded support on port[0] = 21 03:44:07 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [0x0, 0x0, 0x0, 0x0, 0x8800000000000000]}, &(0x7f0000000000)=0x54) 03:44:07 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x5f0c0000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:07 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[0x0]) 03:44:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) 03:44:07 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clock_gettime(0x2, &(0x7f0000000280)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000040), 0x0, &(0x7f00000002c0)={0x0, r2+30000000}, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f00000000c0)={0x77359400}, 0x10) wait4(0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xd8b, 0x402) setsockopt$inet_dccp_int(r3, 0x21, 0x10, &(0x7f0000000100)=0x6d, 0x4) accept4(r0, 0x0, 0x0, 0x0) tkill(r1, 0x23) unshare(0x8000000) ioctl$KVM_SET_GSI_ROUTING(r3, 0x4008ae6a, &(0x7f0000000140)={0x1, 0x0, [{0xb67, 0x1, 0x0, 0x0, @msi={0x100, 0x9, 0x100000001}}]}) r4 = mq_open(&(0x7f0000000080)='!selinuxselinux\x00', 0x8c2, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x5}) ftruncate(r4, 0x400000000000) 03:44:07 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x500, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 940.530221] CUSE: unknown device info "" [ 940.545267] CUSE: zero length info key specified [ 940.566512] IPVS: ftp: loaded support on port[0] = 21 03:44:07 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x81000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 940.592534] CUSE: unknown device info "" 03:44:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) syz_open_dev$video(&(0x7f0000000280)='/dev/video#\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000200)) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x400, 0x0) 03:44:07 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[0x0]) [ 940.615319] CUSE: zero length info key specified 03:44:07 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x600, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:07 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x8e7e0000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:07 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[0x0]) [ 940.820800] CUSE: unknown device info "" [ 940.829500] CUSE: zero length info key specified [ 940.867121] CUSE: unknown device info "" [ 940.879172] CUSE: zero length info key specified [ 941.154981] IPVS: ftp: loaded support on port[0] = 21 03:44:08 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x700, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) syz_open_dev$dmmidi(&(0x7f0000000300)='/dev/dmmidi#\x00', 0x5, 0x8200) r2 = syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0xdc, 0x391000) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) close(0xffffffffffffffff) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000240)=""/133, 0x85}, {&(0x7f0000000300)}, {&(0x7f0000000340)=""/24, 0x18}, {&(0x7f0000000380)=""/101, 0x65}, {&(0x7f0000000400)=""/167, 0xa7}, {&(0x7f00000004c0)=""/65, 0x41}], 0x6, 0x0) 03:44:08 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x9effffff}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:08 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x11]}, &(0x7f0000000000)=0x54) [ 941.253259] CUSE: unknown device info "" [ 941.283280] CUSE: zero length info key specified [ 941.311936] IPVS: ftp: loaded support on port[0] = 21 [ 941.317894] CUSE: unknown device info "" [ 941.330562] CUSE: zero length info key specified [ 941.555052] IPVS: ftp: loaded support on port[0] = 21 03:44:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r0, 0x5) listen(r0, 0x1f) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xbc, &(0x7f0000000000)=[@in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e22, 0x0, @mcast2, 0x66}, @in={0x2, 0x4e22, @local}, @in={0x2, 0x4e20, @multicast2}, @in6={0xa, 0x4e23, 0x2ec5, @empty, 0x6}, @in6={0xa, 0x4e23, 0x2, @dev={0xfe, 0x80, [], 0x25}, 0x5}, @in6={0xa, 0x4e20, 0x5, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x12}}, 0xffffffc000000000}, @in6={0xa, 0x4e22, 0x167d8cfa, @rand_addr="878052fe6a73944e6cd00dbad0794465", 0xffffffffffffffb0}]}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000200)={r1, @in={{0x2, 0x4e22, @loopback}}, 0x3, 0x7}, 0x90) 03:44:10 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 03:44:10 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0xf0ffffff}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r1 = open(&(0x7f0000000200)='./file0\x00', 0x4000, 0x20) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f0000000240)={0x0, 0x7}) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r2, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) 03:44:10 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0xc00, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:10 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x88]}, &(0x7f0000000000)=0x54) [ 943.552139] IPVS: ftp: loaded support on port[0] = 21 03:44:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x8600, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) [ 943.579629] CUSE: unknown device info "" [ 943.594205] CUSE: zero length info key specified [ 943.609351] CUSE: unknown device info "" [ 943.630150] CUSE: zero length info key specified 03:44:10 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0xfcffffff}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:10 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 03:44:10 executing program 0: socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000}, {}, {}, {}, {0x0, 0x0, 0x400}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28}) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) sendmsg$alg(0xffffffffffffffff, &(0x7f0000002800)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002580)=[@assoc={0x18}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x4}], 0x48}, 0x20000000) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, 0x0) write$P9_RCREATE(0xffffffffffffffff, 0x0, 0x0) 03:44:10 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x2000, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = creat(&(0x7f0000000200)='./file0\x00', 0x104) ioctl$PPPIOCSPASS(r2, 0x40107447, &(0x7f0000000280)={0x7, &(0x7f0000000240)=[{0x3, 0x100000001, 0x3f, 0xfffffffffffffffc}, {0x0, 0x0, 0x1, 0xfb75}, {0x8000, 0x5, 0x8, 0x10000}, {0x9, 0x1, 0x5}, {0x8001, 0x9, 0x7f, 0x5}, {0x5, 0x8, 0x7, 0x3}, {0x0, 0x7, 0x3, 0x8}]}) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/mixer\x00', 0x10c00, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000300)=0x800, 0x4) close(0xffffffffffffffff) 03:44:10 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0xfeffffff}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:10 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) [ 943.959655] CUSE: unknown device info "" [ 943.999137] CUSE: zero length info key specified 03:44:10 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0xfffff000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 944.046839] *** Guest State *** [ 944.050262] CR0: actual=0x0000000000050032, shadow=0x0000000000050012, gh_mask=fffffffffffffff7 [ 944.068110] CUSE: unknown device info "" [ 944.073861] CUSE: zero length info key specified 03:44:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r1 = accept4(r0, &(0x7f0000000200)=@sco, &(0x7f0000000280)=0x80, 0x80000) bind$vsock_dgram(r1, &(0x7f00000002c0)={0x28, 0x0, 0x2711, @reserved}, 0x10) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r2, 0x400452c8, &(0x7f0000000100)) select(0x40, &(0x7f0000000300)={0x8, 0x0, 0x7, 0x2, 0x4, 0x8000, 0x66a0000000000000, 0x6}, &(0x7f0000000340)={0x0, 0xfffffffffffff257, 0x4, 0x1, 0x1ff, 0xe089, 0xff, 0x3ff}, &(0x7f0000000380)={0x3, 0x3, 0xffff, 0x4, 0x8240, 0x7, 0x0, 0x3}, &(0x7f00000003c0)) close(0xffffffffffffffff) 03:44:11 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6000, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 944.144331] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 944.165388] CR3 = 0x0000000000000000 [ 944.211108] RSP = 0x0000000000000000 RIP = 0x0000000000008000 [ 944.243797] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 944.249957] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 944.309271] CUSE: unknown device info "" [ 944.329147] CUSE: zero length info key specified [ 944.364781] CUSE: unknown device info "" [ 944.383584] CS: sel=0x3000, attr=0x08093, limit=0xffffffff, base=0x0000000000030000 [ 944.383851] CUSE: zero length info key specified [ 944.392177] DS: sel=0x0000, attr=0x08093, limit=0xffffffff, base=0x0000000000000000 [ 944.435151] SS: sel=0x0000, attr=0x08093, limit=0xffffffff, base=0x0000000000000000 [ 944.463811] ES: sel=0x0000, attr=0x08093, limit=0xffffffff, base=0x0000000000000000 [ 944.471971] FS: sel=0x0000, attr=0x08093, limit=0xffffffff, base=0x0000000000000000 [ 944.485502] IPVS: ftp: loaded support on port[0] = 21 [ 944.491296] GS: sel=0x0000, attr=0x08093, limit=0xffffffff, base=0x0000000000000000 [ 944.501690] GDTR: limit=0x00000000, base=0x0000000000000000 [ 944.519220] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 944.529893] IDTR: limit=0x00000000, base=0x0000000000000000 [ 944.549793] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 944.563791] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 944.570379] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 944.591080] Interruptibility = 00000008 ActivityState = 00000000 [ 944.607713] *** Host State *** [ 944.617001] RIP = 0xffffffff811b36f0 RSP = 0xffff88807e89f8b8 [ 944.633095] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 944.656741] FSBase=00007fd59c1d1700 GSBase=ffff8880ae800000 TRBase=fffffe0000003000 [ 944.696635] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 944.702766] CR0=0000000080050033 CR3=000000005ba5a000 CR4=00000000001426f0 03:44:11 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x1100]}, &(0x7f0000000000)=0x54) 03:44:11 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) 03:44:11 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r0, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) 03:44:11 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0xffffff7f}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 944.760423] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff87201360 [ 944.771112] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 944.841105] *** Control State *** [ 944.854574] IPVS: ftp: loaded support on port[0] = 21 [ 944.870656] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 944.895859] EntryControls=0000d1ff ExitControls=002fefff [ 944.905953] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 944.931934] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 944.958025] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 944.976571] reason=80000021 qualification=0000000000000000 [ 944.989272] IDTVectoring: info=00000000 errcode=00000000 [ 945.003176] TSC Offset = 0xfffffe041bee61cf [ 945.012688] EPT pointer = 0x000000005735101e 03:44:11 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x200000, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x1, 0x0, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x8000000) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x4b564d01, 0x5]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x7, 0x0) ioctl$SIOCNRDECOBS(r3, 0x89e2) 03:44:11 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1000000, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) truncate(&(0x7f0000000200)='./file0\x00', 0x80000001) close(0xffffffffffffffff) 03:44:11 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0xffffff9e}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:11 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) 03:44:12 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0xfffffff0}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x80000, 0x0) mmap$xdp(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000000, 0x853, r2, 0x180000000) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) [ 945.193609] CUSE: unknown device info "" [ 945.197995] CUSE: zero length info key specified [ 945.222747] CUSE: unknown device info "" [ 945.255101] CUSE: zero length info key specified 03:44:12 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) [ 945.603871] IPVS: ftp: loaded support on port[0] = 21 03:44:12 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x8800]}, &(0x7f0000000000)=0x54) 03:44:12 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x2000000, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:12 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0xfffffffc}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:12 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x7, 0x1) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x8000, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000280)={0xf, 0xfffffffffffffff7, 0xc, 0x5, 0x10000}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r2 = syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x4000000240020) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendto$inet6(r2, &(0x7f0000000000)="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", 0x487, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0x4, 0x0) ioctl$RTC_PLL_SET(r0, 0x40207012, &(0x7f0000000340)={0x7fffffff, 0x80000000, 0x40, 0x2, 0xadff, 0x2, 0x9bb}) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000380)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000440)={{0x4, 0x7, 0x1, 0x400, 'syz0\x00', 0x8}, 0x2, 0x400, 0x100000000, r5, 0x9, 0x8, 'syz0\x00', &(0x7f00000003c0)=['mime_typeposix_acl_access}nodev\x00', '\x00', '$md5sum\x81\x00', '/proc/thread-self/attr/exec\x00', '/dev/snd/pcmC#D#p\x00', ',\x00', '/dev/snd/pcmC#D#p\x00', 'P\x00', 'q\x00'], 0x70, [], [0x9, 0x4, 0xe86, 0x8ed]}) ioctl$FS_IOC_GETFSLABEL(r3, 0x400452c8, &(0x7f0000000100)) close(r3) inotify_init() getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000580)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000680)=0xe8) getgroups(0x6, &(0x7f00000006c0)=[0x0, 0x0, 0xee00, 0xee00, 0xee01, 0x0]) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) write$FUSE_ENTRY(r4, &(0x7f0000000700)={0x90, 0x0, 0x1, {0x5, 0x0, 0xffffffff80000000, 0x9, 0x9, 0x4176, {0x3, 0x8, 0x4, 0x8, 0x8, 0x1, 0x3f, 0x0, 0x3728, 0x10001, 0x9, r6, r7, 0x1, 0x1ff}}}, 0x90) 03:44:12 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x1, 0x0, 0x0, 0x0, 0x400054}, 0x98) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @empty}, 0x0, 0x4, 0x4, 0x4}}, 0x2e) pwritev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)="bdc7fae3730b82ed0f745220aef6e93c299cdae96e8bab5eca68d472b4f624c2f195c9e1e7440be6c802f4577c323e2cc6e7b99c4ea889bf08affee54ef9fa92a79e8f565ef7f315206b6a8b133988d73569571e98587b82183bf6bebeb3f89be6d2fb6004d1000c6a2bee2b95747bebb9345063577fb3dafbed73197cc6cf76e6d97e8a34de917a38dec2e92be12f7c8d4d4dd358628419fa97bd81c9ffdd58b17e9a7b78c17fb041bf2e628498216e75e0a2d0662d1a22193e8fa2846a40875c41c412c15dc2b472a567b655d9f147dac21e0ede3037c7bcf1", 0xda}], 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000080)="4a49aff2e2ce4952cef038539be23844c91fbb92a396f141f75f93754d2c4a5a91b37663a6aac8cc5aff909cc3b247d5fe904a70a8515353556ce71f0c69e980fdcb017fcc6c89", 0x47, 0x20004000, &(0x7f0000000000)={0xa, 0x4e24, 0x7, @empty, 0x4}, 0x1c) 03:44:12 executing program 4 (fault-call:4 fault-nth:0): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 945.761099] CUSE: unknown device info "" [ 945.766168] FAULT_INJECTION: forcing a failure. [ 945.766168] name failslab, interval 1, probability 0, space 0, times 0 [ 945.806225] CUSE: zero length info key specified [ 945.825195] CPU: 0 PID: 19280 Comm: syz-executor.4 Not tainted 5.0.0-rc7+ #86 [ 945.832505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 945.841858] Call Trace: [ 945.844465] dump_stack+0x172/0x1f0 [ 945.848107] should_fail.cold+0xa/0x1b 03:44:12 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0xfffffffe}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 945.852013] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 945.857129] ? lock_downgrade+0x810/0x810 [ 945.861283] ? ___might_sleep+0x163/0x280 [ 945.865444] __should_failslab+0x121/0x190 [ 945.869698] should_failslab+0x9/0x14 [ 945.873506] kmem_cache_alloc+0x2b2/0x6f0 [ 945.877744] ? __get_reqs_available+0x1aa/0x410 [ 945.882426] io_submit_one+0x131/0x1cf0 [ 945.886412] ? __might_fault+0x12b/0x1e0 [ 945.886432] ? ioctx_alloc+0x1db0/0x1db0 [ 945.886445] ? __might_fault+0x12b/0x1e0 [ 945.886475] __x64_sys_io_submit+0x1bd/0x580 03:44:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x109000, 0x0) ioctl$SIOCX25SDTEFACILITIES(r1, 0x89eb, &(0x7f0000000240)={0x4, 0x4, 0x2, 0xff, 0x3, 0x20, 0xd, "4c8cc6ea960198bbd692bda3f605571e183f99a9", "f4b5c4bb1d60279e54b409285b66f2cd1db92c1e"}) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f00000002c0)=0x20000, 0x4) ioctl$FS_IOC_GETFSLABEL(r2, 0x400452c8, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r0) syz_open_dev$vivid(&(0x7f0000000280)='/dev/video#\x00', 0x3, 0x2) [ 945.894555] ? __x64_sys_io_submit+0x1bd/0x580 [ 945.894576] ? __ia32_sys_io_destroy+0x420/0x420 [ 945.894596] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 945.917399] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 945.922162] ? do_syscall_64+0x26/0x610 [ 945.926145] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 945.931514] ? do_syscall_64+0x26/0x610 [ 945.935500] ? lockdep_hardirqs_on+0x415/0x5d0 [ 945.940108] do_syscall_64+0x103/0x610 [ 945.943997] ? __ia32_sys_io_destroy+0x420/0x420 [ 945.948756] ? do_syscall_64+0x103/0x610 [ 945.952825] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 945.958012] RIP: 0033:0x457e29 [ 945.961202] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 945.980103] RSP: 002b:00007f615f5fac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 945.987821] RAX: ffffffffffffffda RBX: 00007f615f5fac90 RCX: 0000000000457e29 [ 945.995100] RDX: 0000000020000600 RSI: 0000000000000001 RDI: 00007f615f5da000 [ 946.002378] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 946.010001] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f615f5fb6d4 [ 946.017276] R13: 00000000004bf02f R14: 00000000004d09b0 R15: 0000000000000005 [ 946.033997] CUSE: unknown device info "" [ 946.039047] CUSE: zero length info key specified [ 946.054020] IPVS: ftp: loaded support on port[0] = 21 03:44:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) 03:44:13 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x40030000000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:13 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x3000000, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 946.266202] CUSE: unknown device info "" [ 946.314151] CUSE: zero length info key specified 03:44:13 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0xf0ffffffffffff}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 946.360765] CUSE: unknown device info "" [ 946.382617] CUSE: zero length info key specified [ 946.610594] IPVS: ftp: loaded support on port[0] = 21 03:44:13 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x8, 0x4, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000000000000000000063010000000000009500000000000000000000"], &(0x7f0000000240)='GPL\x00'}, 0x48) getpeername(0xffffffffffffffff, &(0x7f0000001b00)=@can={0x1d, 0x0}, &(0x7f0000001b80)=0x80) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001bc0)={0xe, 0x1, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0x6, 0x7, 0x3, 0x40, 0xfffffffffffffffc}], &(0x7f0000000040)='syzkaller\x00', 0x5, 0xf2, &(0x7f0000000080)=""/242, 0x41f00, 0x1, [], r1, 0x9}, 0x48) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x2000, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r0, 0x0, 0x64, 0x1000, &(0x7f0000000280)="d361e863212121f24ad5c5a3d04a57f832972f01ef5a610e654acbcf47e81a5a5007fcd0532f3d50fa04b3f425badf17b3ea8ef9c8550299f12dffc26695c31a042bddd0fd9cd239620064cb0859e350fdd877b670d6cede44722deba5ff6737a35b25b5", &(0x7f0000000500)=""/4096, 0x7}, 0x28) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000380)='nbd\x00') r5 = syz_open_dev$swradio(&(0x7f00000003c0)='/dev/swradio#\x00', 0x1, 0x2) r6 = creat(&(0x7f0000005a40)='./file0\x00', 0x80) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000005a80)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000005b80)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000005b40)={&(0x7f0000005ac0)={0x68, r4, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x6}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x2}, @NBD_ATTR_SOCKETS={0x1c, 0x7, [{0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}]}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x800}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x100}]}, 0x68}, 0x1, 0x0, 0x0, 0x8001}, 0x80) r8 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x1, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000001c0)={r8, r2, 0xc, 0x1}, 0x10) 03:44:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, 0x0, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$UI_SET_MSCBIT(r1, 0x40045568, 0x1a) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r2, 0x400452c8, &(0x7f0000000100)) close(r2) 03:44:13 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x100000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:13 executing program 4 (fault-call:4 fault-nth:1): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 03:44:13 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x1000000]}, &(0x7f0000000000)=0x54) 03:44:13 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x4000000, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 946.764393] CUSE: unknown device info "" [ 946.782359] CUSE: zero length info key specified 03:44:13 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 03:44:13 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x200000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r1 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_S_PRIORITY(r1, 0x40045644, 0x3) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x141, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000340)='raw\x00') sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x7fffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r3, 0x400452c8, &(0x7f0000000100)) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000240)={'raw\x00'}, &(0x7f00000002c0)=0x54) close(0xffffffffffffffff) [ 946.822123] CUSE: unknown device info "" [ 946.832901] IPVS: ftp: loaded support on port[0] = 21 [ 946.845796] CUSE: zero length info key specified 03:44:13 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x4e23, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}], 0xfffffe26) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000180)=ANY=[@ANYBLOB="0000a8002bd6f8ca011596cd32aa3a0ef2c96a8c3072914cda4b6386c32ceaf76f04122c530a60c59c96dc2d26c9708a3216b7df70d13af2587d79beb40000000000002000000000000000000000", @ANYRES32=0x0], &(0x7f0000000000)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000080)={r2, 0x42bd, 0x400000000000020}, &(0x7f00000000c0)=0xc) 03:44:13 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5000000, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:13 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$tun(r0, 0x0, 0x0) mlock2(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) syz_genetlink_get_family_id$team(0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000600)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$IPVS_CMD_GET_DAEMON(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="4a97d21cd97339b720fd8015113199f24aa2c3c01561a0bc96cd4a85eb62d1fb5729a655dbda87cb0d7c3b0844a4320d3950f93956941183b4027a1502c6ef0670a977a29a5624d6751cb90d7143089833cc7aaa60313838e63f9f3c172687ef68909a0a0f9ba6671dd0a6dcc7ac060e94603b71181d32600985ef80616b83132bfa54fb31e1287736ebc248e484b030f0e9c1b67b68f9acd3b6d488ba9e687625c0a2932b8a083219fbc204b3dc546dfe0a8b9e415e638c5d972ce70ff7f7aec685c91d2c66b1d815cd5daaa8b99ef7303bc7d8aa41699efc9534549143a2"], 0x1}}, 0x0) write$FUSE_POLL(r2, &(0x7f00000005c0)={0x18}, 0x18) setsockopt$inet_tcp_int(r2, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x18, &(0x7f00000001c0), 0x4) r3 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r3, 0x10099b7) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5}]}, 0x10) sendfile(r1, r3, 0x0, 0x8000fffffffe) connect$unix(r2, &(0x7f00000002c0)=@file={0x0, './bus\x00'}, 0x6e) 03:44:13 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x300000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:14 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x2, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 947.102373] CUSE: unknown device info "" [ 947.117464] CUSE: zero length info key specified [ 947.159433] CUSE: unknown device info "" 03:44:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000240)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r2, 0x322, 0x70bd2c, 0x25dfdbfe, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x16}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xaf}]}, 0x24}, 0x1, 0x0, 0x0, 0x20040000}, 0x40040) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r3, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) [ 947.184342] CUSE: zero length info key specified [ 947.192273] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:44:14 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x400000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 947.628238] IPVS: ftp: loaded support on port[0] = 21 03:44:14 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400, 0x0) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000040)=""/13, &(0x7f0000000080)=0xd) socket$inet(0x2, 0x3, 0x6) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r0, 0xc040564b, &(0x7f00000000c0)={0xfff, 0x0, 0x303f, 0x3, 0x955f, {0x20, 0x7}, 0x1}) 03:44:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, 0x0, 0x0) clone(0x802122001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pause() r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='statm\x00') exit(0x0) pread64(r1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r2, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) 03:44:14 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x500000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:14 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x11000000]}, &(0x7f0000000000)=0x54) 03:44:14 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6000000, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:14 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x4, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 03:44:14 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x20080, 0x0) r1 = syz_open_procfs(0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000140)='./file0/file0\x00', 0x400, 0x2) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) fremovexattr(0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) r3 = gettid() getpeername$unix(0xffffffffffffffff, &(0x7f0000000500)=@abs, 0x0) ptrace$peek(0x1, r3, &(0x7f00000001c0)) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000280)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r4 = memfd_create(&(0x7f0000000a80)='\xa3t,\x13\x8d\xd3\x84\xa0\xbfG\xa6\xcb\xcd\x1f\xafzf\x00V\x18\x13#\xac[\xee\x12|\xc9\x12\xd9\xf3\xef<\x10/\x8b\xcf\xdas\x94 \xc3\xa91_Q\xcb]\xfe\xa3e?\xdd\xae\x88(\xbe\xb7\xe6`\xcf\xd3\b{\b8@\x8e\x7f):\xce\x8c\xb9sw\x16\xeak\xc9\xac\x19\xca}\xb1\xa8\x008\x9cb$q\x95zG\x8d\xd1XA\xc3\x93DsK\x16L\x84\xa5\a\x9aT\xfb\x1aM\xb5Z0\xb9)?\xa4\xd3\x18', 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)=ANY=[]) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0xf8d) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, &(0x7f0000000680)) getxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="1c62706620000000"], 0x0, 0x0) umount2(0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000100)) [ 947.836543] CUSE: unknown device info "" [ 947.846169] IPVS: ftp: loaded support on port[0] = 21 [ 947.870279] CUSE: zero length info key specified [ 947.899005] CUSE: unknown device info "" [ 947.932752] CUSE: zero length info key specified 03:44:15 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x2, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 03:44:15 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x7000000, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:15 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x600000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:15 executing program 0: clone(0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xfffffffffffffff8, 0x101) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = getpid() prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x2000000000001) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001780)={0x0, 0x0}, &(0x7f00000017c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001800)={0x0, 0x0, 0x0}, &(0x7f0000001840)=0xc) sendmsg$unix(r2, &(0x7f0000001900)={&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000016c0)=[{&(0x7f0000000140)="6774be00e1a6b8ff627729205ac3d2dde579e8c37b399c290ffd22a759cc7db5ef673c305dfbd462694fef26f59e6ad5d0944d1d8ba3a9c1583bf8540ab4cd1e6984d0905665e9a46295528852c0fd641e7f641ae13ad96bed7405ffc4ccafbae6f1019100636f876e8f676c1f676a482212b911cc5a4f", 0x77}, {&(0x7f00000001c0)="87c73e0f7bd08822efc48177517054bb9f8ee6c9407c7b", 0x17}, {&(0x7f0000000200)="b29c2971bb10f23acc4afffc48b9b1d91127fa6c6ecd3f8a8c3da943eaccfcf6bc84e30139e63d9c4c20c4f87b85b01b1109c1c046544de6f0c8db2b82c6ed55361de43fd7ecf41cc8446cd7ba06f7d221386fc8c680e420b89aa58b1b04590a9eeaa847ed3294756c9c3b1ddc04bba43017ebe270552f50e2df446c84a0c4b739383bca831679a4355d8ac2e4552260651690c1ff8519dbb4cb0f854d2233b6dbbd2d0d9b4f8f8f630cc5f2c43924e7289a3e5029750b9f31d161d42dfee40c01", 0xc1}, {&(0x7f0000000300)="056b1b4109b32b80784a7ab916131c02e3235fc847a8515febd6db", 0x1b}, {&(0x7f0000000340)="cc693342463cf5d905d3bf47d35ba5f7e45897af1349cbf1ebd03e862c7a63c2d6b4fcb153cc75f5c0372b42d733dede03db4ad0dd50e474049ef379f579b2bb69630a6b6274de1d814b2bc0a6fec88d5b45925218dd08444325f6fc82421ad001bed74f5c90ed5fe9367c7538496260e3d8cc4f5b4c32147c1afe", 0x7b}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f00000013c0)="0eb57bcc8a2c4dd9107471f68d660388d3723a018fd1480ffeea982cb7dadfdbdd9dc39e1f4a589a864e20affb1583806072ae1ebb6dbad1", 0x38}, {&(0x7f0000001400)="90a01c6897d98e92bfd30b51bb6dd5031ab237e043a9b9435b165b461a8d17aeabe7ad67b41778954934c2eae2a3ea2afa3e604c35b113882b7e730946e270d2e3d420a9684e04f3bda5831fb10c702c02863b3c0105db8bccf9ccaf6b9752f1dbb8742d1ee9aae2e3b09020ff1f313a3a957d7ce2dbd31d0084158d3b3d3115c138e973813df63a6f1f03db42f0ac3a0349583549d4f28593633ac32c16b72b5081624fdf73001b52378f7c2b3e846b18982cd80166b971d2a55df2711aac29e50bb1fa867e16707bfb671c0ebb5a1b1c1600a399b450c7f6cd8efde9", 0xdd}, {&(0x7f0000001500)="18f2acd053a56bc90f1fae8033dbab177c0f18ae4083caaef809f152cc6bca53a68b4464701a21e836e026ae29f441813ffc702defc75cabbddf40946c02e7322c233606d291f62ba7d592caf62f168551e6d8fde535a90756a91955bbedb97ebef3eb4e28aadb0b2640034e1ec5a4224b6eea553601fcebcdb13b19c2bef4df06a936c6db25d99edad460f872e5f8d148f23681e1f49ecf5f6cfddaccfa2b839a3a5fc78eddbc94b7ca4267dbe5", 0xae}, {&(0x7f00000015c0)="320c56b01ba600377591c4162d34763f166723c82732c0bc206b7d75e83ba9f319d2ab0cd17e5dbaa4ff113853a498b4ba892fe6af17d65eb2d5052ba4858936634b32db558b678b23353e010ba742aaf305cdb0636c491718c470ec78e083c890e5c931ca9e01185ffa435f8bb618e8666287cd6e09ce6b067cd475b1ddbea58a66a72381c0c34dfcb9f06720a567379320a93ca5432835ea2c1aa4e174debf9226bfda44cbf7bb781ea1c9e1c8433c2bc5b4da83f84826a002b3db0a0e697ad3766cae9b59fac794fbd54491a334c368d7822fc493bcbfd903f78797", 0xdd}], 0xa, &(0x7f0000001880)=[@rights={0x18, 0x1, 0x1, [r1, r2]}, @cred={0x20, 0x1, 0x2, r3, r4, r5}, @rights={0x18, 0x1, 0x1, [r0, r0]}], 0x50, 0x40000}, 0x40) [ 948.261228] CUSE: unknown device info "" [ 948.293524] CUSE: zero length info key specified [ 948.304423] CUSE: unknown device info "" [ 948.344293] CUSE: zero length info key specified [ 948.462965] IPVS: ftp: loaded support on port[0] = 21 03:44:15 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x8000000, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:15 executing program 0: r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x2, 0x0, @multicast1}, &(0x7f0000000040)=0x10) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r1 = shmget$private(0x0, 0x2000, 0x80, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_LOCK(r1, 0xb) shmctl$SHM_LOCK(r1, 0xb) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='schedstat\x00') ioctl$EVIOCGLED(r2, 0x80404519, &(0x7f0000000140)=""/186) write$P9_RLERROR(r2, &(0x7f0000000200)={0x13, 0x7, 0x1, {0xa, 'schedstat\x00'}}, 0x13) lseek(r2, 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x6, 0x8000) modify_ldt$read_default(0x2, &(0x7f0000000280)=""/196, 0xc4) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000380)=0x10001) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f00000003c0), &(0x7f0000000400)=0x4) shmget$private(0x0, 0x5000, 0x8, &(0x7f0000ffb000/0x5000)=nil) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@broadcast, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@initdev}}, &(0x7f00000005c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000600)={{{@in=@broadcast, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xe8) mount$9p_fd(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='9p\x00', 0x10000, &(0x7f0000000740)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r3}}, {@dfltuid={'dfltuid', 0x3d, r4}}, {@loose='loose'}, {@noextend='noextend'}, {@cache_loose='cache=loose'}], [{@subj_role={'subj_role', 0x3d, '/dev/input/event#\x00'}}, {@context={'context', 0x3d, 'user_u'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@dont_hash='dont_hash'}]}}) ioctl$SIOCRSGCAUSE(r2, 0x89e0, &(0x7f0000000840)) r5 = msgget$private(0x0, 0x10) msgctl$MSG_STAT(r5, 0xb, &(0x7f0000000880)=""/63) ioctl$RTC_ALM_READ(r2, 0x80247008, &(0x7f00000008c0)) write$P9_RWSTAT(r2, &(0x7f0000000900)={0x7, 0x7f, 0x1}, 0x7) utimes(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)={{0x77359400}, {0x0, 0x2710}}) r6 = accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000a40)=0x80, 0x80800) unshare(0x500) r7 = syz_open_dev$mice(&(0x7f0000000a80)='/dev/input/mice\x00', 0x0, 0x400) getsockopt$inet_sctp6_SCTP_NODELAY(r6, 0x84, 0x3, &(0x7f0000000ac0), &(0x7f0000000b00)=0x4) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r7, 0xc0905664, &(0x7f0000000b40)={0x0, 0x0, [], @bt={0x0, 0xfffffffffffffffa, 0x9, 0x1, 0xff, 0x5, 0x1, 0x4}}) socket$tipc(0x1e, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 03:44:15 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x88000000]}, &(0x7f0000000000)=0x54) [ 948.654805] CUSE: unknown device info "" [ 948.668318] CUSE: zero length info key specified 03:44:15 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x4, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 03:44:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socketpair(0x0, 0x3, 0x7, &(0x7f00000086c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$bt_sco(r1, &(0x7f0000008700)={0x1f, {0x8e2, 0x5, 0x3, 0x5, 0x8000000000000, 0x200}}, 0x8) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r2, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) 03:44:15 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x800000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 948.696913] IPVS: ftp: loaded support on port[0] = 21 [ 948.709517] CUSE: unknown device info "" [ 948.718547] CUSE: zero length info key specified 03:44:15 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0xc000000, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:15 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x900000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:15 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x1000000, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 03:44:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000200), &(0x7f0000000240)=0x8) close(0xffffffffffffffff) 03:44:15 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast2, 0x8}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1, 0x100000001}, 0x26) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000040)={0x100000001, {{0xa, 0x4e22, 0x8, @rand_addr="e0abb5dda67541739df8ceeb6881fd64", 0x9}}}, 0x88) [ 948.903657] CUSE: unknown device info "" [ 948.913400] CUSE: zero length info key specified 03:44:15 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0xa00000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 948.985201] CUSE: unknown device info "" [ 948.989473] CUSE: zero length info key specified 03:44:16 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x4000, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_newroute={0x24, 0x18, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1}, [@RTA_GATEWAY={0x8, 0x5, @dev}]}, 0x24}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492a23, 0x0) 03:44:16 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x2000000, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 949.434238] IPVS: ftp: loaded support on port[0] = 21 03:44:16 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x100000000000000]}, &(0x7f0000000000)=0x54) 03:44:16 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x10000000, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)='\x00') sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f0000000240)={{0x1, 0x5}, 0x0, 0x3, 0x8001, {0x8, 0xffffffff}, 0x400, 0x705e}) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r2, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x0, 0xfffffffffffffff7, 0x9}) 03:44:16 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x4000000, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 03:44:16 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0xb00000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x40000000bc5f, &(0x7f0000000380)="7d008426bce153851eda60107acb8bdb0f274b80f7940a4c47294e8d3286bba8a3dfd012f61133afb0d975f2b97ea8b466f12bfb2494f3f2391b2da30ad12034a55a3225ad73b3cca2032154fcd92f3141a664af41670ce6acb1b5ce34450cdc0a9d82fd6948485adc48835cb64ceebd4abb3279c43922ac31e29def36eee3bb") ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r3, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r4, 0x38, 0x70bd27, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x80) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000780)=0x60, 0x2) sendmsg$TIPC_CMD_SHOW_PORTS(r2, &(0x7f0000000880)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x2004}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x1c, r4, 0x220, 0x70bd2c, 0x25dfdbfc}, 0x1c}, 0x1, 0x0, 0x0, 0x84}, 0x4000000) r5 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r5, &(0x7f0000002000)='/', 0x1) sendfile(r5, r5, &(0x7f0000000040), 0x7f) sendfile(r5, r5, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r5, 0x0) bind$netlink(r2, &(0x7f0000000640)={0x10, 0x0, 0x25dfdbfd, 0x10000000}, 0xc) mount(&(0x7f0000000080), &(0x7f0000000080)='.', 0x0, 0x5010, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000006c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r3, &(0x7f0000000a80)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000a40)={&(0x7f00000008c0)={0x174, r6, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x100000001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1ff80000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x81}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4000000000000000}]}, @TIPC_NLA_MEDIA={0x38, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}]}, @TIPC_NLA_BEARER={0xa0, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x8001, @mcast2, 0x1}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x1ff, @local, 0x8}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}]}, @TIPC_NLA_BEARER={0x4}, @TIPC_NLA_BEARER={0x30, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffffba}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8}]}]}]}, 0x174}, 0x1, 0x0, 0x0, 0x8080}, 0x8000) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000700)={&(0x7f0000000480)={0x1a4, r7, 0x413, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x74, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x9, @rand_addr="c80c832d20a965afb01fb7f5079f31b6", 0x60686bd2}}, {0x14, 0x2, @in={0x2, 0x4e23, @loopback}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @loopback}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x5, @local, 0x5}}}}]}, @TIPC_NLA_MEDIA={0x94, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5dd878af}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_MEDIA={0x88, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb8d1727}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}]}]}, 0x1a4}}, 0x48000) sendto$inet(r1, &(0x7f0000000f40)="03", 0x1, 0x80ff, 0x0, 0x0) recvfrom(r1, &(0x7f0000000040)=""/188, 0xbc, 0x1, &(0x7f0000000100)=@l2, 0x80) [ 949.548283] CUSE: unknown device info "" 03:44:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000340)="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", 0x16d, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) 03:44:16 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x20000000, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:16 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0xf00000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 949.593591] CUSE: zero length info key specified [ 949.606823] IPVS: ftp: loaded support on port[0] = 21 [ 949.614399] CUSE: unknown device info "" [ 949.618958] CUSE: zero length info key specified 03:44:16 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x100000000000000, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 949.771955] CUSE: unknown device info "" 03:44:16 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x1000000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = dup3(r0, r0, 0x80000) getsockname$llc(r1, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000100)=0x10) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000080)=""/103) [ 949.797681] CUSE: zero length info key specified [ 949.820402] CUSE: unknown device info "" [ 949.843987] CUSE: zero length info key specified [ 950.135128] IPVS: ftp: loaded support on port[0] = 21 03:44:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000200)='/dev/cec#\x00', 0x0, 0x2) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000240)=0x4) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r2, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) 03:44:17 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x60000000, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:17 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x200000000000000, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 03:44:17 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r1 = add_key$user(&(0x7f0000000640)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000440)="585ccbe4ed83b8361f00000000297b6897b66147b3c7218a9169a85ea0bdc9e1587a050000000000f1ff42e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d25500200000035c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5a7d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40000e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f47725390000000000", 0xc0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) fcntl$setlease(r0, 0x400, 0x2) r2 = syz_open_dev$cec(&(0x7f0000000700)='/dev/cec#\x00', 0x3, 0x2) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) prctl$PR_SET_KEEPCAPS(0x8, 0x1) r4 = syz_open_dev$swradio(&(0x7f0000000500)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_TRY_EXT_CTRLS(r4, 0xc0205649, &(0x7f0000000580)={0x990000, 0x81, 0x800, [], &(0x7f0000000540)={0xa00001, 0x9, [], @value=0x1f}}) clock_gettime(0x0, &(0x7f0000000980)) r5 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) getsockopt$EBT_SO_GET_ENTRIES(r5, 0x0, 0x81, &(0x7f00000003c0)={'nat\x00', 0x0, 0x3, 0x1000, [], 0x6, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}], &(0x7f00000009c0)=""/4096}, &(0x7f0000000100)=0x78) keyctl$dh_compute(0x17, &(0x7f00000000c0)={r3, r1, r1}, &(0x7f0000000240)=""/240, 0xf0, 0x0) r6 = mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x200000000810, r5, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r5, 0xc018620b, &(0x7f00000001c0)={r6}) clock_nanosleep(0x0, 0xf3ed55dcdc3852f8, &(0x7f0000000080)={0x77359400}, 0x0) shutdown(r5, 0x0) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000780), &(0x7f00000007c0)=0x4) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000600)={0x0, 0x100000000}, &(0x7f0000000680)=0x8) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f0000000740)={0x10000}, 0x4) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f00000006c0)={r7}, 0x8) 03:44:17 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x1100000000000000]}, &(0x7f0000000000)=0x54) 03:44:17 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x1100000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:17 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x1200000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 950.325828] CUSE: unknown device info "" [ 950.338686] CUSE: zero length info key specified [ 950.356330] IPVS: ftp: loaded support on port[0] = 21 03:44:17 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x400000000000000, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 950.430904] CUSE: unknown device info "" [ 950.467176] CUSE: zero length info key specified 03:44:17 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x1300000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) fsetxattr$security_evm(r1, &(0x7f0000000200)='security.evm\x00', &(0x7f0000000280)=@v2={0x3, 0x3, 0x1, 0x400000000000000, 0xaa, "0a6c2ccc2b7d475e440ad1981b3243be4dbc61e9650b491ba73f8a9c2dc5c6357b4805756ed5ba46b76af23605787b7eb58880cfb911dbd85ef3d7bd87cb0884f028dcc8c81ad577c5985663622cf89925ff89f86e39af7fbec0c359e74a5bf4e00dcd9788ed613b5364e8abb6410a07ce8d0440ce0b607b01ce576bdc489e7f60d76314dfbb90901cbab035ddf5b36fa2cbff817526eaec0b9f3da652715e69aefc357137ac07e12bd9"}, 0xb4, 0x2) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) 03:44:17 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x100000000000000, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:17 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x8000000000000000, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 03:44:17 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x5f0c000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl(r0, 0x7f, &(0x7f0000000240)="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") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c8, &(0x7f0000000100)) r2 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x41) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000400)={0x4, &(0x7f00000003c0)=[{}, {}, {}, {0x0}]}) ioctl$DRM_IOCTL_RM_CTX(r2, 0xc0086421, &(0x7f0000000440)={r3, 0x1}) close(0xffffffffffffffff) write$capi20_data(r2, &(0x7f0000000480)={{0x10, 0x6, 0x4, 0x80, 0x3b, 0x1}, 0x69, "bc7d4be380ebc64e4e130faf74f537d8502602d3252605a3874083c9b08cbf80b5942cecd1f82702f079196a06293cac7e30efd11b79d844e7f452f1c1490692e20efac6d4dc8502cf51bdeadd3931c3fe412d570785a77df9fca6df3b3ce29745ed515d4fff997bf7"}, 0x7b) [ 950.809336] CUSE: unknown device info "" [ 950.857920] CUSE: zero length info key specified 03:44:17 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x2, 0x0, 0x5, 0x0, r0, 0x0}]) [ 950.921274] CUSE: unknown device info "" [ 950.934222] CUSE: zero length info key specified 03:44:18 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r1 = add_key$user(&(0x7f0000000640)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000440)="585ccbe4ed83b8361f00000000297b6897b66147b3c7218a9169a85ea0bdc9e1587a050000000000f1ff42e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d25500200000035c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5a7d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40000e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f47725390000000000", 0xc0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) fcntl$setlease(r0, 0x400, 0x2) r2 = syz_open_dev$cec(&(0x7f0000000700)='/dev/cec#\x00', 0x3, 0x2) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) prctl$PR_SET_KEEPCAPS(0x8, 0x1) r4 = syz_open_dev$swradio(&(0x7f0000000500)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_TRY_EXT_CTRLS(r4, 0xc0205649, &(0x7f0000000580)={0x990000, 0x81, 0x800, [], &(0x7f0000000540)={0xa00001, 0x9, [], @value=0x1f}}) clock_gettime(0x0, &(0x7f0000000980)) r5 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) getsockopt$EBT_SO_GET_ENTRIES(r5, 0x0, 0x81, &(0x7f00000003c0)={'nat\x00', 0x0, 0x3, 0x1000, [], 0x6, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}], &(0x7f00000009c0)=""/4096}, &(0x7f0000000100)=0x78) keyctl$dh_compute(0x17, &(0x7f00000000c0)={r3, r1, r1}, &(0x7f0000000240)=""/240, 0xf0, 0x0) r6 = mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x200000000810, r5, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r5, 0xc018620b, &(0x7f00000001c0)={r6}) clock_nanosleep(0x0, 0xf3ed55dcdc3852f8, &(0x7f0000000080)={0x77359400}, 0x0) shutdown(r5, 0x0) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000780), &(0x7f00000007c0)=0x4) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000600)={0x0, 0x100000000}, &(0x7f0000000680)=0x8) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f0000000740)={0x10000}, 0x4) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f00000006c0)={r7}, 0x8) [ 951.231853] IPVS: ftp: loaded support on port[0] = 21 03:44:18 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x8800000000000000]}, &(0x7f0000000000)=0x54) 03:44:18 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x8100000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:18 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x200000000000000, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r2, 0x400452c8, &(0x7f0000000100)) prctl$PR_SET_DUMPABLE(0x4, 0x2) sendfile(r0, r0, &(0x7f0000000200), 0xeffe) close(r0) 03:44:18 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x4, 0x0, 0x5, 0x0, r0, 0x0}]) [ 951.506413] IPVS: ftp: loaded support on port[0] = 21 03:44:18 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x1000000, 0x0, 0x5, 0x0, r0, 0x0}]) [ 951.537629] CUSE: unknown device info "" [ 951.542811] CUSE: zero length info key specified [ 951.577540] CUSE: unknown device info "" 03:44:18 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x8e7e000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 951.593058] CUSE: zero length info key specified 03:44:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vfio/vfio\x00', 0x40300, 0x0) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000240)) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r2, 0x400452c8, &(0x7f0000000380)) close(0xffffffffffffffff) 03:44:18 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x300000000000000, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:18 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x2000000, 0x0, 0x5, 0x0, r0, 0x0}]) 03:44:18 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x9effffff00000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 951.846526] CUSE: unknown device info "" [ 951.850718] CUSE: zero length info key specified [ 951.902181] CUSE: unknown device info "" [ 951.907920] CUSE: zero length info key specified 03:44:18 executing program 0: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000040)={{{@in6=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) openat$mixer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/mixer\x00', 0x400, 0x0) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000000)='./file0\x00', r0, r1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2401, 0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x4000003bf, 0x101000) ioctl$KDGKBDIACR(r3, 0x4b4a, &(0x7f0000000280)=""/90) [ 952.137801] IPVS: ftp: loaded support on port[0] = 21 03:44:19 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x0, 0x11]}, &(0x7f0000000000)=0x54) 03:44:19 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x4000000, 0x0, 0x5, 0x0, r0, 0x0}]) 03:44:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x591500, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) prctl$PR_GET_TSC(0x19, &(0x7f0000000480)) sendmsg$nl_xfrm(r1, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000400)={&(0x7f0000000300)=@newpolicy={0xe4, 0x13, 0x210, 0x70bd29, 0x25dfdbfe, {{@in=@dev={0xac, 0x14, 0x14, 0x1f}, @in6=@rand_addr="54d82cab38be43ec5b3dbaab53298418", 0x4e23, 0x7fffffff0000, 0x4e20, 0x7, 0xa, 0x20, 0x80, 0x3f, 0x0, r2}, {0x7, 0x6, 0x3, 0x81, 0x7f, 0x10000, 0x9, 0x7}, {0x9, 0x9, 0x100000001, 0x1c00000000000}, 0x0, 0x0, 0x1, 0x0, 0x3, 0x3}, [@replay_esn_val={0x2c, 0x17, {0x4, 0x70bd26, 0x70bd26, 0x70bd28, 0x70bd2c, 0x8001, [0x8, 0x4, 0x1, 0x7]}}]}, 0xe4}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r3, 0x400452c8, &(0x7f0000000100)) close(r1) 03:44:19 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x400000000000000, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:19 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0xf0ffffff00000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:19 executing program 0: getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'os2.', 'syzkaller\x00'}, &(0x7f0000000080)=""/187, 0xbb) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x15, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f0000009000)=r0, 0x4) syz_mount_image$f2fs(&(0x7f0000000580)='f2fs\x00', &(0x7f00000005c0)='./file0\x00', 0x400, 0x2, &(0x7f0000000740)=[{&(0x7f0000000600)="0b4a7f8c753735c58cc1dd02766a10d44e2d7e9040a7d640a3e80ae70c8ef02aaab41f893e9a6d25945c0234ceffbfcf34ff9ad525c50529d1173513747b6cd31da23d089e93133f07312057fc80881e14d21c694d4933750e7781303b3cee75c2b061b28aab1a90bdda0b27f8ca5f082cb276d4132d3fcaccda3c8e836e5dc0f179fc1fb48fe36467cc2fa5373df9d888bc118dbc56d99dd520743105789c7e503f0f8f02078b71a553bf404d7cf3960e208a7dfa95ad37a88c7ce9c6fa4a1bb30e4d290a6de34f1fafb227af695900d08d0842882d2a3b066ac497671aa2977ed23d04e3c0", 0xe6, 0x1ff}, {&(0x7f0000000700)="d3d3c0703c2d3311ed4cdf91f90f83e72d2bdccbaec97277d00bc981cc8616643a4e1c896872881dc28d692c94cea64db321a8f5ab9c874b413975", 0x3b, 0x1ff}], 0x2020, &(0x7f0000000780)={[{@adaptive_mode='mode=adaptive'}, {@extent_cache='extent_cache'}], [{@obj_role={'obj_role', 0x3d, 'os2.'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@hash='hash'}, {@subj_role={'subj_role', 0x3d, 'os2.'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ff}}]}) write$binfmt_elf32(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0xc4f1, 0x9, 0x4, 0x5, 0xa6db, 0x3, 0x3, 0x2, 0xa, 0x38, 0xcd, 0x0, 0x7fffffff, 0x20, 0x2, 0x1, 0x3ff, 0x9f}, [{0x7, 0x7, 0xfffffffffffffffa, 0x4, 0xfb1b, 0x5, 0x9, 0x7fffffff}, {0x70000000, 0x3f, 0x9, 0x20, 0x7, 0x5, 0xffffffffffffffe0, 0x88be}], "3926fa45880a367c500e39bcb3d6b463b5b9369dc2d525b914e67c972fd40f9c2175f29cd969dbd79f7f3fdf456befeb59f609a344b9c71e7be49a81608f08ab12dbb658dacb94d8326c22f214fd61c798096fe72a2c6a18d0aa2a7ef75e301e4ab889002b0cb8b59dae96cebab9c39f1a1551f89d1c45a2ea75388aec90de806dd523d3f4b10e1973f3540a648f4d2414e52b6e79ee3e2791a7cd9f4bc0af6034ebcbd798248859564ffb0272f183028c08", [[], [], []]}, 0x42a) [ 952.554480] CUSE: unknown device info "" [ 952.612357] IPVS: ftp: loaded support on port[0] = 21 [ 952.617937] CUSE: zero length info key specified [ 952.654551] CUSE: unknown device info "" [ 952.685896] CUSE: zero length info key specified 03:44:19 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0xfcffffff00000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:19 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x100000000000000, 0x0, 0x5, 0x0, r0, 0x0}]) 03:44:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r2, 0xc008551b, &(0x7f0000000180)={0x7, 0x10, [0x8, 0x4, 0x3, 0x5]}) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f00000001c0)) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000c00)="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", 0x1000, r3) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r4, 0x400452c8, &(0x7f0000000b00)) close(0xffffffffffffffff) 03:44:19 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x500000000000000, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:19 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x80000, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x28) r1 = dup(r0) sendto$rose(r1, &(0x7f0000000180)="e88a71165abe9a87c84b92a888b1383ce34fd5f7638622732ba0f7643d9a1ae0b8da6962ea13ad3b3e76482b7e2cff56ea07f0c9344dac1a71b4012bdc70674944d3fe2093e7e282681694203f4f75562471166b278953c6c5ea", 0x5a, 0x1, &(0x7f0000000200)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, 0x5, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @default, @bcast, @default]}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)={0x0, r1, 0xf, 0x2}, 0x14) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) r2 = socket$kcm(0xa, 0x100000002, 0x0) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f0000000100)={0x3, 0x7}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x406, 0x2}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) 03:44:19 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0xfeffffff00000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 952.975906] CUSE: unknown device info "" [ 953.002633] CUSE: zero length info key specified [ 953.034315] CUSE: unknown device info "" [ 953.068933] CUSE: zero length info key specified [ 953.310415] IPVS: ftp: loaded support on port[0] = 21 03:44:20 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x0, 0x88]}, &(0x7f0000000000)=0x54) 03:44:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100000a912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x800) ioctl$SIOCX25CALLACCPTAPPRV(r1, 0x89e8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) openat$vfio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vfio/vfio\x00', 0x10000, 0x0) ioctl$FS_IOC_GETFSLABEL(r2, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) 03:44:20 executing program 0: syz_emit_ethernet(0x72, &(0x7f0000000000)={@local, @broadcast, [{[{0x9100, 0x2, 0x2}], {0x8100, 0x39, 0xbcde}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x6, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local, @dev={0xac, 0x14, 0x14, 0x2}, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, 0x0) 03:44:20 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x200000000000000, 0x0, 0x5, 0x0, r0, 0x0}]) 03:44:20 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x600000000000000, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:20 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0xffffff7f00000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 953.707038] CUSE: unknown device info "" 03:44:20 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount$bpf(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x20, &(0x7f0000000800)={[], [{@subj_user={'subj_user', 0x3d, '@wlan0'}}]}) [ 953.736265] CUSE: zero length info key specified [ 953.767972] CUSE: unknown device info "" 03:44:20 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0xffffffff00000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:20 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x400000000000000, 0x0, 0x5, 0x0, r0, 0x0}]) 03:44:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") pipe(&(0x7f0000000200)) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x1c1b07e50f5fa35a, 0x0) sendto$inet6(r1, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r2, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) [ 953.800985] CUSE: zero length info key specified [ 953.810391] IPVS: ftp: loaded support on port[0] = 21 03:44:20 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x700000000000000, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 953.888426] cgroup: cgroup2: unknown option "subj_user=@wlan0" [ 953.946766] cgroup: cgroup2: unknown option "subj_user=@wlan0" 03:44:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x200, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000400)={0x18, 0xf, 0x1, {{0x1, 0x1, 0x8}, 0xffff}}, 0x18) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000200)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000240)='net/ip6_mr_cache\x00') ioctl$VIDIOC_G_AUDIO(r3, 0x80345621, &(0x7f0000000340)) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) setxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="005331fb7dbe08d173a94b96998feeb48aaac03fbee04e97710cb1237f5799331be0c54f39cb55dbc9e1c76d042773e91faa61f83cf9cf7b8dc067d39afa907d31d6293cfa7030293a6e3ee6ea0713cf81ce5f956d90dd99a534a7c3aa12f26cc21a"], &(0x7f0000000380)='net/ip6_mr_cache\x00', 0x11, 0x3) getsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl$FS_IOC_GETFSLABEL(r4, 0x400452c8, &(0x7f0000000100)) close(0xffffffffffffffff) [ 954.091405] CUSE: unknown device info "" [ 954.118172] CUSE: zero length info key specified [ 954.180910] CUSE: unknown device info "" [ 954.202695] CUSE: zero length info key specified [ 954.413981] IPVS: ftp: loaded support on port[0] = 21 03:44:21 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x0, 0x1100]}, &(0x7f0000000000)=0x54) 03:44:21 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0xfffffffffffff000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:21 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xb0072aa, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x740000, 0xf7ffffff7ff0bdbe}) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x4008550c, &(0x7f0000000040)) 03:44:21 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x8000000000000000, 0x0, 0x5, 0x0, r0, 0x0}]) 03:44:21 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x800000000000000, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:21 executing program 1: r0 = pkey_alloc(0x0, 0x3) pkey_free(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xfffffffffffff2ff, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xa7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x115, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x141005, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000340)=0x80000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcs\x00', 0x1, 0x0) r4 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r3, 0xc1105511, &(0x7f0000000a80)={{0xfffffffffffffffd, 0x1, 0x80, 0x46, '\x00', 0x1}, 0x0, 0x20000160, 0x9, r4, 0x7, 0x2, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x03\x00', &(0x7f0000000440)=['\x00', ']\x00', '^lo\x01lan0vboxnet0\x00', 'selinux@\x00', '\\\x00', '\x00', 'ip6gre0\x00'], 0x28, [], [0x3, 0x800000000000, 0x3, 0x2]}) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) getgid() r5 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r5, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000380)={@remote, 0x0}, 0x0) dup2(r2, r2) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000001c0)={r6, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') timerfd_create(0x7, 0x80080000) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r7, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) timer_create(0x4, &(0x7f0000000180), &(0x7f00000001c0)) fcntl$getown(r8, 0x9) rt_sigqueueinfo(0x0, 0x25, &(0x7f0000000100)={0x3}) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r9 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x0, 0x1ff, @loopback}, 0x1c) connect$l2tp(r9, &(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, r7, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r9, &(0x7f0000005fc0), 0x800000000000059, 0x0) socket$can_raw(0x1d, 0x3, 0x1) [ 954.555754] CUSE: unknown device info "" [ 954.573952] CUSE: zero length info key specified 03:44:21 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 954.604422] Dead loop on virtual device ip6_vti0, fix it urgently! [ 954.622036] Dead loop on virtual device ip6_vti0, fix it urgently! [ 954.633031] CUSE: unknown device info "" [ 954.647125] Dead loop on virtual device ip6_vti0, fix it urgently! 03:44:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x81000008912, &(0x7f0000000100)="0adc1f123c40a41d88b070") clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpgrp(0x0) r1 = gettid() syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x201, 0x800000010007d) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) move_pages(r1, 0x1, &(0x7f0000000040)=[&(0x7f0000ffc000/0x2000)=nil], &(0x7f0000000140)=[0x7, 0x7, 0x5, 0x7, 0x6, 0x100000000, 0x9, 0x20, 0x1], &(0x7f00000001c0)=[0x0, 0x0, 0x0], 0x4) r3 = syz_open_dev$mouse(0x0, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000100), 0x28) bind$vsock_dgram(r3, &(0x7f0000000000)={0x28, 0x0, 0x2711, @reserved}, 0x10) rt_sigprocmask(0x0, &(0x7f0000000100)={0xffffffffffffff7c}, 0x0, 0x8) rt_sigsuspend(&(0x7f0000000080)={0x101}, 0x8) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000180)={0x100, 0x2}, 0x4) [ 954.647520] IPVS: ftp: loaded support on port[0] = 21 [ 954.663106] Dead loop on virtual device ip6_vti0, fix it urgently! [ 954.676138] Dead loop on virtual device ip6_vti0, fix it urgently! [ 954.676654] CUSE: zero length info key specified [ 954.690906] Dead loop on virtual device ip6_vti0, fix it urgently! 03:44:21 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x2, 0x5, 0x0, r0, 0x0}]) 03:44:21 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x3}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:21 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0xc00000000000000, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 955.001119] tls_set_device_offload_rx: netdev lo with no TLS offload 03:44:22 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x4, 0x5, 0x0, r0, 0x0}]) [ 955.127470] CUSE: unknown device info "" [ 955.132651] CUSE: zero length info key specified [ 955.144054] CUSE: unknown device info "" [ 955.152044] CUSE: zero length info key specified 03:44:22 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x0, 0x8800]}, &(0x7f0000000000)=0x54) 03:44:22 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:22 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1000000000000000, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:22 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x1000000, 0x5, 0x0, r0, 0x0}]) [ 955.584188] CUSE: unknown device info "" 03:44:22 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x5}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 955.609882] CUSE: zero length info key specified [ 955.626482] CUSE: unknown device info "" [ 955.640377] CUSE: zero length info key specified [ 955.691197] tls_set_device_offload_rx: netdev lo with no TLS offload [ 956.441767] IPVS: ftp: loaded support on port[0] = 21 [ 956.451267] IPVS: ftp: loaded support on port[0] = 21 03:44:28 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x2000000, 0x5, 0x0, r0, 0x0}]) 03:44:28 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x2000000000000000, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:28 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x6}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:28 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x484080, 0x0) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f00000003c0)={0x6, &(0x7f0000000380)=[{}, {}, {}, {}, {}, {}]}) r3 = dup2(r0, r0) ioctl$BLKPBSZGET(r3, 0x127b, &(0x7f0000000000)) ptrace$setopts(0x4206, r1, 0x0, 0x0) tgkill(r1, r1, 0x8) ptrace$setsig(0x4203, r1, 0x0, &(0x7f0000000080)={0x0, 0x0, 0xf9ffffff}) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000100)={{{@in6=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer2\x00', 0x40800, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r3, &(0x7f0000000040)='./file0\x00', r4, r5, 0x400) 03:44:28 executing program 1: r0 = pkey_alloc(0x0, 0x3) pkey_free(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xfffffffffffff2ff, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xa7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x115, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x141005, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000340)=0x80000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcs\x00', 0x1, 0x0) r4 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r3, 0xc1105511, &(0x7f0000000a80)={{0xfffffffffffffffd, 0x1, 0x80, 0x46, '\x00', 0x1}, 0x0, 0x20000160, 0x9, r4, 0x7, 0x2, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x03\x00', &(0x7f0000000440)=['\x00', ']\x00', '^lo\x01lan0vboxnet0\x00', 'selinux@\x00', '\\\x00', '\x00', 'ip6gre0\x00'], 0x28, [], [0x3, 0x800000000000, 0x3, 0x2]}) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) getgid() r5 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r5, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000380)={@remote, 0x0}, 0x0) dup2(r2, r2) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000001c0)={r6, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') timerfd_create(0x7, 0x80080000) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r7, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) timer_create(0x4, &(0x7f0000000180), &(0x7f00000001c0)) fcntl$getown(r8, 0x9) rt_sigqueueinfo(0x0, 0x25, &(0x7f0000000100)={0x3}) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r9 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x0, 0x1ff, @loopback}, 0x1c) connect$l2tp(r9, &(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, r7, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r9, &(0x7f0000005fc0), 0x800000000000059, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 03:44:28 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x0, 0x1000000]}, &(0x7f0000000000)=0x54) [ 961.307615] CUSE: unknown device info "" [ 961.312489] CUSE: zero length info key specified [ 961.326920] IPVS: ftp: loaded support on port[0] = 21 [ 961.333861] CUSE: unknown device info "" [ 961.338021] CUSE: zero length info key specified 03:44:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x40000000015, 0x805, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000080)={{0xffffffffffffffff, 0x1, 0x5, 0x0, 0x2}, 0x9, 0xffffffffffff2512, 0x2}) bind$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8}, 0x1c) ioctl$EVIOCSKEYCODE_V2(r2, 0x40284504, &(0x7f0000000100)={0x2, 0xb, 0x3f, 0x80, "bcc4407a602ad3eb7ce109bd54c716ccc68326871a23dde08be4b3739946ff9f"}) 03:44:28 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:28 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6000000000000000, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:28 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x4000000, 0x5, 0x0, r0, 0x0}]) [ 961.435946] Dead loop on virtual device ip6_vti0, fix it urgently! [ 961.503920] Dead loop on virtual device ip6_vti0, fix it urgently! [ 961.527659] Unknown ioctl -1068477435 [ 961.543552] CUSE: unknown device info "" [ 961.547728] CUSE: zero length info key specified 03:44:28 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x9}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 961.564570] RDS: rds_bind could not find a transport for fe88::1, load rds_tcp or rds_rdma? [ 961.591573] Dead loop on virtual device ip6_vti0, fix it urgently! [ 961.608624] Dead loop on virtual device ip6_vti0, fix it urgently! [ 961.617340] CUSE: unknown device info "" [ 961.617360] Unknown ioctl 1076380932 [ 961.633037] Dead loop on virtual device ip6_vti0, fix it urgently! [ 961.637424] Unknown ioctl -1068477435 [ 961.647776] RDS: rds_bind could not find a transport for fe88::1, load rds_tcp or rds_rdma? [ 961.657643] CUSE: zero length info key specified [ 961.669144] Unknown ioctl 1076380932 [ 961.683198] Dead loop on virtual device ip6_vti0, fix it urgently! 03:44:28 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x80) write$apparmor_current(r0, &(0x7f0000000040)=@profile={'permprofile ', 'selinux\x00'}, 0x14) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x81000008912, &(0x7f0000000100)="0adc1f123c40a41d88b070") unshare(0x8000400) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x3) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, 0x0, 0x0) 03:44:28 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x100000000000000, 0x5, 0x0, r0, 0x0}]) 03:44:28 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0xffffffff00000000, 0x0, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:28 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0xa}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 961.889535] CUSE: unknown device info "" [ 961.914718] CUSE: zero length info key specified [ 961.947196] CUSE: unknown device info "" 03:44:28 executing program 0: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r0, 0x4038564f, &(0x7f0000000100)={{0x2, @name="c030a5eab5dfd6dfce3d3b977c53dc9cccd68da967ad5b185f864cbbe7611642"}, 0x8, 0x7, 0x8}) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000000)={0xa}) [ 961.970371] CUSE: zero length info key specified 03:44:30 executing program 1: r0 = pkey_alloc(0x0, 0x3) pkey_free(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xfffffffffffff2ff, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xa7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x115, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x141005, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000340)=0x80000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcs\x00', 0x1, 0x0) r4 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r3, 0xc1105511, &(0x7f0000000a80)={{0xfffffffffffffffd, 0x1, 0x80, 0x46, '\x00', 0x1}, 0x0, 0x20000160, 0x9, r4, 0x7, 0x2, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x03\x00', &(0x7f0000000440)=['\x00', ']\x00', '^lo\x01lan0vboxnet0\x00', 'selinux@\x00', '\\\x00', '\x00', 'ip6gre0\x00'], 0x28, [], [0x3, 0x800000000000, 0x3, 0x2]}) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) getgid() r5 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r5, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="00bc0800000000000000c9070000007a085d878df3f85a0f06990100000024f45264499347e31632e80a971034903c3fffb0000000f34669e4cc67f518a55c923b8034280a64d2f0864d89978495b1cd8cf464d3744822b7dca780ae181ebd023699a1179a784157bb5f70a3f5a887977f991dc24ab0e2775d2ed16bb81091589e00021c1ea4870900000000000000eb6a6beeb89e7eae0c0f5f5731f96ebde59df0b83acfdae902d1d2d17f32257b8c5c19482ccbab150760201efd893196e8eb1cc5fcd40496ba920e60df120cf09dbd1716ea577c1c74676bca920ea6fed777b08b221714d462c6925b6e6c468988df22619ec156a11c4b6200b00600010000000000004570d991920000a1d3063a6f4c5d6723b210f2f8ecbf4f2b1a60196fb0a6e2be719b96db91d27b1a1eb9e5b5078ddbcd8f3622c23160cb26c529eaeed5d0c51522e2dc24b2b7daebb90369d71e35d198984390b71bad688a91fa0089c7051393c69563c313d945dded5561b1cb7bf0d9be7e8ba177dba713ecf4068e0e024f469f852ec40a67eca57ae1369861c07df69877b08b5b08282f3bbb5539fc99bd50ce154cd5fa010118bf0d4fcc8e8ccc32601db05941b166c0ab5df3a35e89746a5f0e6bd8c74d9e692b39e27b67a9ac25df67939bb2334b29b138ac360e911c9275a9be7f50a94ca9826d2cee012227b6191770b5ccfa25b8ad14699f4d8e9b1f4468c6630d4b45e7ed6dc06565cdcd70462f2feb688d06f874d3349578fd0a4e97aba5c7be6db93abc4d87cf2b23e37713b5f31485ddd850930e008e1b18d5c423cd891f899eaec1a3056120be3aa33950d5a4ae337907a2b97b4971ef86c84a233ee214afd46ed3"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000380)={@remote, 0x0}, 0x0) dup2(r2, r2) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000001c0)={r6, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') timerfd_create(0x7, 0x80080000) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r7, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) timer_create(0x4, &(0x7f0000000180), &(0x7f00000001c0)) fcntl$getown(r8, 0x9) rt_sigqueueinfo(0x0, 0x25, &(0x7f0000000100)={0x3}) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r9 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x0, 0x1ff, @loopback}, 0x1c) connect$l2tp(r9, &(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, r7, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r9, &(0x7f0000005fc0), 0x800000000000059, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 03:44:30 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x200000000000000, 0x5, 0x0, r0, 0x0}]) 03:44:30 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x2, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:30 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0xb}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) keyctl$invalidate(0x15, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_int(r2, 0x29, 0xb, &(0x7f0000000040)=0x100000000001f, 0x4) sendmmsg(r2, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2a, {0x0, 0x0, 0x0, 0x27000000}}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) 03:44:30 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x0, 0x11000000]}, &(0x7f0000000000)=0x54) 03:44:30 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0xf}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 963.439615] CUSE: unknown device info "" [ 963.443164] IPVS: ftp: loaded support on port[0] = 21 [ 963.472169] CUSE: zero length info key specified [ 963.517113] CUSE: unknown device info "" [ 963.547952] CUSE: zero length info key specified 03:44:30 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x400000000000000, 0x5, 0x0, r0, 0x0}]) [ 963.602407] Dead loop on virtual device ip6_vti0, fix it urgently! [ 963.640226] Dead loop on virtual device ip6_vti0, fix it urgently! 03:44:30 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:30 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x3, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 963.843714] CUSE: unknown device info "" [ 963.851150] CUSE: zero length info key specified 03:44:30 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x8000000000000000, 0x5, 0x0, r0, 0x0}]) [ 963.886608] CUSE: unknown device info "" 03:44:30 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x11}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 963.918249] CUSE: zero length info key specified 03:44:32 executing program 1: r0 = pkey_alloc(0x0, 0x3) pkey_free(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xfffffffffffff2ff, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xa7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x115, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x141005, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000340)=0x80000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcs\x00', 0x1, 0x0) r4 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r3, 0xc1105511, &(0x7f0000000a80)={{0xfffffffffffffffd, 0x1, 0x80, 0x46, '\x00', 0x1}, 0x0, 0x20000160, 0x9, r4, 0x7, 0x2, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x03\x00', &(0x7f0000000440)=['\x00', ']\x00', '^lo\x01lan0vboxnet0\x00', 'selinux@\x00', '\\\x00', '\x00', 'ip6gre0\x00'], 0x28, [], [0x3, 0x800000000000, 0x3, 0x2]}) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) getgid() r5 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r5, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000380)={@remote, 0x0}, 0x0) dup2(r2, r2) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000001c0)={r6, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') timerfd_create(0x7, 0x80080000) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r7, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) timer_create(0x4, &(0x7f0000000180), &(0x7f00000001c0)) fcntl$getown(r8, 0x9) rt_sigqueueinfo(0x0, 0x25, &(0x7f0000000100)={0x3}) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r9 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x0, 0x1ff, @loopback}, 0x1c) connect$l2tp(r9, &(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, r7, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r9, &(0x7f0000005fc0), 0x800000000000059, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 03:44:32 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x4, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x141080, 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000480)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(0xffffffffffffffff, 0xc020660b, 0x0) ioctl$VIDIOC_ENCODER_CMD(r0, 0xc028564d, &(0x7f0000000500)={0x4, 0x1, [0xfff, 0x101, 0x3ff, 0x40, 0x0, 0x0, 0x0, 0x10001]}) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f00000004c0)) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x20a000, 0x0) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000380)="e2da5cdea423495c8b5663b2d9e462f4e65c25cc8b2ba5e1349cd9ae758d94c045f53f48860fd0b3d8013a69034f6ac0d6e1e98dfe38d2d9e2e2c54d473c67bfa22bbf07fadb6002cda4dd466bf8b4ac1fd7837039b702b9d0fa204a8e5df87c3de67d40844e3ddd3c120aee61b90f3b98210922d8d4271c6df39457ffa88a8a1c33837414408c58e56e3fc11ec40ec466928864d45fe30bbdca4189941c975bc6fe8fb0e6bf8e2a58131d1b5d088066c68b8a6ee0c4e1fea78983de57627ebf6f449a310f966c64391d936f99802fb9320ae1") r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/sequencer2\x00', 0x40042, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000000c0)="8dec431bb44aff53a310b4eabef65b9ca28574570c8753d962784ce7563c1f448215fd237bf4c9159a98e9205a38a1fef116825d2a67dccc355557378e26b4e71c9ead8245ce8f8727e4d5e348d6b048462955248e97e362bb149adcd5ad849873b82111c2ecfa383140f9d4c99f525041a886277a6592dbc6b9108911e88a440b93f5c0fae544676b44a19bf06aa255a549db9cb0a9221a90f33fec43b1d074bf", 0xa1, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000580)='fou\x00') sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000640)={&(0x7f0000000540), 0xc, &(0x7f0000000600)={&(0x7f0000000740)=ANY=[@ANYBLOB="000028bd79008000140e865600f30fb637b1f10000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x20044000}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8050}, 0x40) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$session_to_parent(0x12) dup2(r3, r0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0xc81, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x1, 0x40100) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000300)={0x0, @remote, @loopback}, &(0x7f0000000340)=0xc) sendmsg$nl_route(r5, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="0000010000bf6d30e18b4c510e9d91dd882c140a3379bde2b27cdbf35dfd153e4556650900223dbbc577fbf4fb665e9d75dbcacc22b7e70b0b40b031887c1591a1bd48921e0e81f19a0ca98748136eecea289e2b7369690300926144842f2a9913939dca8e9d8b66"], 0x1}}, 0x4008000) ioctl$sock_proto_private(r4, 0x80089ec, &(0x7f0000000140)="039625617620978a4df541244054545eefb285b44d2198c37642636f3bd6084339c6e79154e7a4e1e8a3a316d5a4d756fa828508c3eaae4df2759d4d16de576413772f248c74aae160e44749d604a7af5290efc74ba837ec71ff4bfb5f9a2d51403ecc6b5a4bb2dab710e3367549b45cd0b3fed1c251372400872f340ee3b348964d022f3224519d06adad720a5650c9b04292955ae6fd364adebee641bc911bcdd907f409e8200d95b946789c69b1d8876c") syz_open_dev$usb(&(0x7f00000006c0)='/dev/bus/usb/00#/00#\x00', 0xf8, 0x80000) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREMOVE(r5, &(0x7f0000000680)={0x7, 0x7b, 0x1}, 0x7) unshare(0x40000000) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) 03:44:32 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x0, r0, 0x0}]) 03:44:32 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x12}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:32 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x0, 0x88000000]}, &(0x7f0000000000)=0x54) 03:44:32 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x13}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 965.677217] IPVS: ftp: loaded support on port[0] = 21 [ 965.685975] CUSE: unknown device info "" [ 965.697523] CUSE: zero length info key specified [ 965.707782] CUSE: unknown device info "" [ 965.748991] CUSE: zero length info key specified 03:44:32 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x0, r0, 0x0}]) [ 965.820052] IPVS: ftp: loaded support on port[0] = 21 [ 965.833481] Dead loop on virtual device ip6_vti0, fix it urgently! 03:44:32 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0xf0}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:32 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x5, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 965.875683] Dead loop on virtual device ip6_vti0, fix it urgently! 03:44:32 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x300}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:32 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x7, 0x0, r0, 0x0}]) [ 966.141509] CUSE: unknown device info "" [ 966.167903] CUSE: zero length info key specified [ 966.232715] CUSE: unknown device info "" [ 966.272243] CUSE: zero length info key specified [ 966.448751] Dead loop on virtual device ip6_vti0, fix it urgently! 03:44:34 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x6, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:34 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x500}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:34 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0}]) 03:44:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x141080, 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000480)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(0xffffffffffffffff, 0xc020660b, 0x0) ioctl$VIDIOC_ENCODER_CMD(r0, 0xc028564d, &(0x7f0000000500)={0x4, 0x1, [0xfff, 0x101, 0x3ff, 0x40, 0x0, 0x0, 0x0, 0x10001]}) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f00000004c0)) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x20a000, 0x0) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000380)="e2da5cdea423495c8b5663b2d9e462f4e65c25cc8b2ba5e1349cd9ae758d94c045f53f48860fd0b3d8013a69034f6ac0d6e1e98dfe38d2d9e2e2c54d473c67bfa22bbf07fadb6002cda4dd466bf8b4ac1fd7837039b702b9d0fa204a8e5df87c3de67d40844e3ddd3c120aee61b90f3b98210922d8d4271c6df39457ffa88a8a1c33837414408c58e56e3fc11ec40ec466928864d45fe30bbdca4189941c975bc6fe8fb0e6bf8e2a58131d1b5d088066c68b8a6ee0c4e1fea78983de57627ebf6f449a310f966c64391d936f99802fb9320ae1") r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/sequencer2\x00', 0x40042, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000000c0)="8dec431bb44aff53a310b4eabef65b9ca28574570c8753d962784ce7563c1f448215fd237bf4c9159a98e9205a38a1fef116825d2a67dccc355557378e26b4e71c9ead8245ce8f8727e4d5e348d6b048462955248e97e362bb149adcd5ad849873b82111c2ecfa383140f9d4c99f525041a886277a6592dbc6b9108911e88a440b93f5c0fae544676b44a19bf06aa255a549db9cb0a9221a90f33fec43b1d074bf", 0xa1, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000580)='fou\x00') sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000640)={&(0x7f0000000540), 0xc, &(0x7f0000000600)={&(0x7f0000000740)=ANY=[@ANYBLOB="000028bd79008000140e865600f30fb637b1f10000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x20044000}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8050}, 0x40) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$session_to_parent(0x12) dup2(r3, r0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0xc81, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x1, 0x40100) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000300)={0x0, @remote, @loopback}, &(0x7f0000000340)=0xc) sendmsg$nl_route(r5, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="0000010000bf6d30e18b4c510e9d91dd882c140a3379bde2b27cdbf35dfd153e4556650900223dbbc577fbf4fb665e9d75dbcacc22b7e70b0b40b031887c1591a1bd48921e0e81f19a0ca98748136eecea289e2b7369690300926144842f2a9913939dca8e9d8b66"], 0x1}}, 0x4008000) ioctl$sock_proto_private(r4, 0x80089ec, &(0x7f0000000140)="039625617620978a4df541244054545eefb285b44d2198c37642636f3bd6084339c6e79154e7a4e1e8a3a316d5a4d756fa828508c3eaae4df2759d4d16de576413772f248c74aae160e44749d604a7af5290efc74ba837ec71ff4bfb5f9a2d51403ecc6b5a4bb2dab710e3367549b45cd0b3fed1c251372400872f340ee3b348964d022f3224519d06adad720a5650c9b04292955ae6fd364adebee641bc911bcdd907f409e8200d95b946789c69b1d8876c") syz_open_dev$usb(&(0x7f00000006c0)='/dev/bus/usb/00#/00#\x00', 0xf8, 0x80000) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREMOVE(r5, &(0x7f0000000680)={0x7, 0x7b, 0x1}, 0x7) unshare(0x40000000) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) 03:44:34 executing program 1: syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x4, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, &(0x7f00000004c0)) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000300)=ANY=[@ANYBLOB="0100000003000040", @ANYRES32=r0, @ANYBLOB="00000000008000000000000000f0ffffffffffff", @ANYRES32=r0, @ANYBLOB="0000000000800000010000000000000000000000734c967ceaab3c6e1f9c8b8fd7c2f8cf26f6442b115b027547efe34a9ce72aff7ac4d9c011aa97efc156372ae62a343f6d1cd96d9bc9288b216281ee3bdd9efcc6991745a1f7a9fab597e68a0c9768f4e4e2c425eae5504a4c38550912f597bfd54a0c14c6c2e92e3d5dff0d9bc12e8d", @ANYRES32=r0, @ANYBLOB="0000000000000000000000000010010100000000"]) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000000c0), &(0x7f0000000480)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r3 = socket$inet_smc(0x2b, 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_PRIORITY(r0, 0x40045644, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') tee(0xffffffffffffffff, r4, 0x0, 0x8) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000003300)={{{@in6=@mcast2, @in6=@dev}}, {{@in=@remote}}}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f00000035c0)={&(0x7f0000000540), 0xc, 0x0}, 0x24008011) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000100)={{0x6}, {0x81, 0xffffffff}}) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f00000001c0)={0x0, 0xfb, 0xa4, 0x2, 0x1ff, "f5fa44d336847328db4e4f553770457b", "36412a75528ce45efb7c98008ed5eb18057bcf6db0cd6be1972e094de66171c9517504eda991ed0a45b3d78245c06dcec88a72dc9b7b85c4615fb98ccdf363f6e23fc3cc0575910e045d2abf774ede13013b6e424f47d73d30458f55ecbb95109792f6f87527a40beaac5df26271bd894c57cc6e680bcb339f815d223587ee3dcefc9239557e3b7589668adeee913c"}, 0xa4, 0x3) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f0000000180)={@remote, @loopback}, 0xc) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x1f}, 0x0) 03:44:34 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x0, 0x100000000000000]}, &(0x7f0000000000)=0x54) [ 967.716556] IPVS: ftp: loaded support on port[0] = 21 [ 967.725037] CUSE: unknown device info "" [ 967.729302] CUSE: zero length info key specified [ 967.754616] CUSE: unknown device info "" 03:44:34 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x600}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 967.790804] CUSE: zero length info key specified 03:44:34 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x2, r0, 0x0}]) [ 967.840287] IPVS: ftp: loaded support on port[0] = 21 03:44:34 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x900}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(r0, &(0x7f00000001c0), 0xd9cf) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() sendmsg$kcm(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000880)="b788af65722b2e7bb123d314a1191f74fd1ef2069b32a504d3f0aa3bd8ce3976f213863f274666eb8e7a42c4e9ff4ddb293f0e9298c603", 0x37}], 0x1}, 0x800) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) recvmsg(0xffffffffffffffff, 0x0, 0x2) openat$cgroup_ro(r1, 0x0, 0x2761, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r6, 0x4008ae89, &(0x7f0000000200)={0x7b, 0x0, [0x10a]}) 03:44:34 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x4, r0, 0x0}]) 03:44:34 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x7, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 968.151053] CUSE: unknown device info "" [ 968.159512] CUSE: zero length info key specified 03:44:35 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0xa00}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 968.193811] CUSE: unknown device info "" [ 968.200536] CUSE: zero length info key specified 03:44:35 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x1000000, r0, 0x0}]) 03:44:35 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x8, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040), 0x3ae) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x1, @broadcast, 'hsr0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000180)="cc94618fd62aadd28d6a4d455cf8037fb357bc2d05e9e6f006be0859cbdd5dc94544783ad31b973a192da4217702e6f92b84452b6c791b1fc4b2bad4eff8e311851c86d797d9939dbc7881a801ac1d187dcb85689e6c5bbdcdece71b0a622ca2f6abcf2f8c70c8badec3bacc9521d15d993970f13ad4dc55d5cf26d3a4311e38afebf0fb342ad05aa7e2948b991b0522a5866c249a8b4b7be52714cc2ee2a8d504eb7cf1c6e1888ebd3964c612f46c7073c5276d1786983449bf53212bbc812f9ba1fdfdc827c4fe5a6e54792bb9c4fe279dac03", 0xd4}, {&(0x7f0000000680)="dd63bd37", 0x4}, {&(0x7f00000006c0)="4060ea2497a7f0410f321e9d8105e5a511c02419f4fd7de312c7865fc2475579a2b24087715b5cbc39c12c158e3f4fe8e4a895a5c150b2f8fca8d433830afe2e48b6deaa9283f5895324e7cf7427cb553861513e05aecc5f2a3f927349fa430444351c0a11042ab21bb0fcfa480c46b02988fb3afb5db66517ce3539cb5e44cd82abc1e579e180fef2a879b44dfe5e2f3016fc33131b6ee485fc7af41ba0eec0358ecec9e22db1f68b4bd90d18b37785cac47f1fdd3facd0becc14a12dc893d9e8ecd7bcca61ff942400c55dbf8a59760eda30b654a3d618392bb734276ef0c40b97d793c704ff6e0d9d8b4d58d740ce5bded49b117f48c3", 0xf8}, {&(0x7f0000000380)="d6fbbc00955a5d0930c0d246134a2441b1c2e6d86b58a9d2a8efb85f064d0895dec2b52b1dff613bd75f704f607578bd6f17b8ab10882f62f1944d06a27d9291f941f735fa2c2bf5d7d696026779c3de4eb1b709e5b843799a1ef28a69532a8f21ee9612045f2e786e30040e204c4303", 0x70}, {&(0x7f0000000400)="44ea596f000aab8461be5e06e61c88d6b3c884f51d5dcad288", 0x19}], 0x5, &(0x7f00000004c0)=[{0x28, 0x11f, 0x2, "7fcb67eef866810e19dbbcf8765a756ee73706"}, {0x28, 0x10b, 0xc88f, "50fe93e207ac5b960800000074193f6e7b4495492f"}, {0xffffffffffffff11, 0x1ff, 0x8, "8519048600e5e0139ed218ef7200bd8fc222a5d1488502d8dcc4e36db120fd085f060acac59646a9181d675d046194d806b7ffe475545a5e928e304b557df0c980415c954f99b599e7940b42faa5d5aa978e7327624576f6e894bf37119042752c3f24d15fef5c74caa0d700e6726cb0f9f853c8a1dae3d80645dc81150becb04946a36811410f349a9c71c81127d43b23c583476d6caee721e8d2a2c581b693e69d9af6726507409a808b1c745cd7be9771199bdfad7dca850c0dd8bd8c7e569ffe2ce0950108081f8bd6c8daa9d96e131d4ab460243b466246b01173185897e70ad66b23182001c17e124b47"}], 0x150}, 0x6}], 0x1ad, 0x80000) r3 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x7fffc, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r3, 0x6, 0x15, &(0x7f0000000080)=0x3, 0x4) ioctl$int_in(r2, 0x5473, &(0x7f00000000c0)=0x81) 03:44:35 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0xb00}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 968.434053] CUSE: unknown device info "" [ 968.442586] CUSE: zero length info key specified [ 968.461063] CUSE: unknown device info "" [ 968.467386] CUSE: zero length info key specified [ 968.627317] IPVS: ftp: loaded support on port[0] = 21 03:44:37 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x0, 0x1100000000000000]}, &(0x7f0000000000)=0x54) 03:44:37 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x2000000, r0, 0x0}]) 03:44:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffe, 0x20002) process_vm_writev(0x0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/22, 0xffffff95}], 0x1, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB='<\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012100c000100626f6e000400ffffffff85fc1f27c20347ef55a4b062db397d29fd75466f4ee0fa4765b4eeee3f"], 0x3c}}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000000)={0x2, 0x10000004e20, @rand_addr=0xff}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000040)={{{@in=@broadcast, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000140)=0xe8) connect$inet(r3, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x4000, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r5, 0x0, 0x4, &(0x7f0000000180), 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r5, &(0x7f0000000000), 0x0, 0x4008000, 0x0, 0x0) ioctl$EVIOCSREP(r6, 0x40084503, &(0x7f0000000300)=[0x3, 0xb]) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0x27}}) getsockopt$sock_buf(r4, 0x1, 0x40, &(0x7f00000002c0)=""/60, &(0x7f0000000180)=0x3c) madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x64) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r6, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r6, &(0x7f0000000440)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc7ef2593e11073d8507f4ac7589fd93ac187e5dba2bd86d86763f", 0x3b, 0x20000800, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d}, {0x2, 0x4e23}, {0x2, 0x4e20, @multicast1}, 0x1c, 0x5, 0x7fff, 0x9976, 0x80000006, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22}, {0x2, 0x4e21, @dev}, {0x2, 0x4e24, @broadcast}, 0xfd, 0x6, 0x20, 0x40, 0x0, 0x0, 0x0, 0x0, 0x4}) 03:44:37 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0xc, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:37 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x24) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000240)={0x12, 0xd3, &(0x7f0000000140)="24862aa704431767e432098bcdf46ec0f28fbcaed654ef8292538e0adfd667d75b7113eaf270cdd3134c3f6a69969ab52e6506ee6745e50486200c90e8d110d00a13bfe3df3720344511adfca272010a570284897421f6232a868e44fce45709f3194b57c9a01581a332508ac652f23b84005ba6ddbc0f5d99a642ba7d2cc61b16008b8bbf6ca9be2d11845d6b91d2ebc266f07176afe44448ea5b897496630ee378c6ff888c715c491bf8b771bbdece4296b8e564325b92a549eb728d5d42f0570be016a87ade60c8642fd41d53f13ccb01ef"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r3, 0x1, 0x200000010, &(0x7f0000000080)=0x5, 0x4) write$binfmt_elf32(r2, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00'], 0x1) fstat(r2, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r4, r4) recvmsg(r3, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=""/148, 0x94}, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000037f, 0x0) 03:44:37 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0xc5f}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 970.580409] CUSE: unknown device info "" [ 970.591438] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 970.592169] CUSE: zero length info key specified 03:44:37 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0xf00}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 970.628600] IPVS: ftp: loaded support on port[0] = 21 03:44:37 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x9, 0x280) faccessat(r0, &(0x7f00000000c0)='./file0\x00', 0x10, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000080)={0x18, 0x1, 0x0, {0x6445405f}}, 0x18) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) accept4$alg(r0, 0x0, 0x0, 0x800) 03:44:37 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x4000000, r0, 0x0}]) [ 970.678300] CUSE: unknown device info "" [ 970.720645] CUSE: zero length info key specified 03:44:37 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x1100}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:37 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x10, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:37 executing program 0: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mprotect(&(0x7f000087e000/0x1000)=nil, 0x1000, 0x0) mprotect(&(0x7f000066e000/0x2000)=nil, 0x2000, 0x8) r0 = socket$inet6(0xa, 0x5, 0xda) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000000)={{0xa, 0x4e23, 0x3ff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xffffffffffffffc1}, {0xa, 0x4e23, 0x8f0, @remote, 0x20}, 0x6, [0x4, 0x9, 0x0, 0xfffffffffffffff7, 0x40, 0x1, 0xeb64, 0x8]}, 0x5c) mprotect(&(0x7f000069d000/0x4000)=nil, 0x4000, 0x0) [ 970.913219] CUSE: unknown device info "" [ 970.950726] CUSE: zero length info key specified [ 970.985171] CUSE: unknown device info "" [ 971.001216] CUSE: zero length info key specified [ 971.239449] IPVS: ftp: loaded support on port[0] = 21 03:44:38 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x0, 0x8800000000000000]}, &(0x7f0000000000)=0x54) 03:44:38 executing program 1: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x3, 0x7}) r1 = semget$private(0x0, 0x9, 0x0) semtimedop(r1, &(0x7f00000a8000)=[{0x0, 0xfffffffffffffff9}], 0x1, 0x0) semop(r1, &(0x7f0000390000)=[{0x0, 0x8001}], 0x1) semctl$IPC_RMID(r1, 0x0, 0x0) 03:44:38 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x100000000000000, r0, 0x0}]) 03:44:38 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x1200}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:38 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x60, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 971.384709] CUSE: unknown device info "" 03:44:38 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x1300}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 971.409228] CUSE: zero length info key specified [ 971.444787] CUSE: unknown device info "" [ 971.458691] IPVS: ftp: loaded support on port[0] = 21 [ 971.468692] CUSE: zero length info key specified 03:44:38 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x200000000000000, r0, 0x0}]) 03:44:38 executing program 1: bind$inet(0xffffffffffffffff, 0x0, 0x0) socket$pppoe(0x18, 0x1, 0x0) prctl$PR_GET_FPEMU(0x9, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000080)={0x0, 0x1f}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f00000000c0)={&(0x7f0000ffc000/0x2000)=nil, 0x6, 0x4, 0x25, &(0x7f0000ffc000/0x2000)=nil, 0x81}) listen(r1, 0x0) accept(r1, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000600)={0x0, 0x0, 'client0\x00', 0x0, "f53f0094036c6c00", "63f91a3c787b91ec03f9fd428f0172e2c149b83499973de883ddba09a57dcc0e"}) pipe2(&(0x7f0000000000), 0x80000) 03:44:38 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x5f0c}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:38 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x300, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:38 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x400000000000000, r0, 0x0}]) [ 971.746888] CUSE: unknown device info "" [ 971.751239] CUSE: zero length info key specified [ 971.811024] CUSE: unknown device info "" [ 971.821741] CUSE: zero length info key specified 03:44:39 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x88000, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r1, 0x80046402, &(0x7f0000000080)=0x2) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x80, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f00000000c0)={0x9}) [ 972.214694] IPVS: ftp: loaded support on port[0] = 21 03:44:39 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x0, 0x0, 0x11]}, &(0x7f0000000000)=0x54) 03:44:39 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x500, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:39 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x8000000000000000, r0, 0x0}]) 03:44:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="020b000007000000000021002d54036205001a00005a0e299d939fa4d8f2218466b8625a0c9a934d4fe6cc11100008c99f3d653c00f0ff9d"], 0x38}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x20, 0x0) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x8, 0x200000) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) recvmmsg(r1, &(0x7f00000009c0), 0x4000000000002ab, 0x22, &(0x7f0000000a80)={0x0, r2+10000000}) 03:44:39 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x7e8e}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 972.441656] CUSE: unknown device info "" 03:44:39 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x89) ioctl$KVM_PPC_ALLOCATE_HTAB(r2, 0xc004aea7, &(0x7f0000000200)=0x7fff) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) setsockopt$inet_buf(r1, 0x0, 0x27, &(0x7f00000000c0)="d7938b2acd4a655bbb5fea2adc06fd73cf39f9efc532774a0bbaa72bf8564d3087be277250f967f5f2f41c07c3aebf86bae83fb8f6fede49b8eaea71af82faa9255db1f18c267cd50fcd34afddf8c5442f0172f5ffa7eab87cc76a642d741c27f5032ff15ddfabb7155c4245e91c69fc5201ede8fd16fc6c85ac5a3098e319a6c6bf7b23ef83bd5732a7437b6198246b7e8c8c9b277db1b585", 0x99) close(r0) r3 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x40, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r3, 0x4008af60, &(0x7f0000000180)={@reserved}) [ 972.473498] CUSE: zero length info key specified 03:44:39 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x8100}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:39 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x204) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000280)={"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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400280) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4040aea0, &(0x7f0000000100)) r4 = dup2(r1, r2) ioctl$VIDIOC_G_STD(r4, 0x80085617, &(0x7f0000000000)=0x0) ioctl$VIDIOC_S_STD(r4, 0x40085618, &(0x7f00000000c0)=r5) [ 972.499393] CUSE: unknown device info "" [ 972.500229] IPVS: ftp: loaded support on port[0] = 21 [ 972.536892] CUSE: zero length info key specified 03:44:39 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x2}]) 03:44:39 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x600, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") syz_emit_ethernet(0x211d49, &(0x7f0000000a00)=ANY=[@ANYBLOB="aaaaaaaaaaaa02070000000086dd60b4090000303a0002000000000032d8af063e58e94c94b30000000032ffe0000002ff0200000000000000000000000000018200907800096d614acfedb0576a5d58f943290060b680fa0000000000000000000000000e03ffffffffffff000000000000"], 0x0) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x800) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r1, 0xc4c85512, &(0x7f0000000400)={{0x0, 0x5, 0x5, 0x8, 'syz0\x00', 0x5}, 0x1, [0x37, 0x7, 0xab68, 0x101, 0x100000000, 0x3f509b4f, 0x3, 0x8000, 0x3, 0x20e3, 0x9f, 0x6, 0x3, 0x100, 0xff, 0x3, 0xa213, 0x7ff, 0x80000000, 0x9, 0xd964, 0xb9, 0x289a, 0x3, 0x2, 0x9, 0x89, 0xf2, 0x2, 0x9, 0x401, 0x9, 0x6, 0x0, 0x6, 0x1, 0xc548, 0x0, 0xd60f, 0x6, 0x8, 0x5, 0x49, 0x6, 0xfffffffffffff800, 0x10001, 0x2, 0x3, 0x3c, 0xfffffffffffffffd, 0x9, 0x1, 0x8001, 0x6, 0xfffffffffffffc01, 0x7, 0x3ff, 0x1f, 0x3, 0x6e0, 0x1000, 0x8, 0x6, 0x3f, 0x9, 0x7fffffff, 0x7, 0x1ff, 0x3, 0xc0e, 0x8, 0x5, 0x8, 0x8000, 0x7f, 0x101, 0x4, 0x9, 0xea8, 0x100000001, 0xffffffffffff300e, 0x9, 0x1, 0x4, 0x3b9, 0x5, 0x5, 0x10000, 0x8000, 0x9, 0x0, 0x3, 0x0, 0x5, 0x80000000, 0x101, 0x9, 0x6, 0x5, 0x7, 0x6, 0x3, 0x5, 0x400, 0xfffffffffffffffa, 0x8000, 0x10000, 0x9, 0x100000000, 0x6, 0x3, 0x3, 0x10000, 0x3, 0x4, 0x1000, 0x7, 0x3f, 0x2, 0x8, 0xdb8, 0x480000000, 0x3, 0x8cb2, 0xfb, 0x8000000000000, 0x3, 0x2], {r2, r3+30000000}}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x101}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000a80)={r4, 0x0, 0x400}, &(0x7f0000000ac0)=0x8) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, r1, 0x0, 0x9, &(0x7f00000002c0)='$trusted\x00', 0xffffffffffffffff}, 0x30) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000009c0)=@buf={0x1c, &(0x7f0000000140)="03f1bc7ae99e7648ae79d9832f037421abda00123485ba8689d3dbc7"}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000340)=0x0) kcmp$KCMP_EPOLL_TFD(r7, r8, 0x7, r1, &(0x7f0000000380)={r1, r0, 0x9}) mq_timedreceive(r1, &(0x7f0000000180)=""/176, 0xb0, 0x40, &(0x7f0000000280)={r5, r6+10000000}) r9 = creat(&(0x7f0000000900)='./file0\x00', 0x40) write$P9_RLOPEN(r9, &(0x7f00000000c0)={0x18, 0xd, 0x1, {{0x80, 0x4, 0x3}, 0x8000}}, 0x18) ioctl$sock_rose_SIOCDELRT(r9, 0x890c, &(0x7f0000000940)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x5, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={'rose', 0x0}, 0x6, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast, @default]}) 03:44:39 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x8e7e}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 972.806218] CUSE: unknown device info "" [ 972.823638] CUSE: zero length info key specified [ 972.872453] CUSE: unknown device info "" [ 972.878622] CUSE: zero length info key specified [ 973.069425] IPVS: ftp: loaded support on port[0] = 21 03:44:40 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0xf000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:40 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x4}]) 03:44:40 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x700, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) syz_mount_image$gfs2(0x0, &(0x7f0000000100)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=:/file1']) mkdir(&(0x7f0000000040)='./file1/file1\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x6402, 0x0) setsockopt$CAIFSO_REQ_PARAM(r2, 0x116, 0x80, &(0x7f0000000380)="5ed5a6145c289d35b83b36c8225e11252f04ea90c6426a626aa1d7ad6d2b10b9c760381f696c34431092ef12db1dff1fd5d947b2964eebbb3f6a129298a19c4e279f4e8739d75ab69c8c0ee61185255f325dd9b4b097e6db5580364faee236c1ce9a501136639461cf93b80741821b24027ba563485f74787d5dab2633b99cb12ecbcae0f3e8331b453d6bcbef6075151e025587f5f9bec491b7021817bc0b4d13b123bd363fa2d463c421021d4780c2d46a596ab2657f8e2adbf5d0", 0xbc) renameat(r1, &(0x7f0000000180)='./file0\x00', r1, &(0x7f00000001c0)='./file1\x00') 03:44:40 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x0, 0x0, 0x88]}, &(0x7f0000000000)=0x54) 03:44:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0xc1105518, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8918, &(0x7f0000000000)={'syz_tun\x00', {0x2, 0x0, @local}}) 03:44:40 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x34000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:40 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000100)={0x0, {0x2, 0x4e20, @broadcast}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @multicast1}, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x1) fcntl$setstatus(r3, 0x4, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, r0) r4 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)="d126e08d919224942b", 0x9, 0xffffffffffffffff) keyctl$read(0xb, r4, &(0x7f0000000240)=""/142, 0x8e) ioctl$TCXONC(r3, 0x541d, 0x0) openat$uhid(0xffffffffffffff9c, 0x0, 0x10000000000801, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x3) dup3(0xffffffffffffffff, r2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000300)={0x0, @in6={{0xa, 0x4e20, 0x2d400, @ipv4={[], [], @local}, 0xfffffffffffffffe}}, [0x0, 0xfffffffffffffffd, 0xd194, 0xff, 0x7d, 0x0, 0x0, 0x2, 0x8, 0x0, 0x3ff, 0x8, 0x2, 0x1000, 0x5]}, &(0x7f0000000400)=0x100) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000004c0)={'nat\x00'}, &(0x7f0000000540)=0x78) r6 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r6, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @loopback}, 0xc) setsockopt$inet_mreqn(r6, 0x0, 0x27, &(0x7f0000000200)={@multicast2, @remote}, 0xc) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000440)={r5, 0xfffffffffffffff9, 0x9000000, 0x6}, &(0x7f0000000480)=0x10) ioctl$KDSKBLED(r3, 0x4b65, 0x90c) r7 = socket$inet_sctp(0x2, 0x5, 0x84) unshare(0x4000000) write(0xffffffffffffffff, 0x0, 0x0) keyctl$update(0x2, r4, &(0x7f0000000080)="909eabedf90dd12fa5bdaaadc9b323c3e8a44a47d77836c510c4559d047cde9941f03470a52fe203ff3b6a49c6ea4d2dd35545d8e181bbe29c9dbf0a79735b55da379cf6cc4f968cfa2519e6b5", 0x4d) dup3(r3, r7, 0x80000) [ 973.405655] CUSE: unknown device info "" [ 973.422249] CUSE: zero length info key specified [ 973.451620] CUSE: unknown device info "" [ 973.465037] IPVS: ftp: loaded support on port[0] = 21 [ 973.483674] CUSE: zero length info key specified [ 973.497324] overlayfs: failed to resolve ':/file1': -2 03:44:40 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0xc00, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:40 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x1000000}]) [ 973.627435] overlayfs: failed to resolve ':/file1': -2 03:44:40 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x400300}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:40 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x200000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000400)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x4000, 0x78000822, &(0x7f0000ffa000/0x4000)=nil) shmget$private(0x0, 0x1000, 0x1000, &(0x7f0000ffa000/0x1000)=nil) shmget$private(0x0, 0x3000, 0xa, &(0x7f0000ffc000/0x3000)=nil) shmget(0x3, 0x1000, 0x100, &(0x7f0000ffe000/0x1000)=nil) r2 = shmget$private(0x0, 0x4000, 0xa00, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_STAT(r2, 0x2, &(0x7f0000000440)=""/19) r3 = socket$inet(0x2, 0x3, 0x2) r4 = syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x3ff, 0x1) ioctl$SCSI_IOCTL_GET_PCI(r4, 0x5387, &(0x7f0000000340)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20100, 0x0) r6 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="8800000000000000290000000400000074c79a868e3d11b8717ca6eddf13cb141c0e3aeed821c30e33234cee2883e125f63286d7d0c0b36c255ca5fd36111437c79d6905b42a9c7c5cdb7aed79ac944a094d95bdf6747a88b528203a7decdd6c33f5b978a9640c10706f31a302ce6f9a8d173b97f9ef32600533e9a768605401576931005288cf00"], 0x88}, 0x0) sendmmsg(r6, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000001600)=[{0xc}], 0xc}}], 0xb, 0x0) getsockname(r5, &(0x7f0000000140)=@ipx, &(0x7f0000000240)=0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000980)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000002000)={@local, 0x7e, r7}) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r5, 0x28, 0x0, &(0x7f0000000100)=0x6, 0x8) setsockopt$inet_int(r3, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) dup2(r3, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3e7, 0x0, 0x0, 0x3, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x3, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKGETSIZE64(r5, 0x80081272, &(0x7f00000003c0)) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='clear_refs\x00') openat$vnet(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vhost-net\x00', 0x2, 0x0) pwritev(r8, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) [ 973.743822] CUSE: unknown device info "" [ 973.743834] CUSE: zero length info key specified 03:44:40 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x2000000}]) [ 973.808831] CUSE: unknown device info "" [ 973.813022] CUSE: zero length info key specified 03:44:40 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x2000, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$packet(0x11, 0x400000000000003, 0x300) getsockname$inet(r0, &(0x7f0000000040)={0x2, 0x0, @initdev}, &(0x7f0000000080)=0x330) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000100)=[{0x4000000028, 0x0, 0x0, 0xfffff010}, {0x80000006}]}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') 03:44:40 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0xf0ffff}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 974.104175] CUSE: unknown device info "" [ 974.108370] CUSE: zero length info key specified [ 974.133427] protocol 88fb is buggy, dev hsr_slave_0 [ 974.138615] protocol 88fb is buggy, dev hsr_slave_1 [ 974.187202] CUSE: unknown device info "" [ 974.191391] CUSE: zero length info key specified [ 974.213446] protocol 88fb is buggy, dev hsr_slave_0 [ 974.218529] protocol 88fb is buggy, dev hsr_slave_1 [ 974.247376] IPVS: ftp: loaded support on port[0] = 21 03:44:41 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x0, 0x0, 0x1100]}, &(0x7f0000000000)=0x54) 03:44:41 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x4000000}]) 03:44:41 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:41 executing program 1: r0 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x8000000000044000) io_setup(0x9, &(0x7f0000000400)=0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000040)={&(0x7f0000000000)=[0x0], 0x1}) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000005c0)) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0xe0400000000000, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000, 0x407000}]) ioctl$SIOCRSSCAUSE(0xffffffffffffffff, 0x89e1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) 03:44:41 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x6000, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:41 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, 0x0, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x200, 0x80000) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0x7, &(0x7f0000000040)={0xa212, 0x8, 0x5, 0x4}, 0x10) close(r2) socket$key(0xf, 0x3, 0x2) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1008000000016) 03:44:41 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 974.641664] IPVS: ftp: loaded support on port[0] = 21 [ 974.648433] CUSE: unknown device info "" [ 974.662233] CUSE: zero length info key specified [ 974.671654] CUSE: unknown device info "" [ 974.680704] CUSE: zero length info key specified 03:44:41 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x100000000000000}]) 03:44:41 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x1000000, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:41 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffac14141103040000000000000000000000ac1414aaac141400"], 0x0) 03:44:41 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x3000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 974.928531] CUSE: unknown device info "" [ 974.934347] CUSE: zero length info key specified [ 974.962845] CUSE: unknown device info "" 03:44:41 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file0,workdir=./file1']) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) open(&(0x7f0000000180)='./bus\x00', 0x3b00, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) [ 974.986535] CUSE: zero length info key specified [ 975.175252] audit: type=1804 audit(2000000682.070:73): pid=20401 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir870356899/syzkaller.9e1A7R/447/file0/bus" dev="overlay" ino=149603 res=1 [ 975.262834] IPVS: ftp: loaded support on port[0] = 21 [ 975.292738] overlayfs: filesystem on './file0' not supported as upperdir [ 975.316701] audit: type=1804 audit(2000000682.210:74): pid=20407 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir870356899/syzkaller.9e1A7R/447/file0/bus" dev="overlay" ino=149603 res=1 [ 975.402320] audit: type=1804 audit(2000000682.210:75): pid=20407 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir870356899/syzkaller.9e1A7R/447/file0/bus" dev="overlay" ino=149603 res=1 03:44:42 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x0, 0x0, 0x8800]}, &(0x7f0000000000)=0x54) 03:44:42 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x200000000000000}]) 03:44:42 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:42 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x408002, 0x0) clock_gettime(0xfffffffffffffff9, &(0x7f00000000c0)) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5e0, 0x450, 0x0, 0x0, 0x0, 0x1d8, 0x548, 0x548, 0x548, 0x548, 0x548, 0x6, &(0x7f0000000040), {[{{@ip={@broadcast, @remote, 0xff000000, 0x0, 'bcsf0\x00', 'veth1_to_hsr\x00', {0xff}, {}, 0x0, 0x3}, 0x0, 0xc0, 0xf0, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x6}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e22}}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x3}}}, {{@uncond, 0x0, 0x108, 0x130, 0x0, {}, [@common=@unspec=@mark={0x30, 'mark\x00', 0x1, {0x1, 0x4}}, @common=@set={0x40, 'set\x00', 0x0, {{0x7fff, [0x80, 0xbd, 0x2, 0x2, 0x9, 0x4], 0x0, 0x7fff}}}]}, @TTL={0x28, 'TTL\x00', 0x0, {0x0, 0x7ff}}}, {{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@socket0={0x20, 'socket\x00'}, @common=@ah={0x30, 'ah\x00', 0x0, {0x40, 0x7fffffff}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 0x0, 0x4, [0xe, 0x14, 0x0, 0xf, 0x28, 0x24, 0x2e, 0x3a, 0x10, 0x0, 0x7, 0x37, 0x9, 0x2a, 0x12, 0xe], 0x1, 0x2, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x9, [0x101, 0x0, 0x4, 0x8000, 0x5], 0x7, 0x80000000}, {0x7, [0x2, 0x90, 0x5, 0x3, 0x7ff, 0x7], 0x7, 0x2}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x640) 03:44:42 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x2000000, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:42 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000580)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000100)) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f00000001c0)={0x2, 0x7, 0x4, 0x5, 0x7fffffff, 0x7}) userfaultfd(0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000180)={0x1000, 0x30, 0x0, r2}) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000140)={r3, 0x9}, 0x8) [ 975.831512] CUSE: unknown device info "" [ 975.841846] CUSE: zero length info key specified [ 975.861028] CUSE: unknown device info "" 03:44:42 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000200), &(0x7f0000000240)=0xc) getpeername$packet(r0, &(0x7f00000000c0), &(0x7f00000001c0)=0x14) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 975.881562] CUSE: zero length info key specified 03:44:42 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x5000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 975.908661] IPVS: ftp: loaded support on port[0] = 21 03:44:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x200) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'yam0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x9, 0x0, [0x101, 0x922a, 0x6, 0x3]}}) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x40040, 0x0) 03:44:42 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x400000000000000}]) 03:44:42 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x3000000, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:42 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x6000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 976.210653] CUSE: unknown device info "" [ 976.233143] CUSE: zero length info key specified [ 976.260477] CUSE: unknown device info "" [ 976.284092] CUSE: zero length info key specified [ 976.514301] IPVS: ftp: loaded support on port[0] = 21 03:44:43 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x0, 0x0, 0x1000000]}, &(0x7f0000000000)=0x54) 03:44:43 executing program 1: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)=ANY=[@ANYBLOB="73656375726974790000000000000000000000e9ffffff0000000000000000000e00000004000000c0080200efebffffffff09673fa644cc9d57e89b86d523c34714ffffff28918900280300002803f936ffffffff04000000478d4534c280b684a54c92bea45cb994070a7444a23ef22e78979bc2af6edd5e14f63cb7a7b5511d6b410978e5d8fde231d45c67f5f2d42f6c4325740d87f915074093"], 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@setneightbl={0x1c, 0x43, 0x601, 0x0, 0x0, {}, [@NDTA_NAME={0x8, 0x1, '\x00'}]}, 0x1c}}, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x80000, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 03:44:43 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:43 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x8000000000000000}]) 03:44:43 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180)={0x0, 0x0, 0x3, [0x8, 0x0, 0x0]}, &(0x7f00000002c0)=0xe) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000240)={0x18000000, 0x7ff, 0x37}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8936, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef]}, 0x75, r2}) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}, 0x1d, r2}) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r4 = dup(r1) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000280)='\x00') ioctl$RNDZAPENTCNT(r4, 0x5204, &(0x7f0000000340)=0x3) fgetxattr(r0, &(0x7f0000000380)=@random={'security.', '\x92*\\:!\x00'}, &(0x7f00000003c0)=""/4096, 0x1000) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a1, &(0x7f0000000100)={@local={0xfe, 0x80, [0xfeff]}, @empty, @loopback, 0x3, 0x0, 0x0, 0x0, 0x100000000, 0x1c0270, r2}) r5 = semget(0x1, 0x4, 0x382) semtimedop(r5, &(0x7f00000001c0)=[{0x4, 0x80, 0x1000}, {0x3, 0x1, 0x800}, {0x7, 0x6, 0x1000}, {0x0, 0x80000000, 0x800}, {0x7, 0x100000001, 0x1000}, {0x1, 0xffffffffffffff00, 0x800}, {0x7, 0x845}, {0x6, 0x1, 0x1800}], 0x8, &(0x7f0000000200)) getuid() r6 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r6, 0xaf01, &(0x7f0000000000)) ioctl$VHOST_SET_LOG_FD(r6, 0x4004af07, &(0x7f0000000200)) 03:44:43 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x4000000, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 976.676844] CUSE: unknown device info "" 03:44:43 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x9000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 976.709670] CUSE: zero length info key specified [ 976.728595] CUSE: unknown device info "" 03:44:43 executing program 1: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) close(r0) socket$vsock_stream(0x28, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000780)='9p\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRESHEX=r0, @ANYBLOB="2c7766646e01313d7fb6746ce7332ca45865804846da0c1034d861df93d7bb7d3a3b432bf77cc51d25de5e6e386181cb6cc66238179a42f2ca4990ca830b78b43a18132f9242c2d503a39d027f4c7068cd2c0e736e54c717249016b2138e26941d07b4a12d0079fc1207aee3de1593e3295ea865d967775968625cbe43a7bb415f6975c6740ec9aa72c1758741c8f8dc23eac3c2abe048444fb03c893252b379325a", @ANYRESHEX=r1, @ANYBLOB=',\x00']) [ 976.754933] IPVS: ftp: loaded support on port[0] = 21 [ 976.762548] CUSE: zero length info key specified 03:44:43 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x2}]) 03:44:43 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x5000000, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x369, &(0x7f0000000440)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x707, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0xc, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8}]]}}}]}, 0x3c3}}, 0x0) r1 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f00000000c0)=0x1c, 0x800) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x5) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@initdev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}}}, &(0x7f0000000340)=0xe8) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_xen(&(0x7f0000000140)='\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x200002, &(0x7f0000000600)=ANY=[@ANYBLOB='trans=xen,access=user,mmap,access=', @ANYRESDEC=r2, @ANYBLOB="2c6e6f6465766d61702c64666c746769643ddf6e225cb86153b418994a827b4b541877f1afe9006d447c88e805a32e0e0bc103a79f6a9e8b1c9b1813383f346d3e94d52e8fe7a10a866caabcf8bbf5d565f8f9d189173cfaef2b82b9c6900f0b2e036338c087743bebbbe7a08a85dadb8290073fbb94565e988bf090d3ebcc2eb08608de20d618c19b09b990313c0c93db154151db9f7c25a130f39fa2aa94be08c7a8d90d7405e7b21e85e85d99fa0734bbf7b2d47159209081a58fefde7180aef58fcbedecf3498545635f95c1728980e13b3fc2ab7ea173a2941eb2633e31d2ecc431fb98", @ANYRESHEX=r3, @ANYBLOB=',afid=0x0000000000000004,msize=0x0000000000000006,nodevmap,obj_role=^,fscontext=system_u,dont_hash,smackfsroot=ip6tnl\x00,pcr=00000000000000000038,\x00']) 03:44:43 executing program 0: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$instantiate(0xc, 0x0, 0xffffffffffffffff, 0x35d, 0xfffffffffffffffb) [ 976.956407] CUSE: unknown device info "" [ 976.974577] CUSE: zero length info key specified [ 977.018497] CUSE: unknown device info "" [ 977.041426] CUSE: zero length info key specified [ 977.315587] IPVS: ftp: loaded support on port[0] = 21 03:44:44 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x0, 0x0, 0x11000000]}, &(0x7f0000000000)=0x54) 03:44:44 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0xa000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r1 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000040)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'syzkaller1\x00'}) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000080)={{0x16, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e20, 0x4, 'nq\x00', 0x1, 0x100, 0x69}, {@rand_addr=0x7, 0x4e22, 0x2003, 0x1, 0x1f, 0x80000001}}, 0x44) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, 0x0, &(0x7f0000000240)) 03:44:44 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x4}]) 03:44:44 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) sched_getparam(r1, &(0x7f0000000080)) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-ssse3\x00'}, 0x58) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x7fffc000) 03:44:44 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x6000000, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 977.516612] CUSE: unknown device info "" [ 977.559157] CUSE: zero length info key specified 03:44:44 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0xb000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 977.595784] CUSE: unknown device info "" [ 977.605586] IPVS: ftp: loaded support on port[0] = 21 [ 977.621045] CUSE: zero length info key specified 03:44:44 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x1000000}]) [ 977.653428] protocol 88fb is buggy, dev hsr_slave_0 [ 977.653433] protocol 88fb is buggy, dev hsr_slave_0 [ 977.653468] protocol 88fb is buggy, dev hsr_slave_1 [ 977.658510] protocol 88fb is buggy, dev hsr_slave_1 03:44:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x88000, 0x0) ioctl$CAPI_GET_SERIAL(r3, 0xc0044308, &(0x7f0000000140)=0xa1e0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000040)={0x5, 0x1, {0xffffffffffffffff, 0x0, 0x4, 0x3, 0x80000001}}) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x500, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000180)={0x7b, 0x0, [0x40000083, 0x87], [0x187]}) ioctl$TIOCLINUX5(r4, 0x541c, &(0x7f00000002c0)={0x5, 0x101, 0xf57, 0xfffffffffffffe00, 0x5}) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f00000000c0)={0x100, 0x7, 0xe3}) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x17, 0x0, 0x80000000, 0x8, 0x3, r3, 0xc9}, 0x2c) ioctl$VIDIOC_DQEVENT(r4, 0x80885659, &(0x7f0000000200)={0x0, @data}) 03:44:44 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x7000000, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:44 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0xf000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 977.973483] protocol 88fb is buggy, dev hsr_slave_0 [ 977.978656] protocol 88fb is buggy, dev hsr_slave_1 [ 977.981720] CUSE: unknown device info "" 03:44:44 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x2000000}]) [ 978.020098] CUSE: zero length info key specified [ 978.100207] CUSE: unknown device info "" [ 978.143146] CUSE: zero length info key specified [ 978.418850] IPVS: ftp: loaded support on port[0] = 21 03:44:45 executing program 0: close(0xffffffffffffffff) 03:44:45 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:45 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x8000000, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:45 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x4000000}]) 03:44:45 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x0, 0x0, 0x88000000]}, &(0x7f0000000000)=0x54) 03:44:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$9p_unix(&(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='9p\x00', 0x8, &(0x7f0000000240)={'trans=unix,', {[{@cache_none='cache=none'}, {@privport='privport'}], [{@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor'}}, {@pcr={'pcr', 0x3d, 0x6}}, {@subj_type={'subj_type', 0x3d, 'mode'}}, {@obj_role={'obj_role', 0x3d, 'bpf\x00'}}]}}) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2, 0x14, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) syz_open_dev$sg(&(0x7f0000000480)='/dev/sg#\x00', 0x0, 0x541000) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000340)="7e9bdb024f35b9909911d4f42e6fbb8f79a24f66df2b83d44c5635f45346f187b5bb16d0ab56d9e36e524445eb276ac4f9eb9c6cb786b5d84302752a54e980d773e7622ecd7cbe0cb3d080db9c766f169ff0ef97956f10a6b9c5961df51223f93b717bbb41660dc88692f40a1c5c", 0x6e) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x2, &(0x7f0000000b80)={[{@mode={'mode'}}]}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000007c0)=@buf={0x62, &(0x7f0000000840)="1fc4f4cf1134e988bf053d244ed6f293b8b50f4adfb941b5365a7496eebb5353c95438439a73846c6b058c3307ed07861c0f1cbeaf7f8a4fe63b60bf00ea9a02ff35d15f101f7f9f978b8e55cf8f6848fe8566f3afdfbb2d9215135255fc52dfb2c5"}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @broadcast, [], {@ipv4={0x8100, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)={0x0, 0x3, [0x0, 0xfffffffffffffffe]}) [ 978.594496] CUSE: unknown device info "" [ 978.598701] CUSE: zero length info key specified 03:44:45 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x11000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 978.648197] CUSE: unknown device info "" 03:44:45 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x2040) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8, @bcast, @rose={'rose', 0x0}, 0x3, [@default, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @null]}) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9917, 0xfffd}, 0x0) pipe2(&(0x7f0000000140), 0x4000) sched_setattr(0x0, &(0x7f0000000240), 0x0) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x100) [ 978.677584] CUSE: zero length info key specified [ 978.690261] IPVS: ftp: loaded support on port[0] = 21 03:44:45 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x100000000000000}]) 03:44:45 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0xc000000, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:45 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x12000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:45 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000001340)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r0, 0x1000000200200004) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SIOCNRDECOBS(r1, 0x89e2) keyctl$revoke(0x3, r0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x40000, 0x0) getsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000080)=0x401, &(0x7f0000000100)=0x4) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f0000000180)) 03:44:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$9p_unix(&(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='9p\x00', 0x8, &(0x7f0000000240)={'trans=unix,', {[{@cache_none='cache=none'}, {@privport='privport'}], [{@context={'context', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor'}}, {@pcr={'pcr', 0x3d, 0x6}}, {@subj_type={'subj_type', 0x3d, 'mode'}}, {@obj_role={'obj_role', 0x3d, 'bpf\x00'}}]}}) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2, 0x14, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) syz_open_dev$sg(&(0x7f0000000480)='/dev/sg#\x00', 0x0, 0x541000) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000340)="7e9bdb024f35b9909911d4f42e6fbb8f79a24f66df2b83d44c5635f45346f187b5bb16d0ab56d9e36e524445eb276ac4f9eb9c6cb786b5d84302752a54e980d773e7622ecd7cbe0cb3d080db9c766f169ff0ef97956f10a6b9c5961df51223f93b717bbb41660dc88692f40a1c5c", 0x6e) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x2, &(0x7f0000000b80)={[{@mode={'mode'}}]}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000007c0)=@buf={0x62, &(0x7f0000000840)="1fc4f4cf1134e988bf053d244ed6f293b8b50f4adfb941b5365a7496eebb5353c95438439a73846c6b058c3307ed07861c0f1cbeaf7f8a4fe63b60bf00ea9a02ff35d15f101f7f9f978b8e55cf8f6848fe8566f3afdfbb2d9215135255fc52dfb2c5"}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @broadcast, [], {@ipv4={0x8100, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)={0x0, 0x3, [0x0, 0xfffffffffffffffe]}) [ 978.928058] CUSE: unknown device info "" [ 978.932306] CUSE: zero length info key specified 03:44:45 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000025c0)=0x204, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000024c0)={0x0, @in={{0x2, 0x0, @multicast1}}, 0x8, 0x8000, 0x2, 0x9, 0x2}, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) fstatfs(r1, &(0x7f0000000500)=""/88) prctl$PR_CAPBSET_DROP(0x18, 0x5) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) r2 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000140)={0x0, 0x200}, 0x10) [ 978.998724] CUSE: unknown device info "" [ 979.002976] CUSE: zero length info key specified 03:44:45 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x200000000000000}]) 03:44:45 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x13000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 979.139398] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 979.552668] IPVS: ftp: loaded support on port[0] = 21 03:44:48 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x5f0c0000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:48 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x10000000, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000080)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'nr0\x00', r1}) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x38, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x4}}}]}, 0xff5a}}, 0x0) 03:44:48 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x400000000000000}]) 03:44:48 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x0, 0x0, 0x100000000000000]}, &(0x7f0000000000)=0x54) 03:44:48 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000025c0)=0x204, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000024c0)={0x0, @in={{0x2, 0x0, @multicast1}}, 0x8, 0x8000, 0x2, 0x9, 0x2}, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) fstatfs(r1, &(0x7f0000000500)=""/88) prctl$PR_CAPBSET_DROP(0x18, 0x5) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) r2 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000140)={0x0, 0x200}, 0x10) [ 981.358639] CUSE: unknown device info "" [ 981.364717] CUSE: zero length info key specified [ 981.375627] CUSE: unknown device info "" [ 981.382188] CUSE: zero length info key specified 03:44:48 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x81000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:48 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x20000000, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 981.405720] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 981.428690] IPVS: ftp: loaded support on port[0] = 21 03:44:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r1 = open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r1, 0x0, 0x40000) syz_open_dev$dmmidi(0x0, 0x10000, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) fstat(r1, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = geteuid() syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f00000000c0)='./bus\x00', 0x3, 0x7, &(0x7f00000014c0)=[{&(0x7f00000004c0)="cd28a73e88ed7d57e9d4882d6d2bc62efd93978f88f23704688c2d3c9e0f12cdf4388570aa057e812395610ecf18661e729970c8680a28d2d97c8c047e08d13152a633d358e64f1a89f08739d21a6b879daca5cdb310df9e32214ed140eceab4987bb6b381dd0c817ee94cfc3ab2b2f50f0e316f8ec6530dfb3767bea952988439f56b420929bf5255595e3115a50c16697c3d64334f3617086a3000adf28606cfe63ff104669e9e3ef00e420de8b596f9f8bc2036569471049f5b064ed11e57d54d82ba209a52a744d550e92f8e424170b146ad2334b4a4e7f7e677b19f330f69f4e8b5172638752b3c49fdc6ff316f8ff3426a50cb2a6788811aab0d88e4377246a9c6122bece7ec876ee5d84329f700c1712d83eb4d12185b5e080fa86b88da7b340b321d11e968a7beff2863410e66aea4744ae3d0d49d505802431041539c1816bd6f1a61c7286ab551dc4e4194c29b12c6a80fa273744bfb021057daa328aca7c090c08b999fd9e3dd5ac7056c75d7ba61086720195800cb98a42c82e124af820a9c3e7ce06b05e5be11456350587cf5d6f37cfc51c5d0d0f867264058cb2f7bb723017bbe7c8ac33e7d3f2e4a5a30b304643a610d9fe7124903520ec359250af98b3dae9dc9b687abf7329f7537fabb93653ab1779937561fc6b6101d744f78ec27438129ff82acdf2c2d57dd546bcdcc9befd519783f46ce7a9c71b5efc46eb15e3749efe80c3fe48aaac9db5b94db5389e784f5092531f449faddc27d12dbec50f6963766b4f7bbea4372e44bee6267a3059eb8745da615588a7e2f691fe0e9b655d256e714a2e935a5112edcd3aa9c19672877b6604e69afe7620fbd6ada9ab426668c47fc79682ed686d736c03c30b2c8c4f425cc1682ed6c94faa5fa48656687e944aeba0f9bb00b4af57a9478eb15c411565cf80964c7e377b5f68c4f4ebc439686414c0aa212d2addd0470fd2fc802a0ade0cb5b032b68f4c6c510e435e270bcdff7ebe44dfbb6471dd18a9598c0de4baad4307531fd8fb7d86aa23dc4bc258c06d0f8696cc5d2cc7999b2b4ab3b5e5a8a932f8359d2b33327c3935cd232398d1309868253b630326baeabe5a407f2a84d8e44138db5a9019e29dd4efceddb8ec9cb590f60838b3b4e74c4bfff20059a7d2f4d2ba85a1d52dbd834a4798edb7bcaf4be5b6d158af90d22ab8a30b4e1bd5ad701c0b0721add8374859abcc7054e14fe244527acd8df62d02e975e8501387fe8a5058811995e60536bcc6f4dc3b12d9be3cb3ee52e7bfba8496e9248365b869407bd52acf15fe70d9151e805768c39c01249e6b208773a500853f85d5fb60ad23c4e1afaec76d68aac318eef549b3f87c4a8b6cb31d4699d7f72ec9c038914dfc38488797e976ccd549531d63dbeb6afbaef877661df0f5460793040b97652d7a1f0d193052b98a91469d7acb71cd715576e009901fd8e587798c00c93472cfb1ccf85a6c5f38c90b8a570e2b690720416ef0bc0541f3999e471b4379e5328012179d51793a9b09decb0e742a22e9900db2d58d5b2fba747a6003f6863f5f3093a8dd609863fe8d1905ce868fed0a56717e54b5a3bf5381750d823a44bfa573a2f198f218a9b5c75ac1ae8541c399f33df61efcb837daa4fb5d26f75ec7b268a42f924c9645de41a893325e71a8c439b36f0f2f7bd1f3bbab72d6b4f2eed42990f7bf8cd151735a42aa2071ec3ecfe074ca57cf180c4ad97c6dce356b448c10b9d479523602b7963e6e5d873854738cfee5f3493c4731201463faaf5e7931baeb91eb66aee16d69ca4ae3673d73fb89fe14303a441e23008a64431d94c64fda2715b99698dc7c39f3cac7a31c8723e18e06aca3bede3c5172550654f2d6064a27a47ed9a772d8adcd6a82dd9c4a523206a8e3ea8e40d42625197ec459d2dc2c98435ff0c09dabf3aa3783279f677fe798b8d44063cf2ee94b73564db114c5fea7ba49bf45cda1f16664dc6ff3215c5b149909d1b5dd8102034ab3bedef9968ec5f88bc0d1e5f56def32f614bf0b670e5e6af0eaec2718090a4bae806a57564455be7630dd44094c15474f5719d42eb67df3628d1ac78e8633c8828085743d4a40cd4b61650e11818633629a708e1e4a5d7dc2cc49e5bd4c3d2792d0fcf0cdc408d410b26f2ac80a4522e45208221532df89fd1bfe22867deef9d0b952ae212f4eefc3df01a176cdc3a343385758cecc14b2726cb3df665421129497dbbdd52029d69e449d25ab01aac5627a20de40f1f9201bd4e7a8782ea5507e8e650177dc4103c2143d37cb757cb2844a3627542193785ce0009973236d26485c5c023731b49113309fac883a63928171a6b835075d98665ef13957303871a8465525a16e72a1fa730c40d75fdd11ceedd1c899a4419b85e6f09c5a6fdde3298c440e4c0aa72bcb994eeab4311ed8d22e6d74add7b2ba6419f030d58e4997818416cf57d1b806e57b26c08ed957e25dd4442f676b405fca03a94fa30ceebd3ab15232f6c279efca5912283755df7f861489b13a713317f38c8462e6638d2be7d730dc5bb63a9f06ce7d717cd9281f7bbcf8228e95e9a6aeebeb4c8af33b81d8be7ce36988908e04a86f7b75a4b27e99ccfc4f4ad4161d2fca9bce55bf659574c0e362993c83d486bab64502327998b7bc02608b65f0814e0622603855d9bfd0291085f17b475d1ee5bc8cc366fe34d964e38ff3b5385134d21ecbfdfa9f79f77457bd026cbbdc721dc1d9e714aabb4f4490a757b817568c78b3e0670c794bd618c0ade521e7919c4674ac8004a7610ab8e3b3f5d4c38b6c3f587dc40fa465268333236355820c69b9d792223be3160774b5632a6c7ac1e89b58a7d292241ba13ccdeaae3d63cc209be99ead923fd4d1f9ccc931452d7acaa6802a2131a17dffe06bd005803fa948d0d09daefbbacc72f1bb6f92c9b99d1c21960bf7b0a1aa9ff131257ccf53350813f9fcde1136ae2c593c9b3dc706635a5e9e2cb7b2dc455f86cdba1343a826cf8ef553d89ae259f78cf308a568b680f074dd4cc2e13c4a521a5a239fda45b4604fa7a93e0bf92cf83771df52162db9b9d2c522e0f47982dca512b8b01d9bc6a5d207c9dd98c001e4284298befb8cc7a159b639f89c752949b456087398cbd97ac9b08f55e3bf0d961c3014df88aa3481aceff7cffd3affbd66cb1ae5aa65d6cc0bdbe0a8279225e6dd3b783ac0fdf85b6af33ec25aad9b6c5c9a66c19d0e6534e4ec2007afa3e2f982f5578effd8f9a3213833fe8b756951160808d3e870e9041981345b401a73ac6d5519a7c83aa3b33901b62bf8933c5089b103415ad09f1832f224e54f92ff8ee4109890bd2f1d38a153acf9bcde615f8e8c235da7a6c0bc6c76c58297225259d947f83b465babb353f1ebc755b6ca2138694ebed007cd4f6de64a15eb00a7f74a4ce8b97970f4a04b9c329c798dd1db752aeb67f2a43262294e3ad7a373135fc8f45d9cc62abb9131905d79433e44d2d78aebc532c0138267aec87c62253ce54c14d16e742a09df9d39f8d53f939f26b6a2219016d5c91a4e29a35ece320454a0e6ced02e0baab8ead7d9db379199aa3e8a3de4f69d60062d34da537d15ecd00d03f21ee8f39aedf8d5432c80fb8a0bca30da896681753027cdb838a5ec802234da0ded9773dd186c8745440fa530f6ef80c86f39d4a45d8adb23e21f1e9aa105ecdb7fbc1cb93a60eac4c7095b442c4cceced604895fb91230013f3981a06b2c47bd788b1271674c96a80724151232b5a95d787aefa47c93e1a0d7722229cbdc97fc18686d13eee569edfab79590a9287fb9b81cae89089a486a43c317ba2b180058a26e560e81005605fda3e8c2aa1d7307a134fcfa3a968568e85b9d35c1c5d020548bc3c0886fb471b9b8ac77574f7fa4bbb4388a49873677f4de5c9bc69885f447bdd09f9bdf611aa7d8410eb97769a6dc6be4a18cb0a4a572ab4985c1fcd7392961ce4ec9cc573d66c8965fa12605879adab26e64ae783b36eb8e81963bef0063339b1312101f9db57395a9e6ed4fcfb8537e3fe8f44d3f7ce6358c0e3267cb995d22200f40c9ad8e8faa8af74b7cbe788e1151ae1690f2646afc54c721a45dbeaefe3c70e1563e8ca492e2b663251ba5f964268ae880f1e811a7c17f97cf5115b31e92ed7e4a0d996abe82b37cefe956e9078556d10a4f3d9db71484c9c11066e739d72a6c37322712347738a74b6e00492f127b07c5d8ad100642abe205be4e0cd0b04e3c725cce9f25ce6e2b049f005c49032e7eb9ca5cba60a3c19428392e3ca8d8c5e5c9d2e182a03800e173fde6ebf042b8ea1a38be1aeb90c7bdc4f66d071785e31d0e2df8a0e01c5d4cd8ac7bf98550b66894d3af9bf57babb60773fbb4e4920bae975d6ada7aa538486d8f27390ca5514bc37e5be777fa4addac1ffdb40e272ab0ce28770e7fdfca98704cc226bd384d442b1d1a947c8a880b3d8b977c190f5a8369cd735ff5082ef80c3db440142e644ea99ed46924b527906112b319c68c83123dc4f19d529ea100503e8afa576c2dc8a23c1cb8056f8890585f95739241e64195c15898e1e36153889714f036f2f96a6d667bb8c2af938064c3e912ba865f01afdd0cc2323908554f7e293da14d542fdd59cef0c8e1ab06271d077d6037f8986cb481e25b19dc414dd045dcb5b1730e500da6094ccb50114a165c4cea71431ee007ec96ed95be4ab5762b69f1521c7885f67995e6b1d22d7d2d283fba1db06ada4e9c4c034ccb1b6ac328243f2e2932169c2bc766414dce3ca54d07c8a884b2566b46acf62161a474887bd2658ad7cf5630c3b08431cc91c199be807576f4a48181d5b0f41db09d92c86659ea8dadc2be90a8f1d19b341e086f715f53364e73dc6f027a030ba2676019662159bf70c051aaab371960d108dbe98bbd1a66bce76620bbc7330caaf55ed0ddb6c5406877340a3c54fda90505a14746132cb7d44f98ea1b1e9b8902c8ac0abd5d49457edff397fea483b1d0d7a6653137c09ecbae3d76c48d737c6e8aef7e061ef2c71902e7aa5238f6dfd39d51b4c77fb3e01dba40772fea7075729b8f4a6f7b5f657918e78d17e2e98977b3f90372fc2a4f8e9ec54495af5444dce6cc8d797142e89c7a353708fcffd4e0e344990fd10cf513e315082edc0f7732b1bc23913d4a81829efb0476324dbdef369ae18f936858a7e5ed5ee1b3dcd18e953e3d9333d12bef9988211ddb3c9fd3b8018e7d4afbe63c3520196b23a719d3a19d2f987e04a47201f238467a744dd95e875ddd645874604ee8c8a92b06d3f941559e1048e567bad80480c53841cb17e880f64cf6b61fc3d244a75a215d2c91014355976a3180f68dde7d433fd3b31973db5f2483e9cc57aca4f525414334c23106315f98a3fe576dda5a2ec9ecfc1cb6ea74f1a850d908bec44043341c58236c3476a4fe62ad5a7b20bc2fe28a1405e75f786d1a01be6728e5e44f5a2bf1eec732224124397e7f5be894355e910f4b0403c3fae9b93b80f92ec7195406cc162ec38a65c582700363f0bb016b975f987cd808608bae8d907296e7ab63c7fc0894acb64b80e574c12ddc66f4c865af0f0bb2667d5d418196c9d8147d2127f7ab4e8b39b2bc79151842d14be0d174e4e80056da2761168966d86d48d53cabd5f25dd7033042ff3043c67fbc893d6cc365baeb042e95cfea0c3c69ea31b955f258aaa0e740278453e27262fda93bcc913a9960b4a4eaa08004c2ecd0f7564b762a799d31808e336a9cb957402c4", 0x1000, 0x20}, {&(0x7f0000000100)="f50e5bd9e962161d687f16b97c82bb6e8b9504cb900a530dd216dc4b38a89d1a646ecf3653bdacb6b8cdca1e21cc5a65f708e6ac0d498d30c0cd9952c635a01b3051cacd2ad11a8daff9a2a8209d2edb0c23e68a380f01033ea6977d38b0a19a5903a43db109581d119fb17c73783bfe1279687ffbeda94fd4faff1a82fa275c0640396726216490d4295cb893be7b035de0bdbf0d1016cf608eaffd78b0ac", 0x9f, 0x3}, {&(0x7f00000001c0)='~', 0x1, 0x9}, {&(0x7f0000000200)="771f2a91861dce37b12fa8b1c8d3f6696989b971621156160561eeb68a3f87e47ffb1af73845d87b57e5929ba6a392e323c0db089129bde2140559032d7c90932b99f2281f6fb335b6ba424c4b1d77aa5e8f293a97572006b33129b65933c4adae3c1aa28ea3e63ce633cee708251d4bed1d6bc8b94e41331f26d7e22a12a4af", 0x80, 0x4}, {&(0x7f0000000280)="87bae7e8500a8011690bf6", 0xb, 0x5}, {&(0x7f00000002c0)="c07ce3defd67c0bfe001a72f706f1770ea4f7b6749f73a233b6b98102b8e6b51c785746adee78897cb6f01b5b0ffb031f95e6f14a802451857e58508c7c4f08f686dc16e223e943ebf43fcfec2ab7c0a7585846999f842590fbc6d73a9", 0x5d, 0x8001}, {&(0x7f0000000340)="d508d3fa4f0e8e84c5bbf3fe1248eac8473b60f931bbf598847431ef32fc9438ae77c0d6cc4f2980a39d6052df72b0a65cb998158795b98caa8ed7604784593ebdaab5125f36a5e8cbf96353da089b1f07a493305faff3fd07007419672abb507bd9519465a29320b3dd806885640a76ad09addddd692c4702d146585891179a20c4325b92efe829d4efe83a8178365df25954b677fc1ac681eb714a90e9de99194c419f", 0xa4, 0xffffff0000000000}], 0x2040, &(0x7f0000001680)=ANY=[@ANYBLOB='nojoliet,map=off,audit,dont_hash,fowner<', @ANYRESDEC=r2, @ANYBLOB="2c646f6e745f61707072616973652c657569643e6dab66eac6288e36755cab0f60cb31161051204f3506133557dfb06f100ec92994c50ab96e272c8a36261d6633a2f8abb932a68f292740b399457062d69f8cc098dde3cd93af8ebb6204454ed962b1b6e241d4492cef4d7e8f5f0b7e010f33337289af98066e22601778d247a3caa379ef650f44fd09eab8c3859634", @ANYRESDEC=r3, @ANYBLOB=',\x00']) r4 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(r4, 0x116, 0x7f, &(0x7f0000000400)=0x6, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 03:44:48 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x8000000000000000}]) 03:44:48 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x8e7e0000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 981.633076] CUSE: unknown device info "" [ 981.638844] CUSE: zero length info key specified [ 981.688798] CUSE: unknown device info "" [ 981.716295] CUSE: zero length info key specified [ 981.743272] audit: type=1804 audit(2000000688.630:76): pid=20679 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir230348749/syzkaller.Qhs8xh/290/bus" dev="sda1" ino=17457 res=1 03:44:48 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x9effffff}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:48 executing program 1: umount2(&(0x7f00000000c0)='./file0\x00', 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = getpgrp(0x0) r2 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffffffffffffff7f}, 0x0, 0x8) rt_tgsigqueueinfo(r1, r2, 0x11, &(0x7f0000000040)) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x0, 0x0) write$P9_RLOCK(r4, &(0x7f0000000140)={0x8, 0x35, 0x2, 0x2}, 0x8) read(r3, &(0x7f0000481000)=""/128, 0x3f8) 03:44:48 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x60000000, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:48 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x0, 0x2}]) 03:44:48 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0xf0ffffff}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 982.000079] CUSE: unknown device info "" [ 982.012476] CUSE: zero length info key specified [ 982.053148] CUSE: unknown device info "" [ 982.089516] CUSE: zero length info key specified [ 982.338360] IPVS: ftp: loaded support on port[0] = 21 03:44:49 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x0, 0x0, 0x1100000000000000]}, &(0x7f0000000000)=0x54) 03:44:49 executing program 1: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x400000000000114, 0x2713, 0xfffffffffffffffe, &(0x7f0000000000)) 03:44:49 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x0, 0x4}]) 03:44:49 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0xfcffffff}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:49 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x88) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000040)={0x1, 0xffffffffffffff9c}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@dev, 0x0, 0x33}, 0x0, @in=@remote}}, 0xe8) syz_emit_ethernet(0x3e, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd601bfc9700038800fe800000000000000000000000004000ff0200000000000000000000000000010006000000089078e9ab6d2e1800e1"], 0x0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000240)={0x0, 0x1, 0x7, &(0x7f0000000100)=0x6}) 03:44:49 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x100000000000000, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 982.574497] CUSE: unknown device info "" [ 982.591635] CUSE: zero length info key specified 03:44:49 executing program 0: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x4403, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x1, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000380)=""/43) r1 = socket$caif_stream(0x25, 0x1, 0xffffffffffffffff) ioctl$sock_netdev_private(r1, 0x89f0, &(0x7f0000000000)="2eaf9111356e31b868074f02b147cfd819d23c9da6e0371080f89cfbb1eb2b5b0547362f93d26a02361c") r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x4, 0x2) getsockopt$inet_int(r2, 0x0, 0x31, &(0x7f00000002c0), &(0x7f0000000300)=0x4) sendto$unix(r2, &(0x7f00000000c0)="04073418f938ac0640f4c3e63929029b4cda6b48bd91529dacf7d4b33171e917cdda8ae631dbdeb428cbcbb66f5bbdfd6be2d2d09b5d213a468dc3c0f34f3f61d24ae490102874b322d06c6f8dfd917b874234332fe20f8197b54b2bcb0097e94be98908afbb93343c3a86b047dda61ebf2c2f666e0d118b0eb028cce0295d0f96535c240085353d65a7e04b94a3c93b8b10b82f0fad2a2c1e64314c", 0x9c, 0x8000, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000200)={0x3, {{0x2, 0x4e29, @multicast2}}}, 0x88) 03:44:49 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0xfeffffff}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:49 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000400)='limits\x00') ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = open(&(0x7f0000021000)='./control\x00', 0x0, 0x0) close(r1) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000600)={0x0, @in6={{0xa, 0x0, 0x0, @local, 0x7174}}}, &(0x7f0000000080)=0x84) kexec_load(0x0, 0x7, &(0x7f00000005c0), 0x0) ioctl$SIOCAX25NOUID(r0, 0x89e3, &(0x7f0000000340)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f00000002c0)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = memfd_create(&(0x7f0000000e40)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a4\x87\xcf6\xadWn2\x92k\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2*P[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdhy(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f', 0x0) execveat(r3, &(0x7f00000005c0)='\x00', &(0x7f0000000580)=[&(0x7f0000000300)='vboxnet0\x00', &(0x7f00000004c0)='eth1&!cpusetproc\x00'], &(0x7f0000000ac0), 0x1000) write$uinput_user_dev(r3, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xc71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1dca, 0xfffffffffffffffa, 0xffff, 0xfffffffffffff800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401], [0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x3, 0xc9e4, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc3, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x4], [0x5, 0xa22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x77d, 0x0, 0x0, 0x2, 0x0, 0x6706, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x216, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x3]}, 0x45c) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000240)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), r4, r0}}, 0x18) fcntl$addseals(r3, 0x409, 0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x100, 0x0) r5 = getpgid(0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, r5, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0xfffffffffffff46e, 0x0, 0x101, 0x6b, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x1ff, 0x3, 0x0, 0x6, 0x0, 0x3, 0x8, 0x8001, 0x0, 0xc1d, 0x2, 0xf0, 0x0, 0x0, 0x1, 0x679, 0x0, 0x466, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x80, 0x0, 0x2, 0x7, 0x1}, r5, 0x6, r2, 0x0) ioctl$TIOCSCTTY(r1, 0x540e, 0x940) [ 982.615246] CUSE: unknown device info "" [ 982.625616] IPVS: ftp: loaded support on port[0] = 21 [ 982.640776] CUSE: zero length info key specified 03:44:49 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x0, 0x1000000}]) 03:44:49 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x200000000000000, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:49 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0xfffff000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 982.875253] CUSE: unknown device info "" [ 982.879481] CUSE: zero length info key specified [ 982.917625] CUSE: unknown device info "" [ 982.921813] CUSE: zero length info key specified [ 983.270370] IPVS: ftp: loaded support on port[0] = 21 03:44:50 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x0, 0x0, 0x8800000000000000]}, &(0x7f0000000000)=0x54) 03:44:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = socket$kcm(0xa, 0x2, 0x88) sendmsg$kcm(r1, &(0x7f0000004740)={&(0x7f0000000580)=@in6={0xa, 0x4e21, 0x0, @local, 0x9}, 0x80, 0x0}, 0xe803) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x1, 0x0, 0x10003, 0x40000}) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f0000000180)={r2, 0x4224}) r3 = open(&(0x7f0000000000)='./file0\x00', 0xea8fb73fe54b211b, 0x12) ioctl$BLKRRPART(r3, 0x125f, 0x0) sendmsg$kcm(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001c80)=[{&(0x7f0000000b80)='9', 0x1}], 0x1}, 0xc000) sendmsg$kcm(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000001140)="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", 0x57b}], 0x1}, 0x8000) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000001e80)='r', 0x1}], 0x1}, 0x0) getsockopt$inet6_udp_int(r3, 0x11, 0x6e, &(0x7f0000000040), &(0x7f0000000080)=0x4) 03:44:50 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x300000000000000, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:50 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x0, 0x2000000}]) 03:44:50 executing program 1: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000240)={0x9, @sliced}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x4000, 0x0) connect$netlink(r1, &(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x200}, 0xc) 03:44:50 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0xffffff7f}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 983.481795] CUSE: unknown device info "" [ 983.493104] CUSE: zero length info key specified 03:44:50 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0xffffff9e}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 983.522694] IPVS: ftp: loaded support on port[0] = 21 03:44:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ioctl$PPPIOCCONNECT(0xffffffffffffffff, 0x4004743a, 0x0) fcntl$getflags(r2, 0x409) fcntl$getownex(r1, 0x10, &(0x7f0000000000)) read(r1, &(0x7f0000000900)=""/4096, 0x1000) ftruncate(r2, 0x8007d) sendfile(r1, r0, 0x0, 0x2008000fffffffd) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000040)={0xb, 0x102, 0x5, {0x3ff, 0x2, 0x8000, 0x7f}}) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0x8303, {0x8000, 0x401, 0xd74, 0x1, 0xafa3, 0x5c}, 0x8, 0xff}, 0xe) [ 983.550507] CUSE: unknown device info "" [ 983.557875] CUSE: zero length info key specified 03:44:50 executing program 0: syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x80080) r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000080)={0x7, {0x6, 0x1ff, 0x0, 0xff}, {0x7f, 0x80000001, 0x9, 0x80}, {0x4, 0x10001}}) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f00000000c0)={0x7, 0x0, "640c4cd61b74d84d8afcdc219e64ca0e2e491ad8aaa4b1a71381607e4c93257f", 0x3, 0x2, 0x3ff, 0x0, 0x380}) 03:44:50 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x0, 0x4000000}]) 03:44:50 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x400000000000000, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:50 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0xfffffff0}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 983.850953] CUSE: unknown device info "" [ 983.875386] CUSE: zero length info key specified [ 983.910101] CUSE: unknown device info "" [ 983.922168] CUSE: zero length info key specified [ 984.169253] IPVS: ftp: loaded support on port[0] = 21 03:44:51 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x0, 0x0, 0x0, 0x11]}, &(0x7f0000000000)=0x54) 03:44:51 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x500000000000000, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:51 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x0, 0x100000000000000}]) 03:44:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x5}, 0x1c) recvmmsg(r1, &(0x7f0000003b40)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000000)=0x6, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000180)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) shutdown(r1, 0x0) ioctl(r0, 0x100800890f, &(0x7f0000000240)="0a036a9088b0701f9c94be38d7b49d6acbddceedac8abbf705f839c8c81783e863cf822d7b3d2f5d432966a4fd0ec9e0247d7fb7652e64bf7d9735acecac5032f393912e427495539f54bd968f31ed7e26e10aead3a6d083b2988d57d7ea0d162aa105d2db1b7cea92896bdecfba101644af128da9be0691f4de9a526526db57f06462259b69f98a34573a0b49497fea3f3b1eb3383d417228aaf593eefa1836d00877b6e1f50d3453177595f0f7a250c18656f6e0641d7f7b0252e7518be211587685e45493281963153e25540c2aaacf88075ae2f8a5c62b76f13a00a958748c85373962613e2b1bb0c925e83d22") 03:44:51 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xd, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="8500eeff2e0000003d00000000c00000009500000000000000"], &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0xc3, &(0x7f0000000480)=""/195}, 0x48) 03:44:51 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0xfffffffc}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 984.316281] CUSE: unknown device info "" [ 984.338198] CUSE: zero length info key specified [ 984.362768] IPVS: ftp: loaded support on port[0] = 21 03:44:51 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0xfffffffe}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:51 executing program 0: bind$ax25(0xffffffffffffffff, &(0x7f0000000340)={{0x3, @netrom, 0x5}, [@null, @default, @bcast, @remote, @bcast, @rose, @rose, @default]}, 0x48) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/sequencer2\x00', 0x141000, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f31") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) exit_group(0x0) r1 = socket$inet(0x2, 0x80001, 0x84) shutdown(r1, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) sendmsg(r1, &(0x7f0000000740)={&(0x7f0000000140)=@ethernet={0x6, @random="03ae2f777885"}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000240)="be65fe8ea33420617bff4bc3dd66d8903a56df2535bf40206ea6806b1406d0156c6a1c0737385ceb", 0x28}, {&(0x7f0000000280)="1bff313be4fc903eab0f650b40d07d25747f45f2f0a1c868d5413039fabb64bfdcb116885223c6383a84f12c56df84903573d45f36810ec07288083c7d9aeb6ba7a8f6e599f043", 0x47}], 0x2, &(0x7f00000003c0)=[{0x48, 0x1, 0x6a2, "94fc880b033401c7ba15e71cd913d531c9d79575de5872f01afcffe85401ab99922f7dc2644f446baec2b8f63954714f0d70367b"}, {0x90, 0x103, 0x2, "9bc47e3f4bf9be32550f4ea7852ae4c0e96b45011f637b3a7652daf39825500af1eeb8e04d1845267225a1101dd2ea57ae2ec2156faaf30ab2eed702b30fe6f27076bf95fae5e447439c421114143eb80e8498b2de3e00598428929a6f682b5e5d714bb4501275b37b89ceab4165939d2807cdbd65289835de2b22"}, {0x20, 0x13e, 0x4, "1812ea5502ce43ce8285d0f3ef06"}, {0xe0, 0x102, 0xfffffffeffffffff, "6a01c3468113e46e69ce24100a16a4c54b542cff97c7ede5cff20463b98b5828fd300b6edca69b51e90ee59e89d70c93427ef0fce6270a6ff5d8b5bc14b1ff6e2b9a7e2d64a983967562cddd0fdf753c20278b2791cb4b18dfa6e82ca0feae10f57d91aad5288f567d47e3ce05b98a568e9ac6d1b8b98c3c0db67bdfddb43eee6b4e79b44d80c887864d6e4fcbe5af4de6128c1caa5c468e414ad046c1c4e56cb82c7b563bee0913bded3e5ba154b3fa433cac771c658aef33aa3236d5d505c9a6c5242801e0f08b1cd204d47b2c"}, {0x10, 0x29, 0x8}, {0xf8, 0x117, 0x7ff, "382b70a2363396eb07ccb75d2c4e3d8f8a700c1951f8f641ebce82933aef255bab007379a888b2cd254a26f905c2345315e93a3817db2b102f685c6338f4b3d9cf160d0494f56f54b83cdc1ad3e8e76ccf0f8365e47cc7ad5baa53322c1f21c6d4b4b466d39d03233464d5031f9100621b069840b16f15f64ae19a142fcd48e6034b4e912285989e54bcdf481256e4fd71074fb4509e6dbeeb8b22d2d5ecba54f6239d98b9f08970b842e4ef93a6f3b8a2834c56a4cd9149e015904e80faa0b13d0303c77f163535792963f6f90e979451d55adb9bafd04fbec17bf870da98e0fe8151"}, {0x90, 0x10b, 0x1, "1b66ddf7c59cf9cb361a4ccec25f611ea5139997c0da9bfd0d0a2f656191d4eeca7ed1102d24b11d260662c662b2431196812ccd82212d90b004c5848160d23a49aa843e9be2e2d4e70f3f70ff770b7b75b0dde4957c9dab785417fd26c28cd12a9104f13a1d05b9e2c69420667c29ecfad1c1d1ddc633660297a14b"}], 0x370}, 0x8000) close(r1) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)='.', 0x1}], 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x5}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={r2, 0x0, &(0x7f00000000c0)}, 0x0) close(0xffffffffffffffff) [ 984.383001] CUSE: unknown device info "" [ 984.392781] CUSE: zero length info key specified 03:44:51 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x0, 0x200000000000000}]) 03:44:51 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x600000000000000, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:51 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x40030000000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:51 executing program 1: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000700)=@ax25, 0x80, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x97}], 0x1, &(0x7f00000001c0)=""/17, 0x11}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000), 0x26}, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(r0, r1, 0x80000) openat$hwrng(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000400)={0x0, 0x81}, &(0x7f0000000440)=0x8) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$xdp(0x2c, 0x3, 0x0) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f0000000580)) r6 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f00000005c0)={0x0, {0x2, 0x4e22, @broadcast}, {0x2, 0x0, @remote}, {0x2, 0x4e22, @multicast1}, 0x200, 0x7, 0x3, 0x0, 0x0, &(0x7f00000000c0)='bridge_slave_1\x00', 0x0, 0x7}) close(r6) ioctl$FS_IOC_FSGETXATTR(r5, 0x801c581f, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000280)=@assoc_id=r3, &(0x7f0000000340)=0x4) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000004c0)={@rand_addr="18b0e4391ccec24023d821a32cc5866d", 0x6, 0x3, 0x2, 0xa, 0xde4b, 0xd96c}, &(0x7f0000000640)=0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) getsockname$ax25(r1, &(0x7f0000000500)={{0x3, @rose}, [@bcast, @default, @bcast, @rose, @remote, @bcast, @null, @rose]}, &(0x7f0000000240)=0x48) socket$nl_route(0x10, 0x3, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) ioctl$TIOCSPGRP(r7, 0x5410, &(0x7f0000000000)) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000140)={0x10000022b}, 0xca) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000040)={0x7, 0x1b, 0x2}, 0x33d) [ 984.684594] CUSE: unknown device info "" [ 984.717640] CUSE: zero length info key specified [ 984.773951] CUSE: unknown device info "" [ 984.778419] CUSE: zero length info key specified [ 985.047015] IPVS: ftp: loaded support on port[0] = 21 03:44:52 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x0, 0x0, 0x0, 0x88]}, &(0x7f0000000000)=0x54) 03:44:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000080)=0xffffff79) 03:44:52 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x0, 0x400000000000000}]) 03:44:52 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x700000000000000, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:52 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0xf0ffffffffffff}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 985.269484] CUSE: unknown device info "" [ 985.292514] CUSE: zero length info key specified 03:44:52 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x100000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 985.318816] CUSE: unknown device info "" [ 985.359736] CUSE: zero length info key specified 03:44:52 executing program 0: r0 = socket$inet(0x2, 0x0, 0x2) setsockopt$inet_int(r0, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0x0, 0xcd, &(0x7f0000000000)=0x6, 0x4) 03:44:52 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x800000000000000, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:52 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x0, 0x8000000000000000}]) [ 985.415569] IPVS: ftp: loaded support on port[0] = 21 03:44:52 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x200000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 985.541819] CUSE: unknown device info "" [ 985.583604] CUSE: zero length info key specified [ 985.600394] CUSE: unknown device info "" [ 985.622025] CUSE: zero length info key specified 03:44:52 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x4000010004002) ioctl$LOOP_SET_STATUS(r0, 0x127d, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x1, 0x2, 0xa, 0x2000000000008, "8ccc8a43a4b71b48f122aad26a207ba5f73a433ce6863368a09708f37997559ae0b7fca4dab3fe6d9c62e4231f79b174bba913ffdf9be26a0a531abe129fa660", "6016f05f03f8e0d27d1243d186df978c570826b17b518fe294926e8ffb73e0e2", [0x101]}) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x30001, 0x0) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0) ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f0000000300)={0x3, @default, r2}) poll(&(0x7f00000001c0)=[{r0, 0x48}, {r0, 0x40}, {r0, 0x5001}], 0x3, 0x1000) seccomp(0x0, 0x1, &(0x7f0000000140)={0x5, &(0x7f0000000100)=[{0x2, 0x8000, 0x0, 0x8}, {0x4, 0x7f, 0x6, 0x5}, {0x81, 0x9, 0x4, 0x200}, {0x1f, 0x1ff, 0x1000, 0x81}, {0xfffffffffffffc00, 0x1b, 0x7f, 0x8000}]}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x8000, 0x0) 03:44:52 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x300000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 986.152035] IPVS: ftp: loaded support on port[0] = 21 03:44:53 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x0, 0x0, 0x0, 0x1100]}, &(0x7f0000000000)=0x54) 03:44:53 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x2}]) 03:44:53 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x20000, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000280)=0x67f12566) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) setsockopt$netlink_NETLINK_RX_RING(r3, 0x10e, 0x6, &(0x7f0000000480)={0x7, 0x8, 0x8, 0x2}, 0x10) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f00000003c0)=0x100000001) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) pause() ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f0000000180)=0x6, 0x4) ioctl$TIOCNXCL(r3, 0x540d) r5 = getpgrp(0x0) fcntl$setownex(r4, 0xf, &(0x7f0000000380)={0x1, r5}) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x9) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000440)={0x3, &(0x7f0000000400)=[{0x4, 0xc9, 0x2, 0x5}, {0x7ff, 0x3}, {0x100, 0xfffffffffffffe01, 0x0, 0x100000000}]}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000280)=0xc) r7 = getgid() chown(&(0x7f00000001c0)='./bus\x00', r6, r7) 03:44:53 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x400000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:53 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0xc00000000000000, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:53 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vcs\x00', 0x140, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000000800)=""/97) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x100) io_setup(0x8, &(0x7f0000000080)=0x0) r5 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f0000000740)) r6 = dup3(r0, r2, 0x10000000) r7 = add_key(&(0x7f0000000580)='.dead\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) pipe2$9p(&(0x7f0000000780), 0x0) keyctl$set_timeout(0xf, r7, 0x7ff) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@mcast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000640)={{{@in=@empty, @in=@local}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000540)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@mcast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xffffffffffffffc6) setresuid(r8, r9, r10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r1, 0x28, &(0x7f0000000180)}, 0x10) io_submit(r4, 0x1, &(0x7f0000000600)=[&(0x7f0000000880)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000900)="721550487b1b7db9a9e65cd37eaa1a97b56a364af7212915865dd90468c5646470de42377adcb00f1a06f78bc00068edc1d3c03d112d4d8801267f2d84a89e5bbff1b8ab6f554478abab8204ba8f5e3ce4a4f48e03ffddefa5d2a7b5fa625357b7226bc2a2821ff2e0a214cb0f043d853c9f4cd812d44295deba14aba6e1e515ee74168fa42b1308561ce74b18c6f7571f6bc674ebc34276c788dad7a6d23cc3bc", 0x66}]) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 986.397614] CUSE: unknown device info "" [ 986.401839] CUSE: zero length info key specified 03:44:53 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x500000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 986.450196] CUSE: unknown device info "" [ 986.463438] CUSE: zero length info key specified [ 986.492574] IPVS: ftp: loaded support on port[0] = 21 03:44:53 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x4}]) 03:44:53 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz0\x00'}, 0x45c) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x800, 0x4) bind$rds(r2, &(0x7f0000000080)={0x2, 0x4e22, @multicast2}, 0x10) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, 0x0) 03:44:53 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x1000000000000000, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:53 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x600000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:53 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1000000}]) [ 986.722982] input: syz0 as /devices/virtual/input/input15 [ 986.758771] CUSE: unknown device info "" [ 986.780374] CUSE: zero length info key specified [ 986.799733] input: syz0 as /devices/virtual/input/input16 [ 986.858847] CUSE: unknown device info "" [ 986.880166] CUSE: zero length info key specified [ 987.090508] IPVS: ftp: loaded support on port[0] = 21 03:44:54 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x0, 0x0, 0x0, 0x8800]}, &(0x7f0000000000)=0x54) 03:44:54 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$KVM_SET_CLOCK(r0, 0x4030ae7b, &(0x7f0000000100)={0x3, 0x2}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000004c0)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000500)={@rand_addr="95117f228ac71b8c6d81233d3be982f2", @initdev={0xfe, 0x88, [], 0x1, 0x0}, @rand_addr="5d5f7c0da31c9dcdc63da375901fba2d", 0xcf, 0xffffffffffffffff, 0x1, 0x500, 0x7ff, 0x80000, r1}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123d123f3188b070") syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="dd6f6d6d69740200b330300000000000000000000000"]) [ 987.187224] Unknown ioctl 1076932219 [ 987.193474] Unknown ioctl 35123 [ 987.209751] Unknown ioctl 35084 [ 987.241086] gfs2: invalid mount option: Ýommit [ 987.242005] IPVS: ftp: loaded support on port[0] = 21 [ 987.251761] gfs2: can't parse mount arguments 03:44:54 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x800000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:54 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x2000000000000000, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:54 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x2000000}]) 03:44:54 executing program 1: mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x3, 0x40031, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x3, 0x40) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x8001, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb33, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000fe3)="441f082f71701dd0b7e88dfe36cef3e26def2300020000001100001300", 0x1d) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) getsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000001000)=""/4096, &(0x7f00000001c0)=0xe7683999382ca226) [ 987.322651] Unknown ioctl 1076932219 [ 987.327968] Unknown ioctl 35123 [ 987.335434] Unknown ioctl 35084 [ 987.388790] gfs2: invalid mount option: Ýommit [ 987.430214] gfs2: can't parse mount arguments 03:44:54 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x6000000000000000, 0x0, 0x0, 0xc00000005000000}}}, 0x90) [ 987.464227] CUSE: unknown device info "" [ 987.468419] CUSE: zero length info key specified [ 987.484465] CUSE: unknown device info "" [ 987.500248] CUSE: zero length info key specified 03:44:54 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x4000000}]) 03:44:54 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x900000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:54 executing program 0: r0 = semget$private(0x0, 0x0, 0x10) semctl$GETNCNT(r0, 0x0, 0xe, &(0x7f0000000680)=""/236) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='./file0\x00') r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000540)='/proc/capi/capi20ncci\x00', 0x604000, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000780)='/dev/vhci\x00', 0x0) ioctl$IMGETCOUNT(r1, 0x80044943, &(0x7f0000000600)) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x48000, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000580)=0x800, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000005c0)={r2, r2}) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000400)=0x100) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000440)={0x0, r2, 0xc, 0x3}, 0x14) setxattr$trusted_overlay_redirect(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='trusted.overlay.redirect\x00', &(0x7f0000000500)='./file0\x00', 0x8, 0x3) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000040)='em1lo/\x00', &(0x7f0000000100)='wlan1{wlan0vmnet0userself\'bdev\x00', &(0x7f0000000140)='\xe8\'\x00', &(0x7f0000000180)='system^:-ppp1-vmnet0selinux\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000200)='#security^\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='mime_typewlan1bdev(,\x00'], &(0x7f00000003c0)=[&(0x7f0000000300)='(*\'bdevem0\x00', &(0x7f0000000340)='selinux\x00', &(0x7f0000000380)='wlan0\x00']) 03:44:54 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x20002, 0x197) getsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000340)='asymmetric\x00', &(0x7f00000002c0)=@keyring={'key_or_keyring:'}) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000200)=0x9) request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f00000001c0)='key_or_keyring:', r1) [ 987.676573] CUSE: unknown device info "" [ 987.680765] CUSE: zero length info key specified [ 987.723171] CUSE: unknown device info "" 03:44:54 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0xa00000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 987.791112] CUSE: zero length info key specified [ 987.972109] IPVS: ftp: loaded support on port[0] = 21 03:44:55 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x0, 0x0, 0x0, 0x1000000]}, &(0x7f0000000000)=0x54) 03:44:55 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}]) 03:44:55 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0xffffffff00000000, 0x0, 0x0, 0xc00000005000000}}}, 0x90) 03:44:55 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x4, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0x44, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="00634040000000001400000000000000000000000000000000000000000000000000000018000000000000000800000000000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB="852a687700000000", @ANYRES64=0x0, @ANYBLOB="0000000000000000ac958580812a01ddb115b330ada7e7a9c02a83772d6ee8fa07bb78bd8a300535e97d53b039f028adccb9f49452d2c7f2e713d84b466b705acb9fd2b2b712cb7d85a31b3c458b104a3e40439090d591736b217ca53496fc4232769a74803da3e82a40ba60ec9d2d659e5683700deb8eff6fc4d789c060833c252e622f2e"], @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']], 0x0, 0x0, 0x0}) 03:44:55 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$pppoe(0x18, 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000000000000007000000000000000000000000000000000000ffffffff0000000000000000000000000012c31aa8b556307b00920908939f6555e9f9678500160900000000000000000000000000000000000000ffffffff0100000054afe13ed5cb396328e0000000000000000000b3958c76d852488e621a000000000000010001000000010000000000000000000000feffffff010000001100000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000fb0000000001000000000000000000000000100000fa000000000000000000000000a85f0000000001000000000005000000aaaaaaaaaa0000020000000000007000000070000000a07f0000005544495400000000000000000000000700000000000000492b86b6466b26f82fc2bc154ecd2da399a7434a5ee68c4972abb658799f6a8f643238c0f103598d7f503d02b56134ce6ce0f649d7f6957dec207f3fb11e52bed3a44a8050cb93d4e3552b2a1a07d7f7f0c4c73f8975103dfe79845565886faf4e5c"]}, 0x20a) connect$pppoe(r3, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r3, &(0x7f000000d180), 0x4000000000000eb, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000400)={0xfffffffffffffffa, 0x6, 0x4, {}, 0x1, 0x6}) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='fuse\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2cf26f6f7443b193583d30303030303030303030303030303030303130303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) recvfrom(r0, &(0x7f0000000180)=""/153, 0x99, 0x1, &(0x7f0000000340)=@in6={0xa, 0x4e23, 0xe5, @dev={0xfe, 0x80, [], 0x24}, 0x100000000}, 0x80) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000000)={{0x7ff, 0x100000000, 0x4, 0x8, 0x6}, 0xf2}) truncate(&(0x7f0000000300)='./file0\x00', 0x0) close(r1) fsetxattr(r1, &(0x7f0000000040)=@known='com.apple.system.Security\x00', &(0x7f00000003c0)='(\x00', 0x2, 0x3) 03:44:55 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0xb00000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 988.191295] binder: 21061:21068 Acquire 1 refcount change on invalid ref 0 ret -22 [ 988.215718] binder: 21061:21068 transaction failed 29189/-22, size 24-8 line 2896 [ 988.225041] IPVS: ftp: loaded support on port[0] = 21 [ 988.226896] kernel msg: ebtables bug: please report to author: Wrong len argument [ 988.238809] CUSE: unknown device info "" [ 988.243088] CUSE: zero length info key specified [ 988.250674] binder: 21061:21072 transaction failed 29189/-22, size 24-8 line 2896 [ 988.251466] binder: 21061:21068 Acquire 1 refcount change on invalid ref 0 ret -22 03:44:55 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}]) [ 988.310463] CUSE: unknown device info "" [ 988.325316] CUSE: zero length info key specified 03:44:55 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0xf00000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 988.369037] binder: undelivered TRANSACTION_ERROR: 29189 [ 988.386998] binder: undelivered TRANSACTION_ERROR: 29189 03:44:55 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@empty, @empty, [{[{0x9100, 0xff, 0x6, 0x4}], {0x8100, 0x1e, 0x6}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 03:44:55 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x2, 0x0, 0xc00000005000000}}}, 0x90) 03:44:55 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}]) 03:44:55 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = dup2(r0, r0) getsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, &(0x7f0000000040)) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) [ 988.673638] CUSE: unknown device info "" [ 988.678294] CUSE: zero length info key specified [ 988.797266] CUSE: unknown device info "" [ 988.801540] CUSE: zero length info key specified [ 988.987906] kernel msg: ebtables bug: please report to author: Wrong len argument [ 989.088316] IPVS: ftp: loaded support on port[0] = 21 03:44:56 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x0, 0x0, 0x0, 0x11000000]}, &(0x7f0000000000)=0x54) 03:44:56 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x1000000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:56 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000100)={0x80000001, 0xfffffffffffffffa, 0x7, 0x2800000000000000, 0xffff}) fchmodat(r0, &(0x7f00000003c0)='./file0\x00', 0x106) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x400000001) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x10, 0x3, 0x40000000000010) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x181280, 0x0) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, r2, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000001}, 0x800) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000004000)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x440c2, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000180)={0x7f, 0x4, [0x8]}) 03:44:56 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x3, 0x0, 0xc00000005000000}}}, 0x90) 03:44:56 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}]) 03:44:56 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(0x0, 0x0) mkdir(0x0, 0x0) close(0xffffffffffffffff) r1 = shmat(0xffffffffffffffff, &(0x7f0000ffc000/0x4000)=nil, 0x1000) shmdt(r1) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000280)='./file1\x00', 0x40000, 0x0) open(0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000001d80)='/dev/ion\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'veti\xc4\xa2\x0e\x00\b\x00@\x00\xbd\xef\xff\t', 0x43732e5398416f1a}) [ 989.418977] FAT-fs (loop0): bogus number of reserved sectors [ 989.442535] CUSE: unknown device info "" [ 989.448161] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 989.463624] CUSE: zero length info key specified 03:44:56 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x1100000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 989.469004] FAT-fs (loop0): Can't find a valid FAT filesystem [ 989.488750] CUSE: unknown device info "" 03:44:56 executing program 4: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000005000000068000000400000004ca7007e929ddea09896c1f8eb16f062cdedd43a69f10d568b3077e76d87c7b6a2ff09a28d5b034171e62c53a2d7487bd27ddfc31704e72256b5bf62d302cfb001a3ac4cecc2dc4fc2a35225567dea0000a36106425632b2f800c78322499bdedadf1e6a8e0d2bdbbf95d91d631cfefa816f45a77a0bbcbdf051dbdda85a856d6e2b795b61998cb52da979ada472ac4882b9ac050df0f8bf6fe1cdf5f41db30000000000000000"], &(0x7f00000001c0)=""/220, 0x72, 0xdc, 0x1}, 0x20) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x0, &(0x7f0000000600)) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000180), &(0x7f0000000300)=0x4) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r2, 0x40405515, &(0x7f00000000c0)={0x4, 0x6, 0x6, 0x32fe, 'syz0\x00', 0xa9bd}) [ 989.513297] CUSE: zero length info key specified [ 989.519747] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 989.588039] IPVS: ftp: loaded support on port[0] = 21 [ 989.595017] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 03:44:56 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x4, 0x0, 0xc00000005000000}}}, 0x90) [ 989.665565] 9pnet: Insufficient options for proto=fd 03:44:56 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x1200000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:56 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000080)={0x9, @pix_mp={0x0, 0x0, 0x3132564e}}) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000000)={0x0, 0x32435753, 0xaa6, 0x8, 0x2, @stepwise={{0x8, 0xffff}, {0x2, 0x40}, {0x0, 0x10001}}}) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x80280, 0x0) ioctl$KVM_GET_NESTED_STATE(r1, 0xc080aebe, &(0x7f00000002c0)={0x0, 0x0, 0x2080}) clock_gettime(0x0, &(0x7f0000002380)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000002400)={0xadb}, 0x0, &(0x7f00000023c0)={r2, r3+10000000}, 0x8) r4 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x101, 0x80) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000001c0)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000240)={r5, &(0x7f0000000200)=""/56}) [ 989.723279] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 989.776518] FAT-fs (loop0): bogus number of reserved sectors [ 989.810005] FAT-fs (loop0): Can't find a valid FAT filesystem 03:44:56 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 989.829587] CUSE: unknown device info "" [ 989.846221] CUSE: zero length info key specified [ 989.875103] CUSE: unknown device info "" [ 989.911067] CUSE: zero length info key specified [ 990.257688] IPVS: ftp: loaded support on port[0] = 21 03:44:57 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x0, 0x0, 0x0, 0x88000000]}, &(0x7f0000000000)=0x54) 03:44:57 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x1300000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:57 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(0x0, 0x0) mkdir(0x0, 0x0) close(0xffffffffffffffff) r1 = shmat(0xffffffffffffffff, &(0x7f0000ffc000/0x4000)=nil, 0x1000) shmdt(r1) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000280)='./file1\x00', 0x40000, 0x0) open(0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000001d80)='/dev/ion\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'veti\xc4\xa2\x0e\x00\b\x00@\x00\xbd\xef\xff\t', 0x43732e5398416f1a}) 03:44:57 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x5, 0x0, 0xc00000005000000}}}, 0x90) 03:44:57 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x8200, 0x0) sendmsg$alg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{0xfffffffffffffffd}], 0x1, &(0x7f00000001c0)=[@assoc={0x18, 0x117, 0x4, 0x5}, @iv={0x20, 0x117, 0x2, 0xa, "440e5ebae1dba77d6914"}, @iv={0xd8, 0x117, 0x2, 0xc1, "03bf088250b901b9663e7d5534162f506ce1ef4f589ad2a2ad8861007739e5bc2eaa00714a828bdf987fdf115dbfcf108f06387f802ebadfc5bced068368f8aeb35e2dbe334e18dcf0810d51c30d14568d9ca06431a309259155c701a5d31284456d9810eb1b1b413deed762d000306e7f20252c3128e4d65df01f9a44aaddc6d2abee48a9bf1270e9f7f661ba048d0c02932b2600296501e581943c5d5f4f3e933bf5bc50da64d0c965f0f7754feb1a0549044bdfcd888acf64e6c4b09a9e0943"}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0xb0, 0x117, 0x2, 0x96, "cb8b599b30d4006ac6804f09ee8a440603ba5d998a337ad9a841951155abb75fb91425f44f0b5528a1f21b05eff98f1a4fb96b7c1f1c9539403cf1c91d8a935bab1da456aa05ed9502a70f54233338945744df15ebf60f1a665c44bd3d2dd53b94badfed30ef215344f561a3715325193a9cc151f88a1271e8d7820afc5ff1d1e3addf44bc42cacbb0820f2f61df9b049ecdd0d0d716"}, @iv={0xe8, 0x117, 0x2, 0xd4, "7733a90793a94b7cc307c2347bb05bda4193caa048b95dc078c1b840440742491961d12402b02a49279e17f313b428059bb4507f5deb1934ac85ad764a5a18041cccac4bbd7f8e23c79f5bc07fa8eb1d6e1b1426dfe790ab89faca14d96ce91587b949f259d84547bf75c1e5d664bce225e2cffb94b48e0439b6d3f6926d8d20f429c9b792fdf04f86730a9e982372981823620749c86a0431c64ff4f078814120fb556dfa8c6c66a8a2b709d908bc6d59ce459db3a33bef0cfd96b794ba5cbbf757d155cf7f969ba41cf73fefb02af340f80795"}], 0x2c0, 0x4000000}, 0x44000) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 990.406990] CUSE: unknown device info "" 03:44:57 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x5f0c000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 990.441763] CUSE: zero length info key specified [ 990.458454] FAT-fs (loop0): bogus number of reserved sectors [ 990.469488] CUSE: unknown device info "" [ 990.489472] FAT-fs (loop0): Can't find a valid FAT filesystem [ 990.490356] CUSE: zero length info key specified [ 990.507371] IPVS: ftp: loaded support on port[0] = 21 [ 990.514486] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 03:44:57 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x1, &(0x7f00000000c0)=0x8, 0x4) 03:44:57 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x6, 0x0, 0xc00000005000000}}}, 0x90) 03:44:57 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x0, 0x0, 0x0, 0x11000000]}, &(0x7f0000000000)=0x54) 03:44:57 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x8100000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 990.756786] CUSE: unknown device info "" [ 990.765506] CUSE: zero length info key specified [ 990.802976] CUSE: unknown device info "" [ 990.812437] CUSE: zero length info key specified 03:44:57 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x101, 0x401, 0x81}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x80c, &(0x7f0000000040)=0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f0000000100)={0x3, 0x2, 0x6}) close(r1) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 03:44:57 executing program 0: syz_emit_ethernet(0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB="0180c2000000aa4503002800000000002f9078ac2814aaac1414000000883ecdb65c4048db8c38a15675bb931fa4293a0eee362451c5d12505f08b3d89dfdf18676e8006ab6f0d7dd165786a84ff6100000000000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="00c45c7a000000a9"], 0x0) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$KVM_NMI(r0, 0xae9a) [ 990.886293] IPVS: ftp: loaded support on port[0] = 21 [ 991.272811] IPVS: ftp: loaded support on port[0] = 21 03:44:58 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x0, 0x0, 0x0, 0x100000000000000]}, &(0x7f0000000000)=0x54) 03:44:58 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x7, 0x0, 0xc00000005000000}}}, 0x90) 03:44:58 executing program 0: recvmsg(0xffffffffffffff9c, &(0x7f0000015580)={0x0, 0x0, &(0x7f0000015500)=[{0x0}, {&(0x7f0000014140)=""/216, 0xd8}, {&(0x7f00000142c0)=""/199, 0xc7}, {&(0x7f00000143c0)=""/239, 0xef}, {&(0x7f00000144c0)=""/14, 0xe}, {&(0x7f0000014500)=""/4096, 0x1000}], 0x6}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x11, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\xf4\xb8\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xa71o\xcc\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\a/\xf6\x1f\a]\xd9PJ@\x94 \x9f\x15\x7fVu\xf5\x8d\xf88\x95i\xd9E\x96\x86x\x87\xf7e<\xfdt$x95\xba\xe4C#R\xe1\xe4\xa8', 0x2761, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x8, 0x100000000000000, 0x2, 0x0, 0x0, 0x0, 0x62140, 0x8, 0x0, 0x5, 0x0, 0x9, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3fe0000000, 0x0, 0xb3, 0x0, 0x0, 0x6b34, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x20, 0x1, 0x0, 0x1, 0x6, 0x0, 0x6}, 0x0, 0xd, 0xffffffffffffffff, 0x0) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000500)=""/81) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x40, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x237, &(0x7f0000000100), 0x0, 0x0, 0xffffffffffffff07}, 0x0) ioctl$PIO_SCRNMAP(r1, 0x4b41, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000200), &(0x7f0000000240)=0xb) ioctl$TUNATTACHFILTER(r1, 0x401054d5, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 03:44:58 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x8e7e000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:58 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x6, &(0x7f0000000040)=0x0) close(r0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) bind$rxrpc(r2, &(0x7f0000000100)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e23, 0xfffffffffffffffb, @local, 0x7ff}}, 0x24) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 991.593019] CUSE: unknown device info "" [ 991.612973] IPVS: ftp: loaded support on port[0] = 21 [ 991.624836] CUSE: zero length info key specified 03:44:58 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x9effffff00000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:58 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0xaa3, &(0x7f0000000240)=0x0) close(r0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) ioctl$DRM_IOCTL_AGP_INFO(r2, 0x80386433, &(0x7f00000000c0)=""/146) [ 991.650453] CUSE: unknown device info "" [ 991.664921] CUSE: zero length info key specified 03:44:58 executing program 0: setitimer(0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$mice(0x0, 0x0, 0x100000ca204) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$P9_RSTATFS(r0, &(0x7f0000000000)={0x43, 0x9, 0x1, {0x5, 0xffffffff, 0x1ff, 0x8000, 0x5, 0xfff, 0x7, 0x4e, 0x7}}, 0x43) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000000a000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa00000400, 0x0, 0x8000010004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, &(0x7f00000002c0)) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x2}, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000005c0)={0x0, 0x7fff}, 0x8) mount$9p_unix(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="14000000", @ANYRES16=r3, @ANYBLOB="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"], 0x14}}, 0x0) lsetxattr$security_smack_entry(0x0, &(0x7f0000000300)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x3) 03:44:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8, &(0x7f0000000280)="0adc1f023c123f3188a070") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) ioctl$int_in(r1, 0x800000c0045006, &(0x7f00000004c0)=0x100000035) socketpair(0x0, 0x5, 0x9, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$cec(&(0x7f00000001c0)='/dev/cec#\x00', 0x2, 0x2) syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x0, 0x2) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000000c0)=0x0) fcntl$setown(r3, 0x8, r4) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz1\x00', 0x200002, 0x0) r6 = openat$cgroup_int(r5, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r6, &(0x7f0000000700), 0x100000000000000d) sched_setaffinity(0x0, 0xfffffffffffffd9e, &(0x7f0000000100)=0x40000000000009) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000b60000/0x4000)=nil) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 03:44:58 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8, 0x0, 0xc00000005000000}}}, 0x90) 03:44:58 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0xf0ffffff00000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:58 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x44050, r0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r1) r3 = dup2(r0, r1) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x2000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@debug={'debug', 0x3d, 0xc2f7}}, {@cache_fscache='cache=fscache'}, {@access_user='access=user'}, {@fscache='fscache'}], [{@audit='audit'}, {@obj_type={'obj_type'}}, {@euid_lt={'euid<', r4}}, {@euid_eq={'euid', 0x3d, r5}}]}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) [ 991.974407] CUSE: unknown device info "" [ 991.999691] CUSE: zero length info key specified [ 992.017153] rpcbind: RPC call returned error 22 [ 992.055588] CUSE: unknown device info "" [ 992.093476] CUSE: zero length info key specified [ 992.357661] IPVS: ftp: loaded support on port[0] = 21 03:44:59 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x0, 0x0, 0x0, 0x1100000000000000]}, &(0x7f0000000000)=0x54) 03:44:59 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0xfcffffff00000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:44:59 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0xc, 0x0, 0xc00000005000000}}}, 0x90) 03:44:59 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2000, 0x0) sendmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]}}], 0x1, 0x8000) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f0000007d80), 0x6, 0x0) 03:44:59 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$rose(r2, 0x104, 0x7, &(0x7f00000000c0)=0x9, 0x4) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 992.505853] CUSE: unknown device info "" [ 992.536217] CUSE: zero length info key specified [ 992.542738] CUSE: unknown device info "" 03:44:59 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0xfeffffff00000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 992.577176] CUSE: zero length info key specified [ 992.635690] IPVS: ftp: loaded support on port[0] = 21 03:44:59 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x10, 0x0, 0xc00000005000000}}}, 0x90) [ 992.720331] rpcbind: RPC call returned error 22 [ 992.785893] CUSE: unknown device info "" 03:44:59 executing program 0: setitimer(0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$mice(0x0, 0x0, 0x100000ca204) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$P9_RSTATFS(r0, &(0x7f0000000000)={0x43, 0x9, 0x1, {0x5, 0xffffffff, 0x1ff, 0x8000, 0x5, 0xfff, 0x7, 0x4e, 0x7}}, 0x43) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000000a000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa00000400, 0x0, 0x8000010004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, &(0x7f00000002c0)) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x2}, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000005c0)={0x0, 0x7fff}, 0x8) mount$9p_unix(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="14000000", @ANYRES16=r3, @ANYBLOB="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"], 0x14}}, 0x0) lsetxattr$security_smack_entry(0x0, &(0x7f0000000300)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x3) 03:44:59 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x100f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r3, 0x1}}, 0x10) 03:44:59 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffc, 0x31, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x420201, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000280)=""/209) ioctl$VIDIOC_ENUMOUTPUT(r0, 0xc0485630, &(0x7f0000000200)={0x0, "17f76fe21f7f8f042256eabec2bf5f1b57d43e3544a7a9d2e8adf6ffbeec8778", 0x3, 0x68f, 0x20, 0x1000000, 0x2}) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x128, 0x70bd27, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x7, 0x40, 0x8, 0x5d6}}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x880}, 0x4) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000080)=0x8001) open(&(0x7f00000001c0)='./file0\x00', 0x2a000, 0x10) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f00000000c0)) 03:44:59 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0xffffff7f00000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 992.817015] CUSE: zero length info key specified [ 992.827439] CUSE: unknown device info "" [ 992.906909] CUSE: zero length info key specified 03:44:59 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0xffffffff00000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 993.082288] rpcbind: RPC call returned error 22 [ 993.331049] IPVS: ftp: loaded support on port[0] = 21 03:45:00 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x0, 0x0, 0x0, 0x8800000000000000]}, &(0x7f0000000000)=0x54) 03:45:00 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0xfffffffffffffffe, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 03:45:00 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x60, 0x0, 0xc00000005000000}}}, 0x90) 03:45:00 executing program 1: r0 = socket(0xa, 0x1, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x1c}, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000015c0)={0x0, @in6={{0xa, 0x4e21, 0x1ff, @empty, 0x8}}, [0x1, 0x6, 0x5cd716d1, 0x401, 0x0, 0x3, 0x9, 0x8, 0x8, 0xfffffffffffffffd, 0x5, 0x565b, 0x4, 0x3, 0x2]}, &(0x7f00000016c0)=0x100) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000001700)={r1, 0x5, 0x6, [0x3, 0x80000000, 0x7fff, 0x6, 0x9, 0x83b]}, &(0x7f0000001740)=0x14) io_setup(0x1, &(0x7f00000000c0)=0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000001140)='/dev/snd/pcmC#D#c\x00', 0x80, 0x101000) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/vcs\x00', 0x40, 0x0) r5 = syz_open_dev$mouse(&(0x7f0000001500)='/dev/input/mouse#\x00', 0x8f, 0x10000) io_submit(r2, 0x4, &(0x7f0000001580)=[&(0x7f0000001180)={0x0, 0x0, 0x0, 0x2, 0x0, r0, &(0x7f0000000140)="7bbeb4f98a689f38e4f52d5628db2207d222ae0d25880b100458d6f055f109c903078ff7b04d9c6690a7f9049519e81a94931fbcd52cc750bb80bc62008cb2092a89d51801524611a5cd273f2fdd9ca50cb8165aeedd1f315d65217a1add20c922465a6d83080a5da9555dfcede432ae1382f088c2641e190cbc54945068f523b9cd4125a1a40448bb93aedcd8865fbd9a2d40db60103057e1d51489ae967d5f1360bac4ec20e52106cf0d5de777c82291dd1bcc8535270ad9c9031b6afb066d221a99c23c67d0cea53edff2bc1ef298e51072af49a9c486b9a7c65e5b1ed3fa4395266b5ab5266af8c338ca61e33bfe331e991600b7d7da7a3a1877268c6b82dc2acd1cae8b994b47535c90fbe29c506507d54c9126e3c6aaae5b52d15d11af34c100b4659a75285d0aa4e2419f72d4c003defe1afffad44585d2f1fe4ce5ddfdac6b8e1ddf5ee4c51e7156876c643a4630d66c2e6e9488746921232ae409110fece201eea3d0120f1a62806e0b6f1c56ac7da87f47b5d74d19c4104636f0582e7fefa6515f745486821c1d835311f38ccf0f2e146f29c710d0aaa64cbba5df4d9f5097c61fd2f0b6fc2de8c7e3db2509e54967baecdfd1a97f9c4ac33b9f41697a343d7124affdd47f9402867f3e8885e2e3fa05a04eeac82415c787df397672039fbeb666b08bf1f5fa493e3c7c64372403c1b717969a3ad608b2f863b401cbe985e090521bd118b1685dc952a35a0ff3375692427cb00ea895f696471caacfc81285b8813ddd0cfb2a4ec0f1677135dc79b982faa5060f03150c4f4544167d0b277234e1b4c1207bda2959475a4464d09c1ee33fe7dd3eaf1c55227532dff9fb2960d4cda6787da2c049fe4decdb34befa088af9b3d56be60bb87278d57323e6a42ef51bae467e471e592a2e5185eb4e3bc4d219af30d442e51caa355c3b7c62e810815b81ce95380fda83e860b19764f93f75e5503056d87748c5e7acfe6c6353cc70c5498926067b8a2ff5e9b2c35903f6a2903dbcb92813e46b7ba2f856c707859f09e90a7e7701ee4ee79dd4a4b3deffcfe6be9161067ea8dfbc9c8fc5f1e8f0e19c399d694734f029c08545dfe6b50a16b75cf59b1cccd258cfbfc575a9b674be621021eeee9b521489df01bb41785b2f7c07f785d35a856c94ecaa075c47d46fa9659eca48ce77ef8b447735162128290bbb2ffb38f300b5c5c9366e31ed4baa7c8a2f309b401837bec598e6cf47ba86b8945127d9f492a710fc219d34735fa2002211df10c84c58e54d957701e4bf2df0f0f3cb51381ca50f0c4f3257dd59a431fe754f45986d880e70a26c53ce167f16e3f538b65b3abf8dfa709d7a65e7e246f8604ab859e554350303aae90cd314269c97a2ea16c1c01f4d1832b300545517e4c43ed64597377c6e2fc765f61cf4c8d1f9da291d4da9f3c6ea73f54ba51fa2d6748e8eef458cbbe1a6750e59a3dcc06ee21d0692f72cc802efc01323272ec5b531752f1e5352975844a759a3bc150d4dd94604b623324e0052045a002ec1df08f9ec801c98c2e9f924ce0a1dfeeb05439f74d3fac7daa38d0f61baf6b27a45ddd4e06495bc53581fd82aa6887f8d262c99d8c691d75f53699460f954ff3cc496a14c5127b5830f8232fd17eef55a48063214f51c18919dfbcaa19e7318a0e2b1116fa57a91630053701fce76c0998c0e3d246b9bbae2bbed699e95b3a3e4258e6197f9005a87ac682e2e9782efe1961b64465571cb5e29a926ea4f1701efc26c1bdec04441f012a539676e78d36d0547b80624f3efcd94b8eb91af76777775976732e903a1360aa45e4e6d34c08b70d22d4d05d7b42d39b94d09c9dbca68254a94e89890c1ed167bc649c309c5b76c816f5988148acef48fae0bafde42c6fe17cb5047f2040acf22a406e35acf15807169006a28fc545f78be16b7faff9b24a3ade7a8c4248760e96cf517c40d6ad73b78f0ad36ee8c121e9581e11a47e29d481b877318a6613f5525d6d954847c44bb1c74a6d7944a70ba898f45eb5d9fbfe7d17ae36c0ba3d61531e0c3c69d245c11ad4962a62f562d37c2a20d19213d24bb3ed86583d279a853d439e54f3a5c7977b63a8c8ba86a84cd0563a1f725ef04a7fb740ea2cab1abbf2028ce0e45f2e0b5386c17ddea50fd62d79145c81d046b7a97fe9f917cfe3d37243e60c6f58e5b6bcf1d8d24c32e317a42d9b454170783d01de6a6eb2bea303d6436169deff005bdec7fff5a51e13b2ead7949175fdd9c30c0469f204c073d24571402cbd30b97f8f1f46e959cf7d1ba969a51887972ecf4fff8efb0b5b73505eecd705ad6c00907c0b479a0f0ec8a4fa980193ff3d32008b0a80f008886e557c6ee259d2f5430778e203d964af461925a80d6071663853ea79c913f997d43958993ac44d763e35f5ca474aa47af31e576ebd77541e30130f111df1ff988760661682b8ca6486abd9304693ce326e33cb3cd8ee58cfef21ac30762420fb8ecb6cb1c5197516ef636bcf191263467ad7560be9ce7af27a4f124dde7a940eba46d81a6070561a912a89f029a5a7437eca7d5baf204ab1a1cbc03c91ee8ab6f9760a8da5ba336ae22e7167257724955935727b34e188cb15d219cacc4404b648674961bf21d8564255536e53a8fede0bf29b6078a7a4349a2fe2adbf810cba69c300903ce1214ea44194204d0a3ddee71820eb8a83ac3fc0a9eef59443a8d066750986d89dff75f548f6239bd99ce7d16946275cc68632d6cfbc8d61341a01a1706983ddaa61c96d4ee3e12c48e93f8f602ab408eacdffb06904705699832a7989dda8eafe5df191e7a219f48cdac0ca60b874282726f44908645061d0f9d237b09138c221262d0ba0f8f6adff68d807276461008af361155c8b09f5d9cca0a7cde562385390b0b39513a878417006e2266108fbf29428564518004866dd41d8ac0e1bb0a2c602492d3f78f54c752303c9cc349d281933a561e5c25142223f514b37ff5c1940a6c66958eb38aaf9148c65d06dbe40f21f0dfbc53d577b68d2b17e46716ce7f089eb4721cb8ffbb3efd20df09bd58e61a97ba62ffe8f0fb8e0d2bd5b92555972bc8b9f61deeb4961bc83515c9e285e9bc938f15d602590aa00ca26da86541a073fb265eef366baf3972d5ada0eac65418098bd4e72dc27a46c9fee5cf1b9a656ce902c745c0a55985bcf7421df3cda3b8ff22ce22319fd15391636cfaaddfb1c79fbb1fa6829c6804ffb5d689e9943875e70f61ab21a97974d015fb09f354df121a71b26d254aa54cfbeff3c92e99c71c0d3c2a6319a67e9f767483ce3b1b6671ad43f756ea416993b75a3e8e6fa1962b533f55da59d2637f3fe708b915e024f08971130fed4c4989d06b75721bdd70bbae5d8b72755cca9a35b648040de145b834997fbeee30ebee79d3ed9e5a1a799a255bb73c3ba0ab2bd55dc8b965618e953d7fd1d4575a3a5022655388083de14888ea55a3e22ffffaa23dcb31bbff0a4ee1e8c6fa109147eb6035587532df84e916fa513ae8463756d5a2deb16ffdda3f5d22cdd9b7d19f68b74c0d9d78565d617687f22189fb3360ed0c90b0a7d2c4020c8f8407e0cb6e4f6a25c6e2c61543df339b84f6b9c43d831c054e146490b1ce4ad64d7370af3d726ad2c03b989f34db19abb8b7d6be7c4ce599ca81791379e03b885dcaace7528a4582fcc651ad8bab023388fd73fade8c0fc06dcbb0810367e562cfc0ba505fe3f2b52d18c2c41735465121b26d8a165306afc199f855e87cf5009813f78c5c39bc9cc7d7c33624cb1c851a84455b0409793ab4a8a8877b9e2cf853479003f3db687220128ce6f4c9eb5bdcf6e9797e2f65d6e4494a9c474eaf1d78092d91c048c00043a715cb21fb2e9d3c9b71c61f7203459d6f43b2e7239e89160939a4853476b5ab9c09551772f9bf21b5c9b360ac948d0532f20f81261b6da5e1d51f17fc9603d67235918f579122668661ea6c7af1d7cd2b2367893e06928bba6268fdb058c9a639dab9a9ba591ebe7b35eaf506704fa2dcd6fd0b1edee1f0785d3043384428b7bd4e1ccb790209ab8e697e3be4edb27ca9a603752b6722d90b9adcfede42e54a5660e9f7eb76470df16933c430f9edbf206da2d631a6f8bf46fc12d61242f978ef32c072f6b81f63b2b9752bd3ad406b02f32aa8d10f13db04c5aeefbb63b7c923493fb3cede82d3ad1af48333c2702c36f3b0d67e3afe6bc94232024f9ada490026bb58f5ac3b90ed66f82bf6ff090451885b835595ad5c2acc5db59846f0e3f78abd4c0d7e56c552aae5cf5b913f6e10fe97eb54f2ca94781003038211e7160e6fd458091070108710d41ab9396134927240df703f571c7618a8d5ccb04a4d000aa850a03857cc730199bfd352377a1536b5f807dc27f7764dd552ad537ded1a32345e82a5d102797490903145d4d85f90131fd80987118b5ad7cda509b39443bfe9e2a8c6eb1892cfd85f1ae390f9aee711b741c2c4bb7ea1a7a52f03ba2957bfa27df0dc5eaf9504795fbcab0c7af202aca0ad7e15ea109a0cff7156a906bcb07fd6aa0497114ffea43bfe7cd0837aa44da69931ae428dfd79d875e8f089eefa0ae61cd05bb1d954598608fe5c7341550f374df5444e877ac331e793c6e0c888ac279fdaaf31a185d0662ed3fa998c7f055c7805d29d56569dc137cdb252fbf7f261d6b0cec17ef28f336958f63060abb6220827887a3e19d01ddbb97d094a5d933c0d0e7cf38e3d371bd9124db991b2f2cbef294f60061786ce3688fed4846b4e28f1c7fedcc129ad81e73a58afdf2ab45b79ef4bb2d7998b8c26341b470ef0206ab1fa6f0e7276c652bf7dd7deb7aa4828e93a51a67afbcd89b8e48ac9d46890cb1160803ff16896ae157ea5960055cbc05cd1cdd70dc548b1a4e463cac90fce25a3b729a4538ed6f1ed24d353acbf25aa3dccdea3ac2cfd827de4c627e3639c391de03e9facc0c2a9d163a810f690d13c8d158fa2aeec2b6bc802774ba601c806f06d59f708fda696df28fec9d4f2307d36b3b6b3f750748bc9e59d1ee3cb32d43bfbd87fb74ad9d084a8f9e945abcd719bd51b9803b1f4decd43a1f6571c03abcf43b776e03644c71ce4becf91a6e1e9d1bb6ba6bfebf2d062c9f645434efeff4a45efa20bebe6e15f76f70ed21b56a31abc5b77edc42d2f93ce50671eb482be6bea00d3c2acb345c68869aeba4ed090aa0917e5261b4c930209cad7e95ffbe8604007c4a714bba1dbf05f9f008a6097a83857f78cc6bb4401926cc0c934b44d662dd3464b9e5579f678bcc25bdc2fa62e2bc8b5fe2b5c7bfaa1b8171296a2ce7129e47172858c17660ede750ef51addfbe19cbd415365f1ac8c8d00cf990ec218ecc525a7274be717d57d6a4e52a275840557699115fd17ed892ebb7953c9db82cec506b29c8b73089a6917c33172cb05ea3d667c31234fb97431e8e34f92ea42f787f5ec5c37fddc29b6e34c665451a113913ff0a3682c5ae3c586573dcd80c480ed0c2b8f5220a35d6382c448ab77041ce245f8a9ad1eaf12c8f205c57d2d53e97dda697cf796878affb112d4d78ae5f4643eec93c98efe4491b30b4d8add9f26fca5235d3625a54fc35b8adb2bea12b0a10ddc2ee2f129d9c4e30b4fb2525ea71519203a48a27f59414cea7e902d3db2dfaae0d72b7cae12c0cab37b47e0a09d393a2bc57d1bf9d28070c15bbe8b09c2cf5f6c400e44fcf0d7b3dd9ec12b3d7c218e25d8017b6f52228e559a596b93e6c3d2eaefd9f0cb7aa04679", 0x1000, 0xffffffff, 0x0, 0x1, r3}, &(0x7f0000001300)={0x0, 0x0, 0x0, 0x7, 0x80, r0, &(0x7f00000011c0)="b362842879b58c1fffd29936e117c8000054755de5156c44bffb0b9a3c963a475459ad997988bb03347a33e45ca01b1c06407b464ef71ce772dd9b9a90d17a31c6a9fb0d9ed33718036f81818c5e5ac5da298156cd1580a6ce9c6b4474315ae673bc13225aec375b980accbc91152d98ef9b9506aa89db752f0153acf8c210426721e897ff62f2cd0eba1e02de4e69dc71cfc160006d3cfb183d85a256941cf10417c07a19830cf1e9b7835f5577588025c4a969cfbd431fcc1087777327e1ea355b90d83e3e3669649573ae54e11c020edc13ecc309e8c098672c0f704069d068883dfc23a8c2a671f563a9d653e3008bf4d8ef72", 0xf5, 0x4, 0x0, 0x1, r4}, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x3, 0x3, r0, &(0x7f0000001340)="77a50bc4f7415e2dffdfd67dbec4af878bf14a16649caf39ae27d0831426ec42633dd2fa81e680e81424b66f573f77c0c322d1b04318cbb32133a6f792df5d30be790f8a646edec35b37ef910ccdbd226722ba60db5be8dc5eb5ca38426b60276dfbdc8517f84ce336d1f5521e594f5600e09112464b55a6e1c0542f13ee5d7c8f46b78c94877fd6", 0x88, 0x8}, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x7, 0x7fff, r0, &(0x7f0000001440)="60ab18e65ca7bc8c9cfed0e8203345faa755d06d1d63a555190ac3f93f9b27f190941079af94e89d849b5c5028fd6a5337267278110de79bbc17e22952f0786a896344aa308e6f546fdcd30b64994a30a87631ffeb3e240603c376eeeb236e03c07be292d727a33e089fdaa4ceb8ef1af30b8bcf97e130371dca5976c437e126ceb89ff5c15c04b524eae8ad5f8fc6ea480b9d436cb4959ff06df478bdd29fe2506f66", 0xa3, 0x7, 0x0, 0x2, r5}]) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000000)=0xffffffff, 0x4) getsockopt$inet6_int(r0, 0x6, 0x23, &(0x7f0000000100), &(0x7f0000013000)=0x10) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x1, 0x0) 03:45:00 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0xfffffffffffff000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 993.579461] CUSE: unknown device info "" 03:45:00 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:45:00 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x300, 0x0, 0xc00000005000000}}}, 0x90) [ 993.613576] CUSE: zero length info key specified [ 993.624297] CUSE: unknown device info "" [ 993.640031] CUSE: zero length info key specified [ 993.647974] IPVS: ftp: loaded support on port[0] = 21 03:45:00 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 03:45:00 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x80, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r1, 0xc, 0x1}, 0x14) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e24, 0xfff, @empty, 0x1ff}}, 0x0, 0x9, 0x0, "78976f2764735c2507a43948ff67dc48c1b96826d6f7862e2914f87fe1930d8e5a8242ea1f7385859ad949299d796e1bb03d8262a951a14af536229dbefe5859fd9cf7f6eb5bae8db6ac69b1102d148e"}, 0xd8) umount2(&(0x7f0000000280)='./file0\x00', 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x80040) prctl$PR_SET_TSC(0x1a, 0x3) openat$vhci(0xffffffffffffff9c, 0x0, 0x200101) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) 03:45:00 executing program 0: mmap(&(0x7f0000000000/0xd15000)=nil, 0xd15000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) sync_file_range(r0, 0xeb4, 0x1, 0x2) setsockopt(r0, 0x800000010d, 0x800000000011, &(0x7f000045affc)="02080000", 0x4) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xfffffffffffffffe, 0x0, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000000)={0x3, @vbi={0x3000, 0x200, 0x40, 0x494e4f4b, [0x1a3, 0x6], [0x0, 0x8], 0x1}}) socket$inet_dccp(0x2, 0x6, 0x0) [ 993.808636] CUSE: unknown device info "" [ 993.812829] CUSE: zero length info key specified [ 993.845554] CUSE: unknown device info "" [ 993.850026] CUSE: zero length info key specified 03:45:00 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x3}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:45:00 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x500, 0x0, 0xc00000005000000}}}, 0x90) [ 994.099523] CUSE: unknown device info "" [ 994.130036] CUSE: zero length info key specified [ 994.181047] CUSE: unknown device info "" [ 994.200473] CUSE: zero length info key specified [ 994.364867] IPVS: ftp: loaded support on port[0] = 21 03:45:01 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x11]}, &(0x7f0000000000)=0x54) 03:45:01 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) sendto$isdn(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="80000000010000fab301249a3cb368b6284f0d4d61abe3c0d2d2a2b201620308da0f9abc0b90a1843d967ede5aedbe3701f8e7b4437c13b55d7ed1ae0b4ee58b7e48b0dee8871a2318a4fd29308b5cf54b81be29263bba868b6a17432bf0f54b1d5f3bdff5cb70f8dcc68c433a28749163c705003c9969a816f9bf34bae3c8cc4b773c7d80265eb23c6468d2129ef7fc3a8f8872d52b03c0842355c27b4854629c5d1b51480eeb49bbca848ea173566e55550131aaa5d0d13d734a7a48079589835ef8d35bb96d02366530713275007a"], 0x34, 0x4004094, 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) accept4$nfc_llcp(r2, 0x0, &(0x7f0000000140), 0x800) 03:45:01 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) ioctl(r0, 0x427, &(0x7f00000001c0)="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") r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x5) 03:45:01 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:45:01 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x600, 0x0, 0xc00000005000000}}}, 0x90) 03:45:01 executing program 1: r0 = socket(0x1, 0x5, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfff9, 0x0, 0x0, 0x353866ad89056ad6) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000000440)={'ipddp0\x00', 0xacee, 0x4}) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20\x00', 0x80000, 0x0) r4 = getpgid(0xffffffffffffffff) write$cgroup_pid(r3, &(0x7f00000003c0)=r4, 0x12) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x4000}) r5 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x2, 0x2) waitid(0x1, 0x0, &(0x7f0000000000), 0x8, &(0x7f00000002c0)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x6, 0x1f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r6) capset(&(0x7f0000000380)={0x19980330}, &(0x7f0000001fe8)={0x20000fffffffc, 0xffffffffffffffff}) setpriority(0x2, 0x0, 0x0) getpeername$ax25(r5, &(0x7f0000000140)={{0x3, @default}, [@rose, @rose, @null, @null, @bcast, @rose, @rose, @netrom]}, &(0x7f00000000c0)=0x48) [ 994.568012] CUSE: unknown device info "" [ 994.599789] CUSE: zero length info key specified 03:45:01 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x5}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:45:01 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000100)={0x7, 0x2, 'client1\x00', 0xffffffff80000000, "098bd20a462ac706", "414b63ee3c90ecb1377ef5ee30770ba0b65d28f3afa8e3ea3eb3ebe8e0adc3ec", 0xc00000000000000, 0x1ff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000200)={0x6, &(0x7f00000001c0)=[{0x8bbc, 0x1000, 0x6, 0x1f0000000000}, {0xaf, 0x9, 0x80, 0x9}, {0xffff, 0x3, 0x2, 0x5}, {0x41a2, 0x51f6ee56, 0x7, 0x7}, {0xfffffffffffffffb, 0xfff, 0x54, 0x4}, {0x6, 0x704, 0x5, 0x9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) r2 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) shmctl$IPC_RMID(r2, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000280)=0x1c) io_submit(r1, 0x2f, &(0x7f0000000600)) [ 994.647261] IPVS: ftp: loaded support on port[0] = 21 [ 994.671413] CUSE: unknown device info "" 03:45:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x8000000000003, 0x2) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x20000, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'irlan0\x00', 0x0}) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000200)={@remote, @local, r2}, 0xc) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000000)={@loopback, @broadcast, 0x0, 0x3, [@dev={0xac, 0x14, 0x14, 0x1c}, @dev={0xac, 0x14, 0x14, 0x1f}, @local]}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000018, 0x0) [ 994.711262] CUSE: zero length info key specified 03:45:01 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) clock_gettime(0x7, &(0x7f0000000000)) 03:45:01 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x700, 0x0, 0xc00000005000000}}}, 0x90) 03:45:01 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x6}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 994.983236] CUSE: unknown device info "" [ 995.023622] CUSE: zero length info key specified [ 995.043166] CUSE: unknown device info "" [ 995.071576] CUSE: zero length info key specified [ 995.264895] IPVS: ftp: loaded support on port[0] = 21 03:45:02 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x88]}, &(0x7f0000000000)=0x54) 03:45:02 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000040)=0x0) close(r1) splice(r0, &(0x7f00000000c0)=0x26, r0, &(0x7f0000000100)=0x16, 0x7, 0x1) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000140)=0x1) 03:45:02 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x100, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r0, 0x4040ae70, &(0x7f0000000280)={0xbe6, 0x81, 0x3, 0x101}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020e00001000000000000000000000000800120000000100000000000000000006051ea0abff7f000000000000000000e000000100000000000000000000000000000000000000f9ff0020001d63da4f030006000000080002000080ac14ffbbf000000000000000030005000000001e0200423b1d632b91c520000000000800"], 0x80}}, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r1, 0x8000}], 0x1, &(0x7f00000000c0)={r2, r3+10000000}, &(0x7f0000000100)={0x6}, 0x8) r4 = socket$key(0xf, 0x3, 0x2) sendmmsg(r4, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) socket(0x7, 0x3, 0x15) 03:45:02 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0xc00, 0x0, 0xc00000005000000}}}, 0x90) 03:45:02 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x18, &(0x7f0000000040)={@mcast2={0xff, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}}, 0x20) shmat(0x0, &(0x7f0000ffa000/0x4000)=nil, 0x1000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x10000, 0x0) 03:45:02 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 995.388313] CUSE: unknown device info "" 03:45:02 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 995.411938] CUSE: zero length info key specified [ 995.430159] CUSE: unknown device info "" [ 995.440000] CUSE: zero length info key specified 03:45:02 executing program 1: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x2000000, 0x40000) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f00000000c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") clock_adjtime(0xd8f734fe6eb7b72e, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3, 0x80000) 03:45:02 executing program 4: r0 = semget$private(0x0, 0x1, 0x1) semctl$IPC_RMID(r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x200, &(0x7f00000003c0)=0x0) clock_gettime(0x20000009, &(0x7f00000001c0)={0x0, 0x0}) utimes(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)={{r4, r5/1000+30000}}) close(r2) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r6, 0xc0145401, &(0x7f0000000140)={0x3, 0x2, 0x100000000, 0x0, 0x80000001}) write$FUSE_INTERRUPT(r6, &(0x7f0000000440)={0x10, 0x0, 0x4}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r6, 0xc08c5335, &(0x7f0000000240)={0xffff, 0x10003, 0x8, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00\x8a\xe0z\x8a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb4\xbf\x00\x00\x1d\x02\xa1\xff\x00', 0x5}) setsockopt$inet6_MCAST_JOIN_GROUP(r6, 0x29, 0x2a, &(0x7f0000000300)={0x400, {{0xa, 0x4e24, 0x15dcf06d, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6}}}, 0x88) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_submit(r3, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0}]) io_destroy(r3) ioctl$VIDIOC_LOG_STATUS(r7, 0x5646, 0x0) readahead(r1, 0xe0, 0x7) [ 995.486033] IPVS: ftp: loaded support on port[0] = 21 03:45:02 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x2000, 0x0, 0xc00000005000000}}}, 0x90) 03:45:02 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x100, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r0, 0x4040ae70, &(0x7f0000000280)={0xbe6, 0x81, 0x3, 0x101}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020e00001000000000000000000000000800120000000100000000000000000006051ea0abff7f000000000000000000e000000100000000000000000000000000000000000000f9ff0020001d63da4f030006000000080002000080ac14ffbbf000000000000000030005000000001e0200423b1d632b91c520000000000800"], 0x80}}, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r1, 0x8000}], 0x1, &(0x7f00000000c0)={r2, r3+10000000}, &(0x7f0000000100)={0x6}, 0x8) r4 = socket$key(0xf, 0x3, 0x2) sendmmsg(r4, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) socket(0x7, 0x3, 0x15) 03:45:02 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 995.678049] CUSE: unknown device info "" [ 995.684934] CUSE: zero length info key specified [ 995.708688] CUSE: unknown device info "" [ 995.727064] CUSE: zero length info key specified [ 995.974966] IPVS: ftp: loaded support on port[0] = 21 03:45:02 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002180), 0x13ce) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x6000, 0x0, 0xc00000005000000}}}, 0x90) 03:45:02 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x740, 0x0) write$sndseq(r1, &(0x7f0000000080)=[{0xffff, 0xfffffffffffffffa, 0x1, 0x10000, @time={0x77359400}, {0x2, 0x32}, {0xd9a, 0x9}, @ext={0x3b, &(0x7f0000000040)="43fcb942d34cff3d61c49ca008d89087ad194dcd7b4482c6ba16cc56a2334a62441fed66c9309ee18c5212fa6faddc21d9f46398d5c1b465063178"}}, {0x5, 0x4, 0x4, 0xb95, @tick, {0x6, 0x7fff}, {0x7fffffff, 0xfffffffffffffc00}, @quote={{0x7fff, 0x100000001}, 0x1}}, {0x2, 0x84c8, 0x7, 0x2, @tick=0xffff, {0x1644, 0x7}, {0x3, 0x8}, @queue={0x7, {0x5, 0x6dd8}}}, {0x4, 0x3, 0xfffffffffffffffb, 0x6e2, @tick, {0x1, 0x3f}, {0x1, 0x101}, @queue={0x2b, {0x6, 0x3}}}, {0xfffffffffffff800, 0x2, 0x1, 0xffffffffffffffff, @time={0x77359400}, {0x70, 0x101}, {0x5, 0x8}, @note={0x0, 0x1, 0x5, 0x100, 0x1}}], 0xf0) setsockopt$rose(r0, 0x104, 0x7, &(0x7f0000000200), 0xfe0f) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000180)={0x3, 0xe, 0x3}) syz_init_net_socket$rose(0xb, 0x5, 0x0) 03:45:02 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xb}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) 03:45:02 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'nat\x00', 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x1100]}, &(0x7f0000000000)=0x54) 03:45:02 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) preadv(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f00000000c0)=""/94, 0x5e}], 0x1, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000300)=0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) r3 = syz_open_dev$audion(&(0x7f0000000340)='/dev/audio#\x00', 0x3, 0x301202) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000380)={0x0, 0x4}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000400)={r4, 0x8, 0x10}, 0xc) r5 = syz_open_procfs(r1, &(0x7f0000000280)='net/fib_triestat\x00\x8e\xa1\x1d\\\xb1z\x80-\x95p\x1f\x19\xf2\x9e\x84\x8372\f\xcf\xb1\x1c\x87\xc5\x96\x8dJr\x05\xf5\xcd\xafd\xbav]\xc2\x1c>\xa3\xfda1\xa8\xb6W\\D\xb4\xde\xa9\t{\xb3\x84\x89K\xa8G\xf6\x9b\x8ba\x86\x05c<~\xa1\x9fI/\x8d\xfc\\%\x7f\x8c\xcb\x9a}.a\xe4\xf2\xaf\ns\xda\xbb&\xb7\xe4=\xfa\xe2E\ac0\x06\x90Y') preadv(r5, &(0x7f0000000480), 0x10000000000000af, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r5, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r6, 0x700, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x40010}, 0x40810) ioctl$SIOCAX25ADDFWD(r5, 0x89ea, &(0x7f0000000000)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null}) 03:45:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x70000, 0x0) ioctl$TIOCPKT(r1, 0x40045431, 0x0) [ 996.148639] CUSE: unknown device info "" [ 996.153195] CUSE: zero length info key specified [ 996.252605] IPVS: ftp: loaded support on port[0] = 21 03:45:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lremovexattr(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)=@known='security.apparmor\x00') chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') r2 = geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000840)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000940)={{{@in=@broadcast, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000a40)=0xe8) syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file1\x00', 0x1, 0x5, &(0x7f00000007c0)=[{&(0x7f0000000380)="0a2b7074d4fc6d0be59832d1df8f0580600906f927e2b3201655536df5091b8045c8428e19ea5ec2c0a47b1f201b2abe4f882d471dae", 0x36, 0x4}, {&(0x7f0000000400)="0b4d02b424bc25ded509e30c57278698d7133eebc7638a31195b4f2f9d362cfdd2c966f63c198d7aa7b69744c77d30af2a8f1dfd3dc52bdb1173c45753", 0x3d, 0x6}, {&(0x7f0000000440), 0x0, 0xd0}, {&(0x7f0000000600)="9ae22f1db0a8f92e22ea10046c8f016e8f686507c1ecd6204610736159dea35d9638a6bc36a85d09afa9870846d14d92c8eb8a6d6ecfcd2d3b22933b711b26b8b98d0423351c0d46a5624d0d2f0c4cd105f0a2b8cdcfec2b0ec1278d3d0cd4c3796e1862f44d6ad33ae186cba5034e0eaf4dd90703f70541291af46631f11ae7a5c7cd8d9aaad486592fa997d76f51a06fbed3f9", 0x94, 0x7}, {&(0x7f0000000740)="54543deb5f5adfad0f3dd43cb6f40814aab9ca689b1fcb549bb0fc8f35a93e01abba59abb79ee9bbaf9d696a1ce65254e24c2b20cc302d0c97d30837a45b5672a3a1f4268b573ea969eb42125669bc66773c47e480d3792be46bbfca49c7", 0x5e, 0x3}], 0x212050, &(0x7f0000000a80)={[{@hide='hide'}], [{@euid_gt={'euid>', r2}}, {@uid_gt={'uid>', r3}}, {@hash='hash'}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@euid_lt={'euid<', r4}}]}) open(&(0x7f0000000100)='./file1\x00', 0xf000, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="d4000008", @ANYRES16=r5, @ANYBLOB="020028bd7000fedbdf25100000000c0002000800050001000100080005000835000058000200080002004e2000000800090008000000080006000500000014000100da60af7199b4909dda1bfe378317f576080006000000000008000800ff0f00000800040000000080080006000600000008000900ebfe00004c0001000800060077727200080008008000000008000600776c630008000200000000000c0006006e6f6e6500000000080002006200000008000200670000000c00070000000000080000000800060000100000"], 0xd4}, 0x1, 0x0, 0x0, 0x4881}, 0x4040041) 03:45:03 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xf}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x0) [ 996.283688] CUSE: unknown device info "" [ 996.288816] CUSE: zero length info key specified [ 996.665555] overlayfs: failed to resolve './file1': -2 [ 996.746569] IPVS: ftp: loaded support on port[0] = 21 [ 1156.373778] INFO: task syz-executor.4:21477 blocked for more than 140 seconds. [ 1156.381209] Not tainted 5.0.0-rc7+ #86 [ 1156.386359] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1156.394455] syz-executor.4 D28352 21477 16008 0x00000004 [ 1156.400098] Call Trace: [ 1156.402689] __schedule+0x817/0x1cc0 [ 1156.406470] ? trace_hardirqs_off+0x62/0x220 [ 1156.410882] ? kasan_check_read+0x11/0x20 [ 1156.415093] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1156.420128] ? mark_held_locks+0x100/0x100 [ 1156.425227] schedule+0x92/0x180 [ 1156.428611] schedule_timeout+0x8ca/0xfd0 [ 1156.432778] ? wait_for_completion+0x294/0x440 [ 1156.437427] ? find_held_lock+0x35/0x130 [ 1156.441495] ? usleep_range+0x170/0x170 [ 1156.445570] ? kasan_check_read+0x11/0x20 [ 1156.449739] ? _raw_spin_unlock_irq+0x28/0x90 [ 1156.454527] ? wait_for_completion+0x294/0x440 [ 1156.459120] ? _raw_spin_unlock_irq+0x28/0x90 [ 1156.463716] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1156.468334] ? trace_hardirqs_on+0x67/0x230 [ 1156.472663] ? kasan_check_read+0x11/0x20 [ 1156.476863] wait_for_completion+0x29c/0x440 [ 1156.481276] ? wait_for_completion_interruptible+0x4b0/0x4b0 [ 1156.487167] ? wake_up_q+0x100/0x100 [ 1156.490887] ? kasan_check_read+0x11/0x20 [ 1156.495116] __x64_sys_io_destroy+0x373/0x420 [ 1156.499616] ? __x32_compat_sys_io_setup+0x410/0x410 [ 1156.504834] ? do_syscall_64+0x26/0x610 [ 1156.508826] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1156.513455] ? trace_hardirqs_on+0x67/0x230 [ 1156.517789] do_syscall_64+0x103/0x610 [ 1156.521681] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1156.526949] RIP: 0033:0x457e29 [ 1156.530149] Code: Bad RIP value. [ 1156.533546] RSP: 002b:00007f615f5fac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000cf [ 1156.541256] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000457e29 [ 1156.548598] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f615f5d2000 [ 1156.556322] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1156.563688] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f615f5fb6d4 [ 1156.570960] R13: 00000000004bf000 R14: 00000000004d0950 R15: 00000000ffffffff [ 1156.578330] [ 1156.578330] Showing all locks held in the system: [ 1156.584729] 1 lock held by khungtaskd/1039: [ 1156.589042] #0: 00000000549c678b (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 1156.597847] 2 locks held by rs:main Q:Reg/7364: [ 1156.602523] 1 lock held by rsyslogd/7366: [ 1156.606765] 2 locks held by getty/7478: [ 1156.610731] #0: 00000000b50a4ee3 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1156.619061] #1: 00000000b8eafc3f (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 1156.628071] 2 locks held by getty/7479: [ 1156.632023] #0: 00000000be97d420 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1156.640306] #1: 000000008aa033f1 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 1156.649197] 2 locks held by getty/7480: [ 1156.653160] #0: 000000009ae0b921 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1156.661565] #1: 000000008412e974 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 1156.670456] 2 locks held by getty/7481: [ 1156.674464] #0: 00000000e3ad7f87 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1156.682709] #1: 00000000fbadc6bd (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 1156.692142] 2 locks held by getty/7482: [ 1156.696158] #0: 00000000da106b55 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1156.704438] #1: 00000000460198d5 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 1156.713294] 2 locks held by getty/7483: [ 1156.717317] #0: 00000000efb3b7cb (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1156.725595] #1: 00000000d4116db8 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 1156.735107] 2 locks held by getty/7484: [ 1156.739077] #0: 00000000af058b52 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1156.747364] #1: 00000000d29efcbe (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 1156.756284] [ 1156.757904] ============================================= [ 1156.757904] [ 1156.764972] NMI backtrace for cpu 0 [ 1156.769618] CPU: 0 PID: 1039 Comm: khungtaskd Not tainted 5.0.0-rc7+ #86 [ 1156.776450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1156.785790] Call Trace: [ 1156.788384] dump_stack+0x172/0x1f0 [ 1156.792006] nmi_cpu_backtrace.cold+0x63/0xa4 [ 1156.796562] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 1156.801486] nmi_trigger_cpumask_backtrace+0x1be/0x236 [ 1156.806769] arch_trigger_cpumask_backtrace+0x14/0x20 [ 1156.811961] watchdog+0x9df/0xee0 [ 1156.815476] kthread+0x357/0x430 [ 1156.818843] ? reset_hung_task_detector+0x30/0x30 [ 1156.823694] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1156.829325] ret_from_fork+0x3a/0x50 [ 1156.833157] Sending NMI from CPU 0 to CPUs 1: [ 1156.837746] NMI backtrace for cpu 1 skipped: idling at native_safe_halt+0x2/0x10 [ 1156.839377] Kernel panic - not syncing: hung_task: blocked tasks [ 1156.851427] CPU: 0 PID: 1039 Comm: khungtaskd Not tainted 5.0.0-rc7+ #86 [ 1156.858268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1156.867630] Call Trace: [ 1156.870328] dump_stack+0x172/0x1f0 [ 1156.873950] panic+0x2cb/0x65c [ 1156.877136] ? __warn_printk+0xf3/0xf3 [ 1156.881014] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 1156.885943] ? ___preempt_schedule+0x16/0x18 [ 1156.890545] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 1156.895993] ? nmi_trigger_cpumask_backtrace+0x1fa/0x236 [ 1156.901429] ? nmi_trigger_cpumask_backtrace+0x204/0x236 [ 1156.906866] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 1156.912304] watchdog+0x9f0/0xee0 [ 1156.915934] kthread+0x357/0x430 [ 1156.919299] ? reset_hung_task_detector+0x30/0x30 [ 1156.924141] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1156.929677] ret_from_fork+0x3a/0x50 [ 1156.934691] Kernel Offset: disabled [ 1156.938323] Rebooting in 86400 seconds..