Warning: Permanently added '10.128.0.137' (ECDSA) to the list of known hosts. [ 41.229825] random: sshd: uninitialized urandom read (32 bytes read) 2019/09/20 01:25:01 fuzzer started [ 41.418185] audit: type=1400 audit(1568942701.935:36): avc: denied { map } for pid=6821 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 41.949021] random: cc1: uninitialized urandom read (8 bytes read) 2019/09/20 01:25:03 dialing manager at 10.128.0.105:43807 2019/09/20 01:25:03 syscalls: 2472 2019/09/20 01:25:03 code coverage: enabled 2019/09/20 01:25:03 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/09/20 01:25:03 extra coverage: extra coverage is not supported by the kernel 2019/09/20 01:25:03 setuid sandbox: enabled 2019/09/20 01:25:03 namespace sandbox: enabled 2019/09/20 01:25:03 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/20 01:25:03 fault injection: enabled 2019/09/20 01:25:03 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/20 01:25:03 net packet injection: enabled 2019/09/20 01:25:03 net device setup: enabled [ 44.007575] random: crng init done 01:26:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000017c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) close(0xffffffffffffffff) socket$rxrpc(0x21, 0x2, 0xa) sendmsg$unix(r0, &(0x7f0000000880)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0}, 0x0) 01:26:22 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) fsetxattr$security_evm(r0, &(0x7f00000000c0)='security.evm\x00', 0x0, 0x0, 0x0) 01:26:22 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x78) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 01:26:22 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x10001f}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01dfdde80f32d9e90f086665676426f7c5000000000f2245deef0f23f5", 0x23}], 0xaaaaaaaaaaaae88, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000c000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, &(0x7f0000000080)="9a0c00140066b84a0000000f23d80f21f86635c00000800f23f8b830010f00d8f30f0981110c9a660f5b06d100de7e08f62df0f753a7b871008ec0", 0x3b}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000002000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, 0x0, 0x289}], 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:26:22 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000400)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @local}}}}, &(0x7f00000004c0)=0xb0) 01:26:22 executing program 3: openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='>', 0x1, 0xfffffffffffffffd) keyctl$unlink(0x7, r0, 0x0) keyctl$set_timeout(0xf, r0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x503c01, 0x0) pipe(&(0x7f0000000340)) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000340)="7942f1bbcedff3c8e695c1e76eed0347", 0x10) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0xc}, 0x0, 0x3, 0x1000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) [ 122.194048] audit: type=1400 audit(1568942782.715:37): avc: denied { map } for pid=6841 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=3006 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 122.313308] IPVS: ftp: loaded support on port[0] = 21 [ 123.198017] chnl_net:caif_netlink_parms(): no params data found [ 123.206424] IPVS: ftp: loaded support on port[0] = 21 [ 123.242350] bridge0: port 1(bridge_slave_0) entered blocking state [ 123.248999] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.256523] device bridge_slave_0 entered promiscuous mode [ 123.263507] bridge0: port 2(bridge_slave_1) entered blocking state [ 123.269916] bridge0: port 2(bridge_slave_1) entered disabled state [ 123.276965] device bridge_slave_1 entered promiscuous mode [ 123.292437] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 123.301309] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 123.317286] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 123.324546] team0: Port device team_slave_0 added [ 123.334604] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 123.342644] team0: Port device team_slave_1 added [ 123.352995] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 123.362831] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 123.422048] device hsr_slave_0 entered promiscuous mode [ 123.460286] device hsr_slave_1 entered promiscuous mode [ 123.542357] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 123.549357] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 123.557390] IPVS: ftp: loaded support on port[0] = 21 [ 123.569407] bridge0: port 2(bridge_slave_1) entered blocking state [ 123.575852] bridge0: port 2(bridge_slave_1) entered forwarding state [ 123.582708] bridge0: port 1(bridge_slave_0) entered blocking state [ 123.589041] bridge0: port 1(bridge_slave_0) entered forwarding state [ 123.641386] chnl_net:caif_netlink_parms(): no params data found [ 123.693815] bridge0: port 1(bridge_slave_0) entered blocking state [ 123.700450] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.707249] device bridge_slave_0 entered promiscuous mode [ 123.714625] bridge0: port 2(bridge_slave_1) entered blocking state [ 123.721232] bridge0: port 2(bridge_slave_1) entered disabled state [ 123.728132] device bridge_slave_1 entered promiscuous mode [ 123.747773] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 123.756771] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 123.776638] IPVS: ftp: loaded support on port[0] = 21 [ 123.788253] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 123.797001] 8021q: adding VLAN 0 to HW filter on device bond0 [ 123.813535] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 123.822177] team0: Port device team_slave_0 added [ 123.858527] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 123.865738] team0: Port device team_slave_1 added [ 123.873363] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 123.881238] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 123.898581] chnl_net:caif_netlink_parms(): no params data found [ 123.906563] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 123.918128] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 123.924822] 8021q: adding VLAN 0 to HW filter on device team0 [ 123.944206] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 123.952856] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.961420] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.022614] device hsr_slave_0 entered promiscuous mode [ 124.060355] device hsr_slave_1 entered promiscuous mode [ 124.100866] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 124.108583] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 124.122381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 124.130586] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.137023] bridge0: port 1(bridge_slave_0) entered forwarding state [ 124.146424] IPVS: ftp: loaded support on port[0] = 21 [ 124.151377] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 124.179435] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 124.187941] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.194367] bridge0: port 2(bridge_slave_1) entered forwarding state [ 124.202713] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 124.210819] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.217150] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.225701] device bridge_slave_0 entered promiscuous mode [ 124.232683] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.239058] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.246815] device bridge_slave_1 entered promiscuous mode [ 124.264947] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 124.275544] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 124.285175] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 124.337721] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 124.350885] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 124.357954] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 124.365366] team0: Port device team_slave_0 added [ 124.371419] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 124.378416] team0: Port device team_slave_1 added [ 124.403128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 124.410969] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 124.418544] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 124.427472] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 124.436954] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 124.444253] chnl_net:caif_netlink_parms(): no params data found [ 124.461501] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 124.470614] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 124.479464] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 124.503748] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 124.511993] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 124.519409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 124.526901] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 124.534398] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 124.541902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 124.559105] 8021q: adding VLAN 0 to HW filter on device bond0 [ 124.570489] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 124.576485] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 124.633199] device hsr_slave_0 entered promiscuous mode [ 124.670495] device hsr_slave_1 entered promiscuous mode [ 124.730888] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 124.737869] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 124.755787] IPVS: ftp: loaded support on port[0] = 21 [ 124.763497] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.769896] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.777875] device bridge_slave_0 entered promiscuous mode [ 124.785690] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 124.804997] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.812126] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.818977] device bridge_slave_1 entered promiscuous mode [ 124.837149] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 124.848225] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 124.860505] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 124.899092] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 124.909706] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 124.924320] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 124.931937] team0: Port device team_slave_0 added [ 124.955007] chnl_net:caif_netlink_parms(): no params data found [ 124.968344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 124.975544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 124.988364] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 124.994854] 8021q: adding VLAN 0 to HW filter on device team0 [ 125.001662] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 125.008665] team0: Port device team_slave_1 added [ 125.016691] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 125.043718] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 125.051646] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 125.074029] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 125.105441] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 125.113387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 125.121338] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.127729] bridge0: port 1(bridge_slave_0) entered forwarding state [ 125.134820] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 125.144003] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 125.155822] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.163276] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.171217] device bridge_slave_0 entered promiscuous mode [ 125.213323] device hsr_slave_0 entered promiscuous mode [ 125.250382] device hsr_slave_1 entered promiscuous mode [ 125.303900] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 125.311821] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 125.319309] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.325680] bridge0: port 2(bridge_slave_1) entered forwarding state [ 125.335646] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 125.343513] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.349889] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.357244] device bridge_slave_1 entered promiscuous mode [ 125.370750] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 125.378711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 125.392909] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 125.407126] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 125.418083] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 125.437308] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 125.446031] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 125.454618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 125.469936] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 125.478801] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 125.489191] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 125.506802] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 125.523343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 125.530965] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 125.574289] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 125.582027] team0: Port device team_slave_0 added [ 125.587571] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 125.594741] team0: Port device team_slave_1 added [ 125.603081] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 125.614610] 8021q: adding VLAN 0 to HW filter on device bond0 [ 125.623455] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 125.630610] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 125.638221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 125.645880] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 125.658376] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 125.667455] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 125.679586] chnl_net:caif_netlink_parms(): no params data found [ 125.690925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 125.698410] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 125.708814] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 125.727887] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 125.734663] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 125.748264] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 125.792357] device hsr_slave_0 entered promiscuous mode [ 125.830437] device hsr_slave_1 entered promiscuous mode [ 125.885796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 125.892695] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 125.902246] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 125.908310] 8021q: adding VLAN 0 to HW filter on device team0 [ 125.915320] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 125.924759] 8021q: adding VLAN 0 to HW filter on device bond0 [ 125.941719] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 125.948969] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 125.962482] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 125.969197] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 125.977460] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 125.985065] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.991446] bridge0: port 1(bridge_slave_0) entered forwarding state [ 126.000701] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 126.009183] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 126.021391] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.027790] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.034884] device bridge_slave_0 entered promiscuous mode [ 126.041673] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.048006] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.055191] device bridge_slave_1 entered promiscuous mode [ 126.062095] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 126.068306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 126.075471] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 126.083396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 126.091060] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.097386] bridge0: port 2(bridge_slave_1) entered forwarding state [ 126.104546] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 126.117787] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 126.146259] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 126.154735] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 126.166165] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 126.175008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 126.182883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 126.189678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 126.198893] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 126.210169] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 126.216249] 8021q: adding VLAN 0 to HW filter on device team0 [ 126.224777] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 126.233447] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 126.239832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 01:26:26 executing program 0: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0x7, r0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x503c01, 0x0) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f0000000080)=ANY=[@ANYBLOB]) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000340)="7942f1bbcedff3c8e695c1e76eed0347", 0x10) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) process_vm_readv(0x0, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{0x0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0xc}, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) [ 126.248074] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 126.265189] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 126.287344] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 126.309562] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 126.317687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 126.330850] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 126.338291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 126.347632] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 126.355498] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.361897] bridge0: port 1(bridge_slave_0) entered forwarding state [ 126.371443] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 126.386872] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 126.394551] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 126.410832] team0: Port device team_slave_0 added [ 126.414733] hrtimer: interrupt took 26120 ns [ 126.423179] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 126.430819] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 126.445071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 126.455796] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 126.467930] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 126.475694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 126.483718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 126.491578] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 126.499069] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.505543] bridge0: port 2(bridge_slave_1) entered forwarding state [ 126.514572] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 126.520988] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 126.535971] 8021q: adding VLAN 0 to HW filter on device bond0 [ 126.543032] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 126.554543] team0: Port device team_slave_1 added 01:26:27 executing program 0: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0x7, r0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x503c01, 0x0) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f0000000080)=ANY=[@ANYBLOB]) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000340)="7942f1bbcedff3c8e695c1e76eed0347", 0x10) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) process_vm_readv(0x0, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{0x0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0xc}, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) [ 126.559886] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 126.569163] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 126.589806] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 126.602823] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 126.609584] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 126.623786] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 126.635539] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 126.663388] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 126.678467] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 126.700598] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 126.714679] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 126.722953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 01:26:27 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000700)="39000000140081a8000d3c0001000187110008abca1b4e7db89cdc1d97c6d9ddec06a34361e220ce4740ebb37358582bdbb7d553b4e9213f6b", 0x39}], 0x1}, 0x0) 01:26:27 executing program 0: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0x7, r0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x503c01, 0x0) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f0000000080)=ANY=[@ANYBLOB]) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000340)="7942f1bbcedff3c8e695c1e76eed0347", 0x10) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) process_vm_readv(0x0, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{0x0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0xc}, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) 01:26:27 executing program 5: r0 = socket$kcm(0x11, 0x2, 0x300) sendmsg$kcm(r0, &(0x7f0000001400)={&(0x7f0000000040)=@nfc={0x27, 0x1}, 0x80, &(0x7f0000001380)=[{&(0x7f0000000140)="b5", 0x1}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x8, &(0x7f0000000000), 0x4) recvmsg(r0, &(0x7f000000b540)={0x0, 0x0, 0x0}, 0x0) [ 126.773599] device hsr_slave_0 entered promiscuous mode [ 126.821536] device hsr_slave_1 entered promiscuous mode [ 126.850847] protocol 88fb is buggy, dev hsr_slave_0 [ 126.856847] protocol 88fb is buggy, dev hsr_slave_1 [ 126.860579] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready 01:26:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r1, &(0x7f0000000380)={'#! ', './file0'}, 0xb) [ 126.871379] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 126.877461] 8021q: adding VLAN 0 to HW filter on device team0 [ 126.887504] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 126.931952] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 126.945440] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 126.955208] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 126.966831] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 126.975806] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 127.006054] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 127.023902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 127.043225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 127.060487] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.065867] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 127.066880] bridge0: port 1(bridge_slave_0) entered forwarding state [ 127.097254] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 127.122404] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 127.138893] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 127.155648] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 127.169372] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 127.185341] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 127.201122] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 127.209862] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 127.217656] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.224064] bridge0: port 2(bridge_slave_1) entered forwarding state [ 127.235937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 127.249787] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 127.262170] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 127.269755] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 127.280693] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 127.288611] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 127.299382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 127.307056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 127.314842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 127.329681] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 127.337270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 127.345348] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 127.353496] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 127.367124] 8021q: adding VLAN 0 to HW filter on device bond0 [ 127.375380] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 127.384348] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 127.391801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 127.399385] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 127.408670] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 127.416508] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 127.424967] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 127.432562] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 127.442958] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 127.450870] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 127.457546] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 127.467278] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 127.474938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 127.482015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 127.491604] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 127.497620] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 127.507819] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 127.514536] 8021q: adding VLAN 0 to HW filter on device team0 [ 127.526004] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 127.536204] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 127.543045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 127.551587] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 127.559106] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.565479] bridge0: port 1(bridge_slave_0) entered forwarding state [ 127.576591] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 127.586994] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 127.598970] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 127.606432] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 127.614076] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 127.622060] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 127.629582] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.636022] bridge0: port 2(bridge_slave_1) entered forwarding state [ 127.648196] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 127.655345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 127.666053] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 127.677951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 127.696900] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 127.704019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 127.712328] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 127.720636] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 127.731356] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 127.739735] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 127.747169] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 127.755159] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 127.763391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 127.771077] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 01:26:28 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) recvmmsg(r0, &(0x7f0000001f80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000020, 0x0) 01:26:28 executing program 0: openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='>', 0x1, 0xfffffffffffffffd) keyctl$set_timeout(0xf, r0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000340)="7942f1bbcedff3c8e695c1e76eed0347", 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0xc}, 0x0, 0x3, 0x1000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) 01:26:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r1, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000600), &(0x7f0000000640)=0x4) [ 127.787479] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 127.794460] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 127.802657] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 127.816588] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 127.826011] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 127.867899] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 127.918471] 8021q: adding VLAN 0 to HW filter on device batadv0 01:26:29 executing program 2: stat(0x0, 0x0) getgroups(0x0, 0x0) getpriority(0x0, 0xffffffffffffffff) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000ffb000/0x1000)=nil) 01:26:29 executing program 4: 01:26:29 executing program 1: 01:26:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r1, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:29 executing program 0: 01:26:29 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/pid\x00') dup(0xffffffffffffffff) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, 0x0, 0xffffffffffffffa6) 01:26:29 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) getdents(0xffffffffffffffff, 0x0, 0x25d) 01:26:29 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) ioctl$FS_IOC_FSGETXATTR(r0, 0x8008551d, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x0, 0x0, 0x7ff0bdbe}) 01:26:29 executing program 1: openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='>', 0x1, 0xfffffffffffffffd) keyctl$unlink(0x7, r0, 0x0) keyctl$set_timeout(0xf, r0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x503c01, 0x0) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f0000000080)=ANY=[@ANYBLOB]) pipe(&(0x7f0000000340)) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000340)="7942f1bbcedff3c8e695c1e76eed0347", 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0xc}, 0x0, 0x3, 0x1000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) 01:26:29 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xec\xff\xff\xff\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/195, 0xc3}, 0x120) write$UHID_CREATE2(r0, &(0x7f0000000140)={0xe, 'syz0\x00', 'syz0\x00', 'syz0\x00'}, 0x118) [ 129.303032] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 01:26:29 executing program 4: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x48, 0x0, 0x0, 0x2}, {0x16}]}) 01:26:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@fat=@allow_utime={'allow_utime'}}]}) 01:26:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r1, &(0x7f0000000380)={'#! ', './file0'}, 0xb) [ 129.363233] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 01:26:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000200)='\x00', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r2, r1}, &(0x7f00000000c0)=""/83, 0xa2bd1d5677b481f6, 0x0) add_key(&(0x7f0000000080)='dns_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x10001f}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01dfdde80f32d9e90f086665676426f7c5000000000f2245deef0f23f5", 0x23}], 0xaaaaaaaaaaaae88, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000c000/0x18000)=nil, &(0x7f00000001c0)=[@text64={0x40, &(0x7f0000000140)="b9000400000f3266ba430066eddc0f0f01c442c20100b9050400000f32430f01c2c482198e5200c4e16d75572ab9800000c00f3235001000000f30", 0x3b}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000002000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, 0x0, 0x289}], 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 129.459120] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.478861] FAT-fs (loop3): bogus number of reserved sectors [ 129.491582] FAT-fs (loop3): Can't find a valid FAT filesystem 01:26:30 executing program 1: openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='>', 0x1, 0xfffffffffffffffd) keyctl$unlink(0x7, r0, 0x0) keyctl$set_timeout(0xf, r0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x503c01, 0x0) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f0000000080)=ANY=[@ANYBLOB]) pipe(&(0x7f0000000340)) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000340)="7942f1bbcedff3c8e695c1e76eed0347", 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0xc}, 0x0, 0x3, 0x1000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) [ 129.504632] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.518682] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.570915] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.581571] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.588610] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.597841] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.608332] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 01:26:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) write$binfmt_script(r1, &(0x7f0000000380)={'#! ', './file0'}, 0xb) [ 129.617226] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.627065] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.644283] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.654034] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.664020] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.672306] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.679320] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.692432] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.699326] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.706428] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.713334] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.720586] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.727464] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.734520] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.741402] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.741419] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.741431] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.741443] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.741455] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.741467] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.755331] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.779575] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.788799] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 01:26:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) write$binfmt_script(r1, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:30 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f905080af4c90ccb170e60b3a8bf56db763e3a227deb6999d3277020000001fb054d54ac45a333c28785d6382fa7776ea267d32109aa4c1a2d23999eb00ea368db25633657b5287", 0x5b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 129.825566] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.837343] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.845592] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.861466] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 01:26:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) write$binfmt_script(r1, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x8004e22}, 0x1c) setsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000400)=0xfffffffffffffff7, 0x4) pipe(0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) geteuid() stat(0x0, 0x0) getegid() stat(0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) fchownat(0xffffffffffffffff, 0x0, 0xee01, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) write$P9_RFSYNC(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x200408d4, &(0x7f0000000380)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x1}}, 0x40001) read(r0, &(0x7f0000000180)=""/139, 0x8b) [ 129.888729] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.896334] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 01:26:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r1, &(0x7f0000000380)={'#! ', './file0'}, 0xb) [ 129.937139] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.953379] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.964322] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.971411] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.978330] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.989678] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.996669] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.010509] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.017401] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.028056] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.036044] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.043062] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.049883] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.058421] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.069586] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.076635] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.084035] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.090852] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.097607] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.104757] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.111548] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.118277] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.125699] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.132493] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.139233] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.146028] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.152884] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.159636] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.166750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.173581] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.180370] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.187068] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.193823] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.200689] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.207377] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.214132] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.220871] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.227552] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.234299] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.241320] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.247996] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.254724] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.261442] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.268116] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.274880] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.281619] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.288291] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.294998] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.301733] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.308411] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.315262] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.322412] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.329107] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.329121] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.329133] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.329147] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.355978] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.362713] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.362727] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.376113] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.382855] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.389533] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.396243] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.403677] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.410399] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.417075] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.423801] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.430552] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.437320] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.444046] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.450774] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.457463] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.464177] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.470890] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.477561] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.484611] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.491354] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.498038] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.504770] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.511485] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.518158] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.524891] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.531701] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.538375] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.545103] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.551831] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.558519] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.565433] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.572179] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.578867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.585593] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.592314] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.598986] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.605710] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.612467] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.619142] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.625863] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.632584] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.639267] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.646155] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.652924] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.659605] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.666336] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.673147] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.679852] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.686626] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.693385] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.700116] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.706928] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.713660] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.720395] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.727069] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.733839] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.740584] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.747302] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.754020] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.760804] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.767470] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.774194] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.780944] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.787617] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.794330] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.801352] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.808025] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.814789] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.821507] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.828175] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.834901] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.841659] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.848433] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.855167] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.861895] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.868573] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.875342] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.882348] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.889029] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.895760] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.902483] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.909161] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.915968] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.922692] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.929362] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.936076] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.942812] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.949480] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.956209] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.963300] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.969999] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.976767] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.983515] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.990236] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 130.996911] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 131.003686] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 131.010425] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 131.017106] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 131.023824] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 131.032658] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz0] on syz0 01:26:31 executing program 2: pipe(&(0x7f00000002c0)={0xffffffffffffffff}) close(r0) socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:26:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r1, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:31 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x0, 0x0, 0x7ff0bdbe}) 01:26:31 executing program 4: syz_emit_ethernet(0x42, &(0x7f0000000000)={@random="29ee9326fea9", @broadcast, [], {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @link_local, @remote, @dev, @ipv4={[], [], @multicast2}}}}}, &(0x7f0000000080)={0x1, 0x1}) 01:26:31 executing program 1: openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='>', 0x1, 0xfffffffffffffffd) keyctl$unlink(0x7, r0, 0x0) keyctl$set_timeout(0xf, r0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x503c01, 0x0) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f0000000080)=ANY=[@ANYBLOB]) pipe(&(0x7f0000000340)) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000340)="7942f1bbcedff3c8e695c1e76eed0347", 0x10) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0xc}, 0x0, 0x3, 0x1000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) 01:26:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000000000000095000000000000001474dcbf99c0b1006d1c767c0a43c0bd53b6ae81fa4bfd86e807622e458be4612110f32a9c8830e4e0bf4079c40a0258b7151b740d6fa76229502b7f20c62a8ad1a938c13be2168ace3565ce3053db6d114e7cb0d24e2eb710c8804f4297ddb2a3e2f7ea6dc1ed0f08ccbe56a63e237ba65c3bbdc7d3660000000054f147"], &(0x7f0000000340)='GPL\x00'}, 0x48) 01:26:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) bind$inet6(r2, &(0x7f0000000600)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_int(r3, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x18, &(0x7f00000001c0), 0x4) r4 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(r1, 0x10099b7) sendfile(r2, r4, 0x0, 0x8000fffffffe) [ 131.174870] vhci_hcd: default hub control req: 0000 v0000 i0001 l0 01:26:31 executing program 3: io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000200)="d8fc2d8b2b303465d9d051e402a88db5ff0a", 0x12}, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x20c82, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000140)={0xfffffffffffffd4c}, 0x38c) 01:26:31 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x36, &(0x7f0000000140)={@local, @random="8f796a56a2df", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 01:26:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r1, &(0x7f0000000380)={'#! ', './file0'}, 0xb) [ 131.281795] audit: type=1804 audit(1568942791.795:38): pid=7098 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir115561558/syzkaller.k558wa/8/bus" dev="sda1" ino=16568 res=1 01:26:31 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ppoll(&(0x7f00000000c0)=[{r0}], 0x1, &(0x7f0000000100), 0x0, 0x0) 01:26:31 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x36, &(0x7f0000000140)={@local, @random="8f796a56a2df", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 01:26:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff7000/0x4000)=nil) r4 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @dev}}}, 0x0) r6 = getgid() lstat(&(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getegid() r9 = gettid() shmctl$IPC_SET(r4, 0x1, &(0x7f0000000340)={{0x0, r5, r6, r7, r8, 0x5044039c3f8dc6cf, 0x4}, 0x3, 0x0, 0x2, 0x10000000000000, 0x0, r9}) shmget$private(0x0, 0x3000, 0x200, &(0x7f0000ff9000/0x3000)=nil) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x5044039c3f8dc6cf, 0x4}, 0x3, 0x0, 0x2, 0x10000000000000}) shmctl$SHM_LOCK(0x0, 0xb) 01:26:32 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="a4ab5bf51ec8e64d0ba5382412f728db4b2b2f2f3ff7ad271f1e89e46f905080af4c90ccb170e60b3a8bf574b763e3062d037dca291318d0a17270bbce74b47888318b04aeb0747555ba16ea10e6ddb915ceb6397e514f3482ca", 0x5a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 01:26:32 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r0, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r1, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:32 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x36, &(0x7f0000000140)={@local, @random="8f796a56a2df", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 01:26:32 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x36, &(0x7f0000000140)={@local, @random="8f796a56a2df", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 01:26:32 executing program 4: socket$netlink(0x10, 0x3, 0x0) syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x2, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:26:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff7000/0x4000)=nil) r4 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @dev}}}, 0x0) r6 = getgid() lstat(&(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getegid() r9 = gettid() shmctl$IPC_SET(r4, 0x1, &(0x7f0000000340)={{0x0, r5, r6, r7, r8, 0x5044039c3f8dc6cf, 0x4}, 0x3, 0x0, 0x2, 0x10000000000000, 0x0, r9}) shmget$private(0x0, 0x3000, 0x200, &(0x7f0000ff9000/0x3000)=nil) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x5044039c3f8dc6cf, 0x4}, 0x3, 0x0, 0x2, 0x10000000000000}) shmctl$SHM_LOCK(0x0, 0xb) 01:26:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r1, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:32 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) getresuid(0x0, &(0x7f00000001c0), 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000300)='./file0\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) 01:26:32 executing program 3: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r0, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:32 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x36, &(0x7f0000000140)={@local, @random="8f796a56a2df", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 01:26:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r1, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@fat=@errors_remount='errors=remount-ro'}]}) 01:26:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:35 executing program 0: syz_emit_ethernet(0x36, &(0x7f0000000140)={@local, @random="8f796a56a2df", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 01:26:35 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) write$cgroup_subtree(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="c0cd0691489d9a46f830fedd1f93991b52ec680eb4c55140d17aafb7ab64c10460e40700000000000000ddef5c96dd2afa07fb31ca036ed6691bcb3002933a0364979967fb888c51d41cc2fb6da3fb35da4a17f7de498e5364adb391b9b88a2c44b803cd9e2ab2f2e2dd773b33"], 0xfdef) 01:26:35 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000000)="c109008100002c00000000e4ac14140de0", 0x11}], 0x1}, 0x0) 01:26:35 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="a4ab5bf51ec8e64d0ba5382412f728db4b2b2f2f3ff7ad271f1e89e46f905080af4c90ccb170e60b3a8bf574b763e3062d037dca291318d0a17270bbce74b47888318b04aeb0747555ba16ea10e6ddb915ceb6397e514f3482ca3c22e31ebc6da732ee3d854a1d3b9b3c0887a22cf550250fc7204eaa3d026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe2229aad8dc604bb8c133e8382f58f1", 0xa1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 01:26:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:35 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x400448c9, 0x0) pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:26:35 executing program 0: syz_emit_ethernet(0x36, &(0x7f0000000140)={@local, @random="8f796a56a2df", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 01:26:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$vfat(&(0x7f0000000200)='vfat\x00', &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'iso8859-14'}}]}) 01:26:35 executing program 0: syz_emit_ethernet(0x36, &(0x7f0000000140)={@local, @random="8f796a56a2df", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 01:26:35 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r0, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:35 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x20000, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) [ 135.235632] FAT-fs (loop3): bogus number of reserved sectors [ 135.252698] FAT-fs (loop3): Can't find a valid FAT filesystem 01:26:35 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x0, 0x0, 0x0) 01:26:35 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r0, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:35 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000000c0), 0xc) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) recvmsg(0xffffffffffffffff, &(0x7f000000ab40)={&(0x7f0000009600)=@can={0x1d, 0x0}, 0x80, &(0x7f000000a9c0)=[{&(0x7f0000009680)=""/4096, 0x1000}, {&(0x7f000000a6c0)=""/220, 0xdc}], 0x2}, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f000000ad00)={0x0, 0x0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f000000ad40)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8, [], r1, r2}, 0x3c) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0xfffffff5) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0xfffffff5) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000000)={'teql0\x00', @remote}) write$cgroup_pid(r4, &(0x7f0000000100), 0xda4fff08) sendmsg$kcm(r4, &(0x7f0000001440)={0x0, 0xd7, 0x0}, 0x84) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000fc0)={&(0x7f0000000f80)='./file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000680)='-)vboxnet1@}\x00', r4}, 0x10) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'teql0\x00', @remote}) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0xffb5}, 0x404c0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000fc0)={&(0x7f0000000f80)='./file0\x00', r3}, 0x10) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x660c, 0x0) recvmsg$kcm(r0, &(0x7f0000000640)={&(0x7f00000003c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000500)=""/119, 0x77}], 0x1, &(0x7f0000000580)=""/151, 0x97}, 0x40000180) r5 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="48000000150081fb7059ae08060c04000a110000ca7e86add250565ed08a562ad6e74703c48f93b02a02000000461eb886a5e54e8f00"/72, 0x48}], 0x1}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="48000000150081fb7059ae08060c04000a110000ca7e86add250565ed08a562ad6e74703c48f93b02a02000000461eb886a5e54e8f00"/72, 0x48}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000000700), 0x4) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)=0x4) 01:26:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d6c0bcfe47bf070") mknod(&(0x7f0000000200)='./bus\x00', 0x100c, 0x0) gettid() open$dir(0x0, 0x0, 0x0) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) read$FUSE(r1, &(0x7f0000007380), 0x1000) 01:26:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x2a000400) msgget$private(0x0, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ff7000/0x3000)=nil) r1 = shmat(0x0, &(0x7f0000ffb000/0x3000)=nil, 0x6000) unshare(0x8000400) shmdt(r1) 01:26:38 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x0, 0x0, 0x0) 01:26:38 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r0, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:38 executing program 1: write(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 01:26:38 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000000c0), 0xc) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) recvmsg(0xffffffffffffffff, &(0x7f000000ab40)={&(0x7f0000009600)=@can={0x1d, 0x0}, 0x80, &(0x7f000000a9c0)=[{&(0x7f0000009680)=""/4096, 0x1000}, {&(0x7f000000a6c0)=""/220, 0xdc}], 0x2}, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f000000ad00)={0x0, 0x0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f000000ad40)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8, [], r1, r2}, 0x3c) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0xfffffff5) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0xfffffff5) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000000)={'teql0\x00', @remote}) write$cgroup_pid(r4, &(0x7f0000000100), 0xda4fff08) sendmsg$kcm(r4, &(0x7f0000001440)={0x0, 0xd7, 0x0}, 0x84) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000fc0)={&(0x7f0000000f80)='./file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000680)='-)vboxnet1@}\x00', r4}, 0x10) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'teql0\x00', @remote}) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0xffb5}, 0x404c0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000fc0)={&(0x7f0000000f80)='./file0\x00', r3}, 0x10) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x660c, 0x0) recvmsg$kcm(r0, &(0x7f0000000640)={&(0x7f00000003c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000500)=""/119, 0x77}], 0x1, &(0x7f0000000580)=""/151, 0x97}, 0x40000180) r5 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="48000000150081fb7059ae08060c04000a110000ca7e86add250565ed08a562ad6e74703c48f93b02a02000000461eb886a5e54e8f00"/72, 0x48}], 0x1}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="48000000150081fb7059ae08060c04000a110000ca7e86add250565ed08a562ad6e74703c48f93b02a02000000461eb886a5e54e8f00"/72, 0x48}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000000700), 0x4) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)=0x4) 01:26:38 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)={[{@fat=@errors_remount='errors=remount-ro'}]}) 01:26:38 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x0, 0x0, 0x0) 01:26:38 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x36, &(0x7f0000000140)={@local, @random="8f796a56a2df", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @multicast1}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 01:26:38 executing program 1: r0 = add_key$user(0x0, &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='>', 0x1, 0xfffffffffffffffd) keyctl$unlink(0x7, r0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) 01:26:38 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r0, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:38 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x36, &(0x7f0000000140)={@local, @random="8f796a56a2df", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @multicast1}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 01:26:39 executing program 4: syz_genetlink_get_family_id$team(0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={0x20, 0x1e, 0x2000000000000301, 0x0, 0x0, {0x11}, [@typed={0xc, 0x10e, @u64}]}, 0x20}}, 0x0) 01:26:39 executing program 2: pipe(&(0x7f00000002c0)) close(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x400448c9, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:26:39 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x36, &(0x7f0000000140)={@local, @random="8f796a56a2df", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @multicast1}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 01:26:39 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r0, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:39 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f00000001c0)={0x53, 0x0, 0x2b5, 0x0, @scatter={0x2f, 0xc1, &(0x7f0000000000)=[{&(0x7f0000000080)=""/193, 0xc1}]}, &(0x7f0000001280), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc070d3f500000000}) 01:26:39 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netfilter\x00') close(r0) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) getpgrp(0xffffffffffffffff) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000040)) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x280000, 0x0) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, &(0x7f00000000c0)=""/4096) prctl$PR_GET_SECUREBITS(0x1b) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/ptmx\x00', 0x8000, 0x0) ioctl$KDGKBDIACR(r3, 0x4b4a, &(0x7f0000001100)=""/28) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001140)={0xffffffffffffffff}) splice(0xffffffffffffffff, &(0x7f0000001180), 0xffffffffffffffff, &(0x7f00000011c0)=0x3e, 0x6, 0x2e2cca69260db3d7) syz_open_pts(r3, 0x400) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001500)={0x0, 0x0}) fcntl$setown(0xffffffffffffffff, 0x8, r5) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001540)='./cgroup.net/syz0\x00', 0x200002, 0x0) pwrite64(r6, &(0x7f0000001580)="296c24e8550b74da25ff80dafd38bc34f21a1b6ab863d904e5cbb7133e8fc4eb4a27afc18159c187874c99bc99689bfd62bee6762f8069", 0x37, 0x0) sendto(r4, &(0x7f00000015c0)="8ccceece073689abe4633eb9c5e66cc1c109ca7e6631db5aaad464e0c255bb32c61e90bde392e8610ed73e5c7d331592ac9af97f90921271b1da2b407db49501eab52ac83254dbc76c665e324a6b96d9af2ce1ee903cea125bd18b21a489cc9c2c907036ebfd8e309e5bb3ddd6a85b9fc4", 0x71, 0x0, &(0x7f0000001640)=@isdn={0x22, 0x1, 0x0, 0x7, 0x1}, 0x80) 01:26:39 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0xffffffff80000001) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0xa, 0xb80b000000000000, @local}}, 0x0, 0x0, 0x0, 0x0, 0x2e}, 0x9c) 01:26:39 executing program 0: socket(0x10, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$kcm(0x2, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06K\xea0\xd5\x9f\x9e\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTH\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x8f\xe1i\xf2-A\x94\xff\xa1Yl]\x83\x17b\x1f\x91', 0x2761, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000008c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06K\xea0\xd5\x9f\x9e\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTH\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x8f\xe1i\xf2-A\x94\xff\xa1Yl]\x83\x17b\x1f\x91', 0x2761, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) pipe(&(0x7f0000000540)) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000540)) socket$inet_tcp(0x2, 0x1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000008c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06K\xea0\xd5\x9f\x9e\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTH\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x8f\xe1i\xf2-A\x94\xff\xa1Yl]\x83\x17b\x1f\x91', 0x2761, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000008c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06K\xea0\xd5\x9f\x9e\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTH\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x8f\xe1i\xf2-A\x94\xff\xa1Yl]\x83\x17b\x1f\x91', 0x2761, 0x0) socket$caif_stream(0x25, 0x1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000008c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06K\xea0\xd5\x9f\x9e\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTH\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x8f\xe1i\xf2-A\x94\xff\xa1Yl]\x83\x17b\x1f\x91', 0x2761, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) pipe(&(0x7f00000000c0)) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) socket$kcm(0x2, 0x200000000000006, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000008c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06K\xea0\xd5\x9f\x9e\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTH\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x8f\xe1i\xf2-A\x94\xff\xa1Yl]\x83\x17b\x1f\x91', 0x2761, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f00000000c0)) socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000a40)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06K\xea0\xd5\x9f\x9e\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaF\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe1\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x00_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTH\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1R\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x8f\xe1i\xf2-A\x94\xff\xa1Yl]\x83\x17b\x1f\x91', 0x2761, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06K\xea0\xd5\x9f\x9e\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacua\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe49\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuT1\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x8f\xe1i\xf2-A\x94\xff\xa1Yl]\x83\x17b\x1f\x91\x00\x00\x00\x00\x00\x00O\xee\xe1l\xdb\xfc\x94\x9dj\xa9\xfe\xcf\x04\xb2)\\\xe5\x107\x06:\\\xe9gH\x1c\xc2v\xa0rX\xdd\xa0\xb4.\x0e\"\xca\xc0\x7f\xe1b\x91s\xf0Yf\xc4\x97\xf4\xa0)\x14L\xb8\x00\x995k\x90\xa6\xfb\xa58\x86\xf4\xa9', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) [ 139.007107] audit: type=1400 audit(1568942799.525:39): avc: denied { create } for pid=7301 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:26:39 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r0, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:39 executing program 3: r0 = gettid() r1 = inotify_init1(0x0) pipe(0x0) r2 = dup2(r1, 0xffffffffffffffff) ioctl$VT_GETMODE(r2, 0x5601, &(0x7f0000000100)) inotify_rm_watch(0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) getpid() r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r4 = add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) keyctl$invalidate(0x15, r4) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r4) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) tkill(r0, 0x1000000000016) 01:26:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, 0x0, 0x0) getsockopt$netlink(r0, 0x10e, 0x0, 0x0, 0x0) [ 139.139778] audit: type=1400 audit(1568942799.565:40): avc: denied { write } for pid=7301 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:26:39 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r0, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:39 executing program 4: [ 139.344739] audit: type=1400 audit(1568942799.615:41): avc: denied { read } for pid=7301 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 01:26:40 executing program 2: pipe(&(0x7f00000002c0)) close(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x400448c9, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:26:40 executing program 3: 01:26:40 executing program 4: 01:26:40 executing program 0: 01:26:40 executing program 1: 01:26:40 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r0, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:40 executing program 1: 01:26:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bdfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x0) fsetxattr$security_ima(r1, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@md5={0x1, "60c6cc8abefe053e21bcdc3a5c54be63"}, 0x11, 0x0) 01:26:40 executing program 4: creat(&(0x7f0000000040)='./file0\x00', 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 01:26:40 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0xfffff038}, {0x16}]}) 01:26:40 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x17, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b70000000000000095000000000000001474dcbf99c0b1006d1c767c0a43c0bd53b6ae81fa4bfd86e807622e458be4612110f32a9c8830e4e0bf4079c40a0258b7151b740d6fa76229502b7f20c62a8ad1a938c13be2168ace3565ce3053db6d114e7cb0d24e2eb710c8804f4297ddb2a3e2f7ea6dc1ed0f08ccbe56a63e237ba65c3bbdc7d3660000000054f147"], &(0x7f0000000340)='GPL\x00'}, 0x48) 01:26:40 executing program 3: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0xfffff030}, {0x16}]}) 01:26:41 executing program 2: pipe(&(0x7f00000002c0)) close(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x400448c9, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:26:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000005300)) 01:26:41 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000000)=""/118) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01dfdde80f32d9e90f086665676426f7c5000000000f2245deef0f23f5", 0x23}], 0xaaaaaaaaaaaae88, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000c000/0x18000)=nil, &(0x7f00000001c0)=[@text64={0x40, &(0x7f0000000140)="b9000400000f3266ba430066eddc0f0f01c442c20100b9050400000f32430f01c2c482198e5200c4e16d75572ab9800000c00f3235001000000f30", 0x3b}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000002000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, 0x0, 0x289}], 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 01:26:41 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r0, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f00000001c0)={{0xa, 0x0, 0x0, @rand_addr="83de2ff58d0326bfaed1511f5c3ec607"}, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x0, [0x5e, 0x0, 0xffffffffffffe08d, 0x4]}, 0x5c) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) accept4(0xffffffffffffffff, &(0x7f0000000480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, &(0x7f0000000000)=0x80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:26:41 executing program 3: msgget(0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in=@remote}}, {{@in6=@empty}, 0x0, @in=@loopback}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getgid() sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) getgid() socket$inet6_tcp(0xa, 0x1, 0x0) getgid() sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000240)=0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) r2 = gettid() kcmp(r2, r1, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) gettid() 01:26:41 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x800004, 0x42}, 0x3c) 01:26:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r1, &(0x7f0000000380)={'#! ', './file0'}, 0xb) [ 140.571384] kvm [7395]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x4000006d data 0x4d00000000f 01:26:41 executing program 3: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0xfffff028}, {0x16}]}) [ 140.639895] kvm [7395]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x4000003b data 0x4d00000000f 01:26:41 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x10001f}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01dfdde80f32d9e90f086665676426f7c5000000000f2245deef0f23f5", 0x23}], 0xaaaaaaaaaaaae88, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000c000/0x18000)=nil, &(0x7f00000001c0)=[@text64={0x40, &(0x7f0000000140)="b9000400000f3266ba430066eddc0f0f01c442c20100b9050400000f32430f01c2c482198e5200c4e16d75572ab9800000c00f3235001000000f30", 0x3b}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000002000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, 0x0, 0x289}], 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 01:26:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r1, &(0x7f0000000380)={'#! ', './file0'}, 0xb) [ 140.713134] kvm [7395]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000009 data 0x4d00000000f [ 140.797063] kvm [7395]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000041 data 0x4d00000000f 01:26:41 executing program 4: [ 140.866292] kvm [7395]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x4000000f data 0x4d00000000f [ 140.938901] kvm [7395]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000079 data 0x4d00000000f [ 140.979526] kvm [7395]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000047 data 0x4d00000000f [ 141.002885] kvm [7395]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000015 data 0x4d00000000f [ 141.022980] kvm [7395]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x4000007f data 0x4d00000000f [ 141.036561] kvm [7395]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x4000004d data 0x4d00000000f [ 141.059207] kvm [7395]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000020 data 0x4d00000000f 01:26:41 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x200000000000042) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, 0x0) 01:26:41 executing program 3: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0x9fff}, {0x16}]}) 01:26:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r1, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:41 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="a4ab5bf51ec8e64d0ba5382412f728db4b2b2f2f3ff7ad271f1e89e46f905080af4c90ccb170e60b3a8bf574b763e3062d037dca291318d0a17270bbce74b47888318b04aeb0747555ba16ea10e6ddb915ceb6397e51", 0x56}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 141.077700] kvm [7395]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000020 data 0x4d00000000f [ 141.107918] kvm [7395]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000020 data 0x4d00000000f [ 141.145066] kvm [7395]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000020 data 0x4d00000000f 01:26:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='sched\x00') write$P9_RWSTAT(r2, &(0x7f0000000100)={0x7}, 0x7) 01:26:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x8000000000001, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d48e56c969a3547660028453ec177b1aec0034571923a2c0e75ecb75217584fce8cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731bd6a16792b1319e2acc0eb1ba8116a4a"], 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x30}, 0xc) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) 01:26:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r1, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:41 executing program 1: 01:26:41 executing program 3: 01:26:41 executing program 1: 01:26:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x8000000000001, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d48e56c969a3547660028453ec177b1aec0034571923a2c0e75ecb75217584fce8cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731bd6a16792b1319e2acc0eb1ba8116a4a"], 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x30}, 0xc) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) 01:26:41 executing program 3: 01:26:41 executing program 0: 01:26:41 executing program 1: 01:26:42 executing program 3: 01:26:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r1, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:44 executing program 0: 01:26:44 executing program 1: 01:26:44 executing program 4: 01:26:44 executing program 3: 01:26:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x8000000000001, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d48e56c969a3547660028453ec177b1aec0034571923a2c0e75ecb75217584fce8cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731bd6a16792b1319e2acc0eb1ba8116a4a"], 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x30}, 0xc) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) 01:26:44 executing program 1: 01:26:44 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1005, 0x0) read$eventfd(r0, &(0x7f0000000480), 0x1) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) ioctl$int_in(r0, 0x800060c0045002, &(0x7f0000000000)) 01:26:44 executing program 0: 01:26:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x8000000000001, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d48e56c969a3547660028453ec177b1aec0034571923a2c0e75ecb75217584fce8cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731bd6a16792b1319e2acc0eb1ba8116a4a"], 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x30}, 0xc) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) 01:26:44 executing program 4: 01:26:44 executing program 1: 01:26:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r1, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:44 executing program 0: 01:26:44 executing program 1: 01:26:44 executing program 4: 01:26:44 executing program 2: 01:26:44 executing program 1: 01:26:44 executing program 4: 01:26:45 executing program 2: 01:26:45 executing program 0: 01:26:45 executing program 4: 01:26:45 executing program 1: 01:26:45 executing program 3: 01:26:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r1, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:45 executing program 4: 01:26:45 executing program 1: 01:26:45 executing program 2: 01:26:45 executing program 0: 01:26:45 executing program 3: 01:26:45 executing program 0: 01:26:45 executing program 1: 01:26:45 executing program 2: 01:26:45 executing program 4: 01:26:45 executing program 3: 01:26:45 executing program 0: 01:26:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r1, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:45 executing program 1: 01:26:45 executing program 4: 01:26:45 executing program 3: 01:26:45 executing program 2: 01:26:45 executing program 0: 01:26:45 executing program 1: 01:26:45 executing program 0: 01:26:45 executing program 4: 01:26:45 executing program 2: 01:26:45 executing program 3: 01:26:45 executing program 1: 01:26:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r1, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:45 executing program 0: 01:26:45 executing program 3: 01:26:45 executing program 4: 01:26:45 executing program 2: 01:26:45 executing program 1: 01:26:46 executing program 4: 01:26:46 executing program 3: 01:26:46 executing program 1: 01:26:46 executing program 2: 01:26:46 executing program 0: 01:26:46 executing program 0: 01:26:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0b") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r1, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:46 executing program 2: 01:26:46 executing program 3: 01:26:46 executing program 4: 01:26:46 executing program 1: 01:26:46 executing program 0: 01:26:46 executing program 2: 01:26:46 executing program 4: 01:26:46 executing program 3: 01:26:46 executing program 1: 01:26:46 executing program 0: 01:26:46 executing program 4: 01:26:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0b") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r1, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:46 executing program 3: 01:26:46 executing program 1: 01:26:46 executing program 2: 01:26:46 executing program 4: 01:26:46 executing program 0: 01:26:46 executing program 3: 01:26:46 executing program 1: 01:26:46 executing program 2: sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f0000000080)=ANY=[]) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000340)="7942f1bbcedff3c8e695c1e76eed0347", 0x10) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0xc}, 0x0, 0x3, 0x1000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=ANY=[@ANYBLOB="3400000014000100000000f20000000002", @ANYRES32, @ANYBLOB="1400030065716c00000000000000"], 0x3}}, 0x0) 01:26:46 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vhost-net\x00', 0x2, 0x0) read(r0, 0x0, 0x0) 01:26:46 executing program 0: 01:26:46 executing program 4: 01:26:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0b") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r1, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:46 executing program 3: 01:26:46 executing program 0: 01:26:46 executing program 3: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='>', 0x1, 0xfffffffffffffffd) keyctl$unlink(0x7, 0x0, 0x0) keyctl$set_timeout(0xf, r0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x503c01, 0x0) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f0000000080)=ANY=[]) pipe(0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}, 0x0, 0x3, 0x1000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 01:26:46 executing program 0: sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000340)="7942f1bbcedff3c8e695c1e76eed0347", 0x10) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x3, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)}, 0x0) 01:26:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2284, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0xc1, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc070d3f500000000}) 01:26:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2284, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0xc1, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc070d3f500000000}) 01:26:46 executing program 2: sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f0000000080)=ANY=[]) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000340)="7942f1bbcedff3c8e695c1e76eed0347", 0x10) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0xc}, 0x0, 0x3, 0x1000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=ANY=[@ANYBLOB="3400000014000100000000f20000000002", @ANYRES32, @ANYBLOB="1400030065716c00000000000000"], 0x3}}, 0x0) 01:26:46 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000080)={0x1, 0x4}) 01:26:46 executing program 3: r0 = getpid() syz_open_dev$usbmon(0x0, 0x1, 0x208100) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f00000002c0)={0x3}, 0x8, 0x800) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x3, 0x2, 0x6}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x4080, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd\x00') fchdir(0xffffffffffffffff) ioctl$EVIOCGABS0(r2, 0x80184540, &(0x7f0000000080)=""/130) 01:26:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2284, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0xc1, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc070d3f500000000}) 01:26:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47b") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r1, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:46 executing program 1: openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x503c01, 0x0) pipe(&(0x7f0000000340)) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000340)="7942f1bbcedff3c8e695c1e76eed0347", 0x10) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) process_vm_readv(0x0, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{0x0}], 0x1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(0x0, &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB="1400030065716c0000000000000000000000000008000200ac"], 0x2}}, 0x0) 01:26:46 executing program 0: openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='>', 0x1, 0xfffffffffffffffd) keyctl$unlink(0x7, r0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x503c01, 0x0) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f0000000080)=ANY=[@ANYBLOB]) pipe(&(0x7f0000000340)) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000340)="7942f1bbcedff3c8e695c1e76eed0347", 0x10) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) process_vm_readv(0x0, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{0x0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0xc}, 0x0, 0x3, 0x1000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB="1400030065716c0000000000000000000000000008000200ac"], 0x2}}, 0x0) 01:26:46 executing program 2: sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f0000000080)=ANY=[]) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000340)="7942f1bbcedff3c8e695c1e76eed0347", 0x10) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0xc}, 0x0, 0x3, 0x1000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=ANY=[@ANYBLOB="3400000014000100000000f20000000002", @ANYRES32, @ANYBLOB="1400030065716c00000000000000"], 0x3}}, 0x0) 01:26:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2284, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0xc1, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc070d3f500000000}) 01:26:47 executing program 1: sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f0000000080)=ANY=[]) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000340)="7942f1bbcedff3c8e695c1e76eed0347", 0x10) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0xc}, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) 01:26:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47b") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r1, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:47 executing program 2: ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, 0x0) write(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(0x0, 0x4) 01:26:47 executing program 0: openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='>', 0x1, 0xfffffffffffffffd) keyctl$unlink(0x7, r0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x503c01, 0x0) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f0000000080)=ANY=[@ANYBLOB]) pipe(&(0x7f0000000340)) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000340)="7942f1bbcedff3c8e695c1e76eed0347", 0x10) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) process_vm_readv(0x0, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{0x0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0xc}, 0x0, 0x3, 0x1000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB="1400030065716c0000000000000000000000000008000200ac"], 0x2}}, 0x0) 01:26:47 executing program 4: openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, 0x0) write(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) 01:26:47 executing program 3: r0 = getpid() syz_open_dev$usbmon(0x0, 0x1, 0x208100) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f00000002c0)={0x3}, 0x8, 0x800) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x3, 0x2, 0x6}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x4080, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd\x00') fchdir(0xffffffffffffffff) ioctl$EVIOCGABS0(r2, 0x80184540, &(0x7f0000000080)=""/130) 01:26:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47b") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r1, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:47 executing program 2: openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = add_key$user(0x0, &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0x7, r0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x503c01, 0x0) pipe(&(0x7f0000000340)) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000340)="7942f1bbcedff3c8e695c1e76eed0347", 0x10) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) process_vm_readv(0x0, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{0x0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x3, 0x1000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB="1400030065716c0000000000000000000000000008000200ac"], 0x2}}, 0x0) 01:26:47 executing program 1: sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f0000000080)=ANY=[]) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000340)="7942f1bbcedff3c8e695c1e76eed0347", 0x10) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0xc}, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) 01:26:47 executing program 0: openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='>', 0x1, 0xfffffffffffffffd) keyctl$unlink(0x7, r0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x503c01, 0x0) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f0000000080)=ANY=[@ANYBLOB]) pipe(&(0x7f0000000340)) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000340)="7942f1bbcedff3c8e695c1e76eed0347", 0x10) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) process_vm_readv(0x0, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{0x0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0xc}, 0x0, 0x3, 0x1000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB="1400030065716c0000000000000000000000000008000200ac"], 0x2}}, 0x0) 01:26:47 executing program 2: openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = add_key$user(0x0, &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0x7, r0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x503c01, 0x0) pipe(&(0x7f0000000340)) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000340)="7942f1bbcedff3c8e695c1e76eed0347", 0x10) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) process_vm_readv(0x0, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{0x0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x3, 0x1000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB="1400030065716c0000000000000000000000000008000200ac"], 0x2}}, 0x0) 01:26:47 executing program 4: openat$userio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = add_key$user(0x0, &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0x7, r0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x503c01, 0x0) pipe(&(0x7f0000000340)) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000340)="7942f1bbcedff3c8e695c1e76eed0347", 0x10) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) process_vm_readv(0x0, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{0x0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x3, 0x1000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB="1400030065716c0000000000000000000000000008000200ac"], 0x2}}, 0x0) 01:26:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf0") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r1, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:47 executing program 0: r0 = getpid() syz_open_dev$usbmon(0x0, 0x1, 0x208100) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f00000002c0)={0x3}, 0x8, 0x800) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x3, 0x2, 0x6}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x4080, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd\x00') fchdir(0xffffffffffffffff) ioctl$EVIOCGABS0(r2, 0x80184540, &(0x7f0000000080)=""/130) 01:26:47 executing program 1: sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f0000000080)=ANY=[]) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000340)="7942f1bbcedff3c8e695c1e76eed0347", 0x10) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0xc}, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) 01:26:47 executing program 2: sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f0000000080)=ANY=[]) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000340)="7942f1bbcedff3c8e695c1e76eed0347", 0x10) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0xc}, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) 01:26:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf0") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r1, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:47 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000200)="8000000035d0000019020300e60100006c000000000000000700000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 01:26:47 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=', @ANYRESHEX]) 01:26:47 executing program 1: sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f0000000080)=ANY=[]) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000340)="7942f1bbcedff3c8e695c1e76eed0347", 0x10) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0xc}, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) [ 147.324632] 9pnet: Could not find request transport: 0xffffffffffffffff [ 147.333204] 9pnet: Could not find request transport: 0xffffffffffffffff 01:26:47 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x4}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @rand_addr="ffd722dce20f92597102784bad12b4ec"}, {0x2, 0x0, 0xfffffffdfffffffd, @mcast2}, r1}}, 0x48) 01:26:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf0") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r1, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:48 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="a4ab5bf51ec8e64d0ba5382412f728db4b2b2f2f3ff7ad271f1e89e46f905080af4c90ccb170e60b3a8bf574b763e3062d037dca291318d0a17270bbce74b47888318b04aeb0747555ba16ea10e6ddb915ceb6397e514f3482ca3c22e31ebc6da732ee3d854a1d3b9b3c0887a22cf550250fc7204eaa3d026ef9d3f316f9fb6e05b4eb24d9694ae311c93e10ff44910738fe2229aad8dc604bb8c133e8382f58f1bd2a", 0xa3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 01:26:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @rand_addr="ffd722dce20f92597102784bad12b4ec"}, {0x2, 0x0, 0xfffffffdfffffffd, @mcast2}, r1}}, 0x48) 01:26:48 executing program 1: sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f0000000080)=ANY=[]) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000340)="7942f1bbcedff3c8e695c1e76eed0347", 0x10) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0xc}, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) 01:26:48 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',']) 01:26:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x2, @broadcast}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000140)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0xfffffce6, 0x900000020000000, &(0x7f0000000180)={0x2, 0x2, @loopback}, 0x10) sendto(r0, &(0x7f0000000000)="02", 0x5a3, 0x4000051, 0x0, 0xc9) 01:26:48 executing program 3: sysinfo(&(0x7f0000000500)=""/4096) 01:26:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r1, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r1, &(0x7f0000000380)={'#! ', './file0'}, 0xb) 01:26:48 executing program 3: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="51482bdd195251e2d5705808d19283011fd1b66f7cadd295f0fcc82511f6a9712689dd1f459b0970158d89dd84e657", 0x2f}, {&(0x7f00000000c0)="d7996a440d25", 0x6}], 0x2}}], 0x1, 0x2400ffe0) sendmsg$inet6(r0, &(0x7f00000008c0)={0x0, 0x4, &(0x7f0000000740)=[{&(0x7f0000000240)="82d21f371b93fc13b8356dadc4de33ef168f7d8bd5ee7c038bf054a7d72895fed4ac14e494a3bea29c4c2535a3cdca797837d32154de500a3ae0f20595861a4a8847299569", 0x45}, {&(0x7f00000002c0)="db850535b5f0a83652b7a1737cbb7dd7c8477e48eb8adad5b62d4246643a09f0c44cf87b10354336b3633e44d21e93eb3f106b571a1700b0e9dd71e5d15d32ed18061d5ae650e6140da53d029213722521a20a0f52df6646dcd8a11fb7d0b4d22d87d111cd616beae423cf9cb2ed01501aa0828d13ef633f86bea2a3d7533d63a11f68601df9a1d1f0bf5cc450659062fa1d5d9c277e8901e3af556cd1d0d5ae4d", 0xa1}, {&(0x7f0000000380)="c2d5156af006230a19950f06d713eac2fc204c25e581db030a8c761b80dd805877e3b44b7c846807d006c227d7c07b8a6663ad25c06036aee38702fa51c2c55fbb53bec69d2a332a680dee63812ba7f72c544b88ed31b21283f720ae41137ae61d967c7d5b1b1e356821246e9af13873c1c9c87c917c5ab8c5209cabc4cdb3a25ac0488a8cb96cbef96b4c6676ec46697cef3f28245452b7ef59f9c1ef59095d3fd2ec567a9bfc40c6e0dc5042f7a4e3d0", 0xb1}, {&(0x7f0000000440)="a3c7e89dd389e4473b5544a661744ff49fc5cbd4b4", 0x15}, {&(0x7f0000000480)="b811005a2d3665e7da3354d1bed04848d438b0f2df5c323a1c8de3b397e542098d78bd51caf7648ea3d1e5aa646de5d2ef7fb754ebb3abd457d75bbe7300f5", 0x3f}, {&(0x7f00000004c0)="d27bf778d40e7e1cabacc7acac69c30c814c8e3f8bf02b9cfdc966605e36269ee19503d8179b358e360bad253309c3c0d74c0ac70fe8ae78c4c9ba793a8c0fe10a27ca95f5c790a93427c016bf63d17081467c97a43d9229e8c2647aba9fdcff4f7a533ac86534dda4079efd52f5b9df0c0f0730a64124289c19758acbf0bf1c36a19d0161b70ee8b39b22e9364769b860f875a6963f6433a2e15e9fe35a1c759da33166d7c382b7d6472c59d379d012cd443a64595061ac8fba9e2f313c49000000000000", 0xc5}], 0x6}, 0x0) [ 147.658007] kasan: CONFIG_KASAN_INLINE enabled [ 147.667600] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 147.698714] 9pnet: Insufficient options for proto=fd [ 147.704903] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 147.711156] Modules linked in: [ 147.714354] CPU: 0 PID: 7857 Comm: syz-executor.4 Not tainted 4.14.145 #0 [ 147.721275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 147.730628] task: ffff888097e90700 task.stack: ffff8880646b8000 [ 147.736695] RIP: 0010:tcp_sendmsg_locked+0x50e/0x3200 [ 147.741878] RSP: 0018:ffff8880646bfaa8 EFLAGS: 00010206 01:26:48 executing program 1: sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f0000000080)=ANY=[]) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000340)="7942f1bbcedff3c8e695c1e76eed0347", 0x10) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0xc}, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) 01:26:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000080)=ANY=[@ANYBLOB="0100000000000007010100c0"]) [ 147.747229] RAX: 0000000000000012 RBX: 0000000000000000 RCX: ffffc90009c6c000 [ 147.754487] RDX: 000000000000009e RSI: ffffffff85240e44 RDI: 0000000000000090 [ 147.761756] RBP: ffff8880646bfc40 R08: 0000000000000001 R09: ffff888097e90fa0 [ 147.769027] R10: 0000000000000000 R11: 0000000000000000 R12: dffffc0000000000 [ 147.773754] kobject: 'loop3' (ffff8880a4a000e0): kobject_uevent_env [ 147.776295] R13: ffff888099529840 R14: ffff8880646bfd60 R15: ffff888065227500 [ 147.785059] kobject: 'loop3' (ffff8880a4a000e0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 147.789956] FS: 00007efc79d9c700(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 147.789961] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 147.789967] CR2: 00007ffd584851a8 CR3: 000000009f315000 CR4: 00000000001406f0 [ 147.789975] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 147.789979] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 147.789984] Call Trace: [ 147.837831] ? lock_sock_nested+0x9e/0x110 [ 147.842049] ? find_held_lock+0x35/0x130 [ 147.846091] ? tcp_sendpage+0x60/0x60 [ 147.849885] ? trace_hardirqs_on_caller+0x400/0x590 [ 147.854878] ? trace_hardirqs_on+0xd/0x10 [ 147.859006] tcp_sendmsg+0x30/0x50 [ 147.862527] inet_sendmsg+0x122/0x500 [ 147.866309] ? inet_recvmsg+0x500/0x500 [ 147.870263] sock_sendmsg+0xce/0x110 [ 147.873955] SYSC_sendto+0x206/0x310 [ 147.877680] ? SYSC_connect+0x2d0/0x2d0 [ 147.881646] ? kasan_check_read+0x11/0x20 [ 147.885783] ? _copy_to_user+0x87/0xd0 [ 147.889658] ? put_timespec64+0xb4/0x100 [ 147.893705] ? nsecs_to_jiffies+0x30/0x30 [ 147.897833] ? SyS_clock_gettime+0xf8/0x180 [ 147.902144] SyS_sendto+0x40/0x50 [ 147.905592] ? SyS_getpeername+0x30/0x30 [ 147.909638] do_syscall_64+0x1e8/0x640 [ 147.913506] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 147.918333] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 147.923499] RIP: 0033:0x459a09 [ 147.926667] RSP: 002b:00007efc79d9bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 147.934361] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000459a09 [ 147.941621] RDX: 00000000000005a3 RSI: 0000000020000000 RDI: 0000000000000003 01:26:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x0, 0x0, 0x1}, 0x20) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x60) write$binfmt_script(r1, &(0x7f0000000380)={'#! ', './file0'}, 0xb) [ 147.948868] RBP: 000000000075bf20 R08: 0000000000000000 R09: 00000000000000c9 [ 147.956128] R10: 0000000004000051 R11: 0000000000000246 R12: 00007efc79d9c6d4 [ 147.963378] R13: 00000000004c7999 R14: 00000000004dd3d0 R15: 00000000ffffffff [ 147.970642] Code: d4 38 fc 4d 85 ed 0f 84 40 08 00 00 e8 ac d4 38 fc 8b 85 78 ff ff ff 48 8d bb 90 00 00 00 89 85 50 ff ff ff 48 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 74 06 0f 8e 4a 25 00 00 f6 83 90 00 00 00 [ 147.989759] RIP: tcp_sendmsg_locked+0x50e/0x3200 RSP: ffff8880646bfaa8 [ 148.011065] ---[ end trace 4abf5340ecaf1680 ]--- [ 148.014814] kobject: 'loop5' (ffff8880a4aef2e0): kobject_uevent_env [ 148.018217] Kernel panic - not syncing: Fatal exception [ 148.024351] kobject: 'loop5' (ffff8880a4aef2e0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 148.028997] Kernel Offset: disabled [ 148.042090] Rebooting in 86400 seconds..