f_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x0, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:30:45 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x0, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:30:45 executing program 5: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7, 0x4000) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) ioctl$SIOCRSACCEPT(r0, 0x89e3) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x3304, 0x0) 23:30:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = getpgid(0x0) sched_getscheduler(r2) sendmmsg$inet6(r1, &(0x7f000000a180)=[{{&(0x7f0000001740)={0xa, 0x4e20, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7ffff7f]}}, 0x1c, 0x0}}, {{&(0x7f0000002a40)={0xa, 0x4e24, 0x0, @local}, 0x1c, 0x0}}], 0x2, 0x0) 23:30:45 executing program 0: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r0) add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="f6af9287c9e95872787f3185fdeb643df31a1f409745c3f4ea3134c5ef183b55102ab8752a133e0d886c300c0d451ceba5d0615c7e56a3", 0x37, r0) r2 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0xc7, 0x280) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000300)={@multicast2, @initdev, 0x0}, &(0x7f0000000340)=0xc) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x1d, r3}, 0x10, &(0x7f0000000440)={&(0x7f00000003c0)={0x7, 0x8, 0x7, {0x0, 0x7530}, {0x0, 0x2710}, {0x2, 0x9, 0x3ff, 0x2}, 0x1, @canfd={{0x0, 0x6, 0x5, 0x40}, 0x20, 0x1, 0x0, 0x0, "f7ce7319d7c7edeccf0e20ecf716f3e0fdb59157e0f1f38b1da081e4ef0563df338ffab8ae5b9c868dbf0e300f9c3dd2f85b84ff7236d7016bef7ec697cf8056"}}, 0x80}, 0x1, 0x0, 0x0, 0x40}, 0x0) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r0}) 23:30:45 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup2(r0, r0) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000100)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffeff}, {0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}) 23:30:45 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x16830, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:30:45 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0, 0x0}) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r5 = openat$cgroup_subtree(r4, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f00000004c0)=ANY=[@ANYBLOB="2b7069647320a24171bd5525ad4a252bb3c0089ea55d82147744be805cbbebe10a17448d3fe3865ed4615c1f81b6bd0bf79313379bf94effcead9e41951b01ecbd549af0285d39c19aeda5b5b402000000ef7b7f17d70281f1235429d137ff07d3f223bcbd9395c30b0000000000cff98d300ae529288160ff2743620210610b89858d6b06c91b1ed66fefe9228eb5a60e26f90e6b3f4a7f01fb6e87dc206f1c77c3413e091188687d6d40b6052942be3ac3"], 0x6) write$cgroup_subtree(r5, &(0x7f0000000080)=ANY=[@ANYBLOB='-pids'], 0x5) fchown(r4, r2, r3) sendmsg$TIPC_NL_BEARER_SET(r4, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000880)=ANY=[@ANYBLOB="5866fad422a19c4265000020"], 0x1}}, 0x8044) 23:30:45 executing program 5: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x0, 0x0, 0x400}, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008e00)=[{{0x0, 0x0, &(0x7f0000003040)=[{0x0}, {&(0x7f0000000ec0)=""/74, 0x4a}], 0x2}}], 0x1, 0x0, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x0, 0xfffffffffffffffd}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 23:30:45 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x0, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:30:45 executing program 0: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r0}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x204400, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(r2, 0xae45, 0x8) r3 = accept(0xffffffffffffff9c, 0x0, &(0x7f0000000100)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x802, 0x0) getpeername$inet(r3, &(0x7f0000000180)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) getsockopt$inet_udp_int(r3, 0x11, 0x6f, &(0x7f0000000400), &(0x7f0000000440)=0x4) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x70, r4, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3f}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x101}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffffffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5f}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}]}, 0x70}, 0x1, 0x0, 0x0, 0x1}, 0x48010) 23:30:46 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x0, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:30:46 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/ppp\x00', 0x2, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000000)=""/246) write$binfmt_elf32(r0, 0x0, 0xbb) 23:30:46 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x16831, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:30:46 executing program 0: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r0}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x10000, 0x2) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000180)={0x7, 0x10001, 0x1ff}) ioctl$TIOCGPKT(r2, 0x80045438, &(0x7f00000001c0)) 23:30:46 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:30:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@mangle={'mangle\x00', 0x1f, 0x6, 0x6c8, 0x118, 0x388, 0x388, 0x228, 0x228, 0x5f8, 0x5f8, 0x5f8, 0x5f8, 0x5f8, 0x6, &(0x7f00000000c0), {[{{@ipv6={@dev={0xfe, 0x80, [], 0x19}, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, [0xffffffff, 0xffffffff, 0x0, 0xffffffff], [0x0, 0xffffffff, 0x0, 0xff000000], 'bond_slave_0\x00', 'bond0\x00', {}, {0xff}, 0x3a, 0x3a, 0x4, 0x9}, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@ipv6header={0x28, 'ipv6header\x00', 0x0, {0x84, 0x12}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@dev={0xfe, 0x80, [], 0x10}, @dev={0xfe, 0x80, [], 0xd}, [0xffffff00, 0xff000000, 0x0, 0xffffff00], [0x0, 0xffffff00, 0xffffffff, 0xff], 'team_slave_0\x00', 'netdevsim0\x00', {}, {0xff}, 0xec, 0x3, 0x4, 0x8}, 0x0, 0xc8, 0x110}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@remote, @ipv6=@empty, 0x8, 0xe, 0x100000001}}}, {{@uncond, 0x0, 0x118, 0x160, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xe}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@multicast2, @ipv6=@local, 0x37, 0x6, 0x7ff}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0x158, 0x180, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x3b, 0x3, 0x1, 0x1f, 0x108, @rand_addr="875f965f1c6a3e1e84fcb79f2bc0e8dd", @loopback, @empty, [0x0, 0xffffffff, 0xffffff00, 0xffffffff], [0xffffff00, 0xffffff00, 0xffffffff, 0xffffff00], [0xffffffff, 0x0, 0xffffffff], 0x20, 0x40}}]}, @HL={0x28, 'HL\x00', 0x0, {0x2, 0x100}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x728) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=@fragment, 0x8) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 23:30:46 executing program 0: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = syz_open_dev$cec(&(0x7f00000001c0)='/dev/cec#\x00', 0x2, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f00000002c0)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$NBD_DO_IT(r1, 0xab03) r3 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x3, 0x80000) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f0000000180)) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r0}) 23:30:46 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x16832, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:30:46 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket(0x9, 0x6, 0x84) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000000)=0x400, 0x4) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="5b643b02a726b898643a2f6c"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) 23:30:46 executing program 0: r0 = socket(0x3, 0x3, 0x8000000000000) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8001000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)=@newspdinfo={0x138, 0x24, 0xf00, 0x70bd2b, 0x25dfdbfc, 0xfffffffffffffffc, [@user_kmaddress={0x2c, 0x13, {@in=@multicast2, @in6=@local, 0x0, 0xa}}, @proto={0x8, 0x19, 0xff}, @srcaddr={0x14, 0xd, @in6=@mcast2}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x4e20, 0x3, @in=@loopback}}, @algo_auth={0xb8, 0x1, {{'sha224\x00'}, 0x368, "ac015d6c39189c698e07d0816e377834b791d304b77a1804a2420dcaccc931ff19e7acbd9d5334676d7acdc047fbcf1ffd7a1fe8bf030a7fb07fea8c499823cd295ca8a5894d57ea23ad3f60cf1cb8c124aa711ff51910c0dc30959f5db44bd0f29aef5f95f75419a6ec1c40e1"}}, @extra_flags={0x8, 0x18, 0xffff}]}, 0x138}}, 0x8000) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r1}) 23:30:46 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x0, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 591.249952][T10955] libceph: resolve 'd;§&¸˜d' (ret=-3): failed [ 591.313948][T10955] libceph: parse_ips bad ip '[d;§&¸˜d' [ 591.355401][T10960] libceph: resolve 'd;§&¸˜d' (ret=-3): failed [ 591.466457][T10960] libceph: parse_ips bad ip '[d;§&¸˜d' 23:30:47 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:30:47 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x5, 0x1d5002) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000240)={0x0, @loopback, @dev}, &(0x7f0000000280)=0xc) recvmsg(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f00000002c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)=""/83, 0x53}, {&(0x7f0000000400)=""/208, 0xd0}, {&(0x7f0000000500)=""/78, 0x4e}, {&(0x7f0000000580)=""/162, 0xa2}, {&(0x7f0000000640)=""/35, 0x23}, {&(0x7f0000000680)=""/136, 0x88}, {&(0x7f0000000740)=""/202, 0xca}, {&(0x7f0000000840)=""/51, 0x33}, {&(0x7f0000000880)=""/139, 0x8b}], 0xa, &(0x7f0000000a00)=""/110, 0x6e}, 0x40000041) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@ipv4={[], [], @multicast2}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000c80)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000d00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000e00)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000f00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001440)={{{@in=@empty, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000001540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001580)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000001680)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000016c0)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@empty}}, &(0x7f00000017c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001c80)={0x0, @loopback, @local}, &(0x7f0000001cc0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001d00)={'ip6_vti0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000001d40)={@remote, @broadcast, 0x0}, &(0x7f0000001d80)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000001dc0)={@dev, @broadcast, 0x0}, &(0x7f0000001e00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001ec0)={{{@in=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@empty}}, &(0x7f0000001fc0)=0xe8) accept4(0xffffffffffffffff, &(0x7f0000002000)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000002080)=0x80, 0x80800) accept(0xffffffffffffffff, &(0x7f0000002100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002180)=0x80) getpeername(0xffffffffffffffff, &(0x7f0000002280)=@hci={0x1f, 0x0}, &(0x7f0000002300)=0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000003c00)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003d00)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003fc0)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000004000)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000004100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004140)={{{@in, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@empty}}, &(0x7f0000004240)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004280)={@multicast1, @remote, 0x0}, &(0x7f00000042c0)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000004ac0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000004a80)={&(0x7f0000004300)={0x758, r1, 0x0, 0x70bd26, 0x25dfdbfe, {}, [{{0x8, 0x1, r2}, {0x1f0, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xded}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x79}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r4}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x6}}}]}}, {{0x8, 0x1, r5}, {0x170, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r8}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8000}}}]}}, {{0x8, 0x1, r11}, {0x144, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffffff}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r13}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r14}, {0x44, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r15}}}]}}, {{0x8, 0x1, r16}, {0x1e8, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r18}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r19}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x10000}}, {0x8, 0x6, r20}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x7, 0x0, 0x9, 0x81}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r21}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x80}}}]}}, {{0x8, 0x1, r22}, {0x44, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r23}}, {0x8}}}]}}]}, 0x758}, 0x1, 0x0, 0x0, 0x40}, 0x20040005) r24 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r25 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r24) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r25, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r24}) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x4) 23:30:47 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) r1 = dup(r0) syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@check_relaxed='check=relaxed'}]}) mbind(&(0x7f0000690000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x10000000002) ioctl$PPPIOCGUNIT(r1, 0x80047456, &(0x7f0000000080)) 23:30:47 executing program 1: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000440)=""/148, 0x94}], 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/3\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="ab3e7fc455089f13f2092ce8e9c70b0157dca41f81bafd175685db6dd04f5704aa8dd321f4f4c2d472a7e63065667e8f700dabbe53f04c03299b7205bd5b78171500386578ecd0ae535072499b134e69b2cfe1796edc") ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000040)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000100)=0x8) 23:30:47 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x16833, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:30:48 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000080)='/dev/udmabuf\x00', 0x2) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x42) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f00000000c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='syscall\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000237, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x100) 23:30:48 executing program 0: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000000c0)='a8|\xa2\xd8T\x85\x1a0\xacU', &(0x7f0000000100)=@secondary='builtin_and_secondary_trusted\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x400, 0x42) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x10200, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f00000001c0)={0xf000000c}) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000280)=""/230) 23:30:48 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:30:48 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000003700)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @local, 0xe}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="000000007627ce09d68a0638a5780c4c71e82c521e92aeaa31bcde9b96e405cfd69326f2bf0b90109d21f45d2056fc9d3c6552e212bf58d9ae0b92c0771de3b4b5eb14245a135a7d0d032f224337f522e934889e31d13ee27ed2b719a3e30a3f3461ee7aaac8bfa4947a97647a88fe02d6ede57c2a2eda125f10a4f9557706f61f7278b365a4e44d458b5dc10ece653f90c5727cc1d637391bef46438372d8bdc338f9d8aaf433157b0d20f75655744cb8d23b1002ce19138245dc210544e14c61acffa36e612a8ab9d4090cae85"], 0xc7}}], 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000100)=0x7e99, 0x4) 23:30:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet(0x10, 0x400000003, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="230000002d0007081dfffd940101830020200a000900000006000000000001000d00ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47a6268e3406cf055d90f15a3", 0x4c}], 0x1}, 0x0) bind(r1, &(0x7f0000000180)=@x25={0x9, @remote={[], 0x3}}, 0x80) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x40840, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r2, 0x10f, 0x81, &(0x7f00000000c0), &(0x7f0000000140)=0x4) 23:30:49 executing program 0: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r0}) r2 = socket(0x10, 0x3, 0xb6d4) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, r3, 0x900, 0x70bd2c, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4000004) [ 593.760928][T10989] ISOFS: Unable to identify CD-ROM format. 23:30:49 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x16834, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:30:49 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0xf, 0x5, 0x0, 0xcbfc, 0x14, 0x1, 0x8, [], 0x0, 0xffffffffffffff9c, 0x1, 0x2}, 0x3c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000540)={&(0x7f00000004c0)='./file0\x00', r1}, 0x10) r2 = socket$kcm(0x29, 0x5, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r5 = openat$cgroup_ro(r0, &(0x7f0000000280)='io.stat\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000380)={r3, r5}) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='o\x00'/18], 0x12) mkdirat$cgroup(r6, &(0x7f0000000200)='syz0\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1a, 0x4, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7}, [@jmp={0x5, 0xaf03, 0x0, 0x5, 0x0, 0x6}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x0, 0x0, 0x4}, 0x10}, 0x70) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) ioctl$TIOCLINUX5(r4, 0x541c, &(0x7f0000000140)={0x5, 0x100, 0x362, 0x7, 0x1}) write$cgroup_int(r7, &(0x7f0000000080), 0x297ef) getpid() recvmsg(r6, &(0x7f000001e800)={0x0, 0x0, &(0x7f000001e780)=[{&(0x7f000001e4c0)=""/41, 0x29}, {&(0x7f000001e500)=""/117, 0x75}, {&(0x7f000001e580)=""/225, 0xe1}, {&(0x7f000001e700)=""/63, 0x3f}, {&(0x7f000001e740)=""/39, 0x27}], 0x5}, 0x0) sendmsg$kcm(r6, &(0x7f000001fc80)={&(0x7f000001e840)=@can, 0x80, &(0x7f000001eb40)=[{0x0}], 0x1}, 0x1) openat$cgroup_ro(r5, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) 23:30:49 executing program 5: r0 = socket(0x10, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000280)={0x0, 0x7, 0xa, [0x10001, 0x9, 0x4, 0xfffffffffffffffc, 0x4e, 0x81, 0x80000000800, 0x2, 0x4, 0x3ff]}, &(0x7f00000002c0)=0x1c) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={r1, @in={{0x2, 0x4e23, @remote}}, 0x8}, &(0x7f0000000140)=0x90) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x20000, 0x0) r4 = fcntl$dupfd(r0, 0x406, r0) ioctl$KVM_HYPERV_EVENTFD(r3, 0x4018aebd, &(0x7f0000000240)={0x0, r4}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000180)={r2, 0x0, 0x0, 0x3, 0x8}, &(0x7f00000001c0)=0x18) ioctl$sock_ifreq(r0, 0x89f4, &(0x7f0000000040)={'sit0\x00\x00\x00?\x00', @ifru_hwaddr=@link_local}) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000000)=[0x4, 0x4], 0x2) [ 593.987593][T11030] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 23:30:49 executing program 0: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r0) syz_mount_image$bfs(&(0x7f00000001c0)='bfs\x00', &(0x7f0000000240)='./file0\x00', 0x7fff, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000280)="695f5bbe5d03492fd4271b626a4dc459f32b610814ab192c489361be5ce216736041b927e84c32e4609ca2dd91761c3243452fb8b521e8c0a079eb69d1a751447670bb60de9a690d48d00f37c01494e659ffa9c6b5b0cf019722d9dfea97d907af7382e88ddcc25b87a980cca4b09adf8d4d217a9c8f6f1b71693d801c319c6459eb32c2da9c581af85e515357c570155923664122abb701016d3786fab5620d7a14c39d0ae69bf4", 0xa8, 0x7}, {&(0x7f0000000340)="fdbc942038b00217649f847d2c6e2ee4c9a8d1ee00f121dccb1cd7f3440ec68b7e0ff1430523e7cd31b5c8382af620ef090ad2d913c20a2ee22184e0478f2c26ee5e61ad4410acda74f35544dabb2117cd88ba4ef5bc20f86e3c4d2f91699dd505113533661f799a7cd41ed5eefa80d7c48109d17b4ce6655529ee933774be86d42dde15d191fb76b3b9e76d48f29e9d3b0622ab3739d8f9d05ad23324c3d3f1abacac319d78f08fb3d359070197a0a7c2470c9c372a03e3dec235b484fe3d6657d3171bb439dca690aeb4f7ddb32a95ba0edb489e60a2145ee84208def18f1a20f1ab4a1c7f8a834466", 0xea, 0xe02}, {&(0x7f0000000440)="fc1c28", 0x3, 0x1}, {&(0x7f0000000480)="70caf07344363210c004711109c916f594deb2561a923aafb41051ea9e98d8311b771f803736651fdc7ba3909b9f111d", 0x30}, {&(0x7f00000004c0)="a1ff25c4b9a55b37f8aa74e38808bf8c41cd26f1583e9ad426047a478c89de13b17b25e12be3f573a6c5a4bfb36f887f0e9e9c872788b2cd0475dfab91680421acaf9044c58fd5d177c04b5b462b527a1ddcc728ebb1b28a150b2cc79d3c9681a5c050202755991014c8c08673a478a16b495d8d0848e50cae117b5b0b086a8fa0c22064dbefbc714f5bf99beea815b0e343302c7123f3106715b0c7998c3e03006cc0072c50918953cf5dd8ff3d93fdc04962b5d8d4abda8542d39191ac0c29b6e9", 0xc2, 0x1}], 0x100000, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r0}) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) ioctl$int_out(r2, 0x0, &(0x7f0000000700)) ioctl$DRM_IOCTL_RM_MAP(r2, 0x4028641b, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x400, 0x0, 0x8, &(0x7f0000ffd000/0x3000)=nil}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000640)={0x100000000, 0x3, 0x1, 0x9, 0x4d60}, 0x14) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000740)) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000180), &(0x7f0000000680)=0x4) ioctl$SG_GET_SG_TABLESIZE(r2, 0x227f, &(0x7f00000006c0)) 23:30:49 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, 0x0, &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 594.100109][T11040] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 23:30:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = socket$inet(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}, 0x10) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000880)="240000000f0007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000140)="60ba4655d1587e5c5bd962910352e8badb6e0a489bcf4e6fcb17fbd5516a8c0c7b06f7dba9dacac53002dda58069910b025940f157da84fa5495be7d7c4ff913df86b2bcf7d03613426f7183d4eddf589e32b3798c193ffce8b1b69e687367a2ba66aee727306164caec9d9830d837c824be5b58afc4b3753dcb909fe20286f86c21acb22bf6ad0643200a2e1cc330e397c95bf44d3f4fb8deff6457566590c4781af9ee4175246244db5523f74922c78bdfd3b82857768c3fc0f7a3d414a2c3c31d822a7bcb48451c8af6235ff0defc3e6538c24c2d1fb0f2fe6a290eea41654df865b02576a13547eca3bfeb7ca094bc5b64f960002da2b2552e15e44494ee") 23:30:50 executing program 5: r0 = pkey_alloc(0x0, 0x2) pkey_free(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000280)=r2) ioctl$TIOCGWINSZ(r2, 0x5413, &(0x7f0000000100)) writev(r3, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) fallocate(r1, 0x13, 0x1, 0x8) r5 = socket$inet6(0xa, 0x8000008000080003, 0x5) r6 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0xfffffffffffffe6b, &(0x7f00000000c0)={&(0x7f0000000100)=@bridge_setlink={0xff06, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r7}, [@IFLA_AF_SPEC={0x8, 0xc, [{0x4}]}]}, 0xff06}}, 0x0) close(r4) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x80000005, 0x2) 23:30:50 executing program 0: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = shmget(0x2, 0x3000, 0x400, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_LOCK(r1, 0xb) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000180)) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r0}) [ 594.532524][T11067] bridge0: port 1(bridge_slave_0) entered blocking state [ 594.539736][T11067] bridge0: port 1(bridge_slave_0) entered forwarding state 23:30:50 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80800, 0x4) stat(&(0x7f0000000840)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000008c0)) mkdir(&(0x7f0000000700)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount$bpf(0x0, &(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000500)='bpf\x00', 0x0, 0x0) symlink(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') stat(&(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000240), &(0x7f0000000440)=0x8) r2 = creat(&(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x44) ioctl$VIDIOC_S_JPEGCOMP(r2, 0x408c563e, &(0x7f0000000780)={0x38, 0x2, 0x1d, "00f1586b9cd73b86589072c898db15a51380c0c2096966993f32dbd0ecd36b98c07c4568dc998f49aee311b4d28435e32e23dbd7ab0ab209ec97ee68", 0x9, "2fcd5d70fba3c63e2c24c5dc660c1ff64651a2b6dde8e4bf328985a80adea684945e78465f8987dfb59d32973615a6d2f877cca515ec8d84bd71ad87"}) syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f0000000680)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x40, 0x1, &(0x7f0000000280)=[{&(0x7f0000000340)="58e48b0fc48e05092425fb8b0936791ad8a7a8fbc016c8327fa9e13d582482d47031e102b6b1733d390200997d0ae16ebd6fe5e4dbd0480eb9f196bf619f2635f2a81ed24a98991f161401fb7a56715ecefa834f74296bd30ec2f8bb9a91d9b55811da4a632ef0ec079669c256101b0fbbac9ca4fb977c03eb27091c10919f7fdcca9024ac020ea176b9c770fc", 0x8d, 0x200}], 0x822000, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYRESOCT=r2, @ANYRES16=r1, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES64=r0, @ANYPTR64, @ANYRES32=r1, @ANYPTR, @ANYRESDEC=r0], @ANYRES16]]) 23:30:50 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, 0x0, &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:30:50 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x16835, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 594.651315][T11060] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 23:30:50 executing program 0: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) pkey_alloc(0x0, 0x3) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r0}) [ 594.769391][T11070] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 23:30:50 executing program 3: r0 = socket$inet6(0xa, 0xfffffffffffffffc, 0x401) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x2, 0x2) ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104320, &(0x7f00000001c0)={0x5, &(0x7f0000000100)="b208107e827b06b19e2f6108a3fd6ff7affcb5ce29f958539fc5dfac1b3710a95c6c2a6a44803e87ef1f817bebf629804103f790268acfc928f4e1db6cad4ff21527a9ec29da752bc7cfae58f507a2822574a04fdcf8aa2737e1deadb3168fce48dc081bbf06253a8058fd7ceb86957aebeefe3a9d9cab1ac26b20844a086834f95b62cf2d727fbe98e341385e3a6197c3747cc23a1d72bef440011978b6ecc385f8657f8eb2286e0c5242d569474fde174c0db6eb62"}) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000400)={0x0, 0x8000000000}, 0x8) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000500)={0x1f, 0x8001, [0x0, 0x7fff, 0xd, 0x3, 0x5], 0x8}) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f00000007c0)={'nat\x00'}, &(0x7f00000005c0)=0x54) recvmsg(0xffffffffffffffff, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x11, 0x200000000000002, 0x300) socket$kcm(0x10, 0x5, 0x10) sendmsg$kcm(r4, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) r5 = socket$kcm(0x29, 0x1, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000600)=""/222, 0xde}, {&(0x7f0000000a00)=""/203, 0xcb}, {&(0x7f0000000900)=""/116, 0x74}], 0x3, &(0x7f0000000480)=""/62, 0x3e}, 0x40) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x80001) socket$kcm(0x2b, 0x200000000000001, 0x0) r7 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000000), 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000d00)={0x0, 0x3, 0x7f, 0x8, 0x78, 0xee}, &(0x7f0000000d40)=0x14) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000d80)={0x8, 0xf62, 0x8009, 0x7, 0x9, 0x3, 0x3, 0x240000000, r8}, 0x20) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000f80)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f0000000840)=0xe8) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000c00)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000008c0)=0xe8) mount$fuseblk(&(0x7f0000000440)='/dev/loop0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='fuseblk\x00', 0x8, &(0x7f0000000e40)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=r9, @ANYBLOB='=\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=r10, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6d61785f726561643d3078303030303030303030303030303030352c626c6b73697a653d3078303030303030303030303030303830302c64656661756c745f7065726d697373696f6e732c736d61636b6673726f6f740200000000000000643e724632b4456cc9900bf85036711b", @ANYRESDEC=r11, @ANYBLOB=',dont_hash,func=BPRM_CHECK,\x00']) syz_extract_tcp_res(&(0x7f0000000600), 0x809, 0x7) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f00000004c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000200), 0xffffffffffffffff, 0x1}}, 0x18) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) ioctl$VIDIOC_DECODER_CMD(r2, 0xc0485660, &(0x7f0000000040)={0x0, 0x1, @start={0x4}}) 23:30:50 executing program 1: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x400000, 0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000080)=0x4, 0x4) readv(r0, &(0x7f00000001c0), 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") fstatfs(r1, &(0x7f00000000c0)=""/225) r2 = socket$inet(0x2, 0x3, 0x2) getsockopt(r2, 0x0, 0xce, 0x0, 0x0) 23:30:50 executing program 0: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) clone(0x100000, &(0x7f0000000240)="c1938ff4ee9dd56e270979e0450cfdbaccf266c9552e1f3e14844bbee9acccf941b63bf98b284a81a72e7f3443756c2f55312b954940c29935c263b799db38da4faa83168c903e6e89093a3ff482b0ddb7f1261f7aa4bf2461974999591b055b68cfeeeadda6ae5dcffe77207aee9a988427f10b64faab75cdd5b919bd870bf86ead77ed803dc24a851a469c6b251c771ad4d4bfbcb829314abd91caec63c443cf500c614a907ea967a0b563c941126e89995b4a82474817f5d0de7db9c3c306104425ef727c56d0799c85bc", &(0x7f0000000100), &(0x7f0000000180), &(0x7f0000000340)="86291c0a366a5218200446e6185aff5cc7b74a2a332d7eb689774ed31f5ff26dfa6ac358516ee77142261acb63fe82418019a90f85c7078e561c8efb54fe2ce96618d3e3a9729710272e3e99eb6835b276664a515eedac") mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000480)=@keyring={'key_or_keyring:', r0}) 23:30:50 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, 0x0, &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:30:51 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x16836, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 595.272541][T11106] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 23:30:51 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = dup2(r1, r1) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r3, 0x80045700, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x0, [0x4b564d05], [0xc1]}) 23:30:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r0 = mq_open(&(0x7f0000112000)='eth0\x00', 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) futex(0xfffffffffffffffe, 0x8b, 0x0, &(0x7f0000000080)={r1, r2+30000000}, &(0x7f00000000c0)=0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@initdev}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) close(r0) 23:30:51 executing program 0: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r0) r2 = accept(0xffffffffffffffff, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @remote}}, &(0x7f0000000100)=0x80) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f00000028c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="46000000d73e3393558d6f9d8c5218b6801f887f87633450d1d342a92754fbd5a904562400044a3256a5ea6da5663e30ae2061f18d89a5046964f5ceb9fd6dd6c4d0e69cb19013a8d6f3a3c1d2f49fac2c3047685f33d69573fb0318c60a37cf8260a8237deb2843e2923f174af9ee50996eb8"], &(0x7f00000027c0)=0x4e) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000002800)={r3, 0xf, "00eab5c37fd909064d908fdd44f503"}, &(0x7f0000002840)=0x17) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000240)='cpusetcgroup\x00'}, 0x10) preadv(r4, &(0x7f0000002680)=[{&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/4096, 0x1000}, {&(0x7f00000022c0)=""/70, 0x46}, {&(0x7f0000002340)=""/109, 0x6d}, {&(0x7f00000023c0)=""/128, 0x80}, {&(0x7f0000002440)=""/249, 0xf9}, {&(0x7f0000002540)=""/81, 0x51}, {&(0x7f00000025c0)=""/58, 0x3a}, {&(0x7f0000002600)=""/90, 0x5a}], 0x9, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r0}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000002880)={r2}) 23:30:51 executing program 1: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)) sendto(0xffffffffffffffff, 0x0, 0x0, 0x4000000, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) syz_open_dev$loop(&(0x7f0000000440)='/dev/loop#\x00', 0x2, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) msync(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000400)='./file0\x00', 0x4) syz_emit_ethernet(0x3e, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa0800450000300000000000009078ac2314bbac1414110c04037800000000450000000000000000020000ac2314aaac141400"], 0x0) 23:30:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x400000, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000000, 0x32812, r1, 0x8000000) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000080)='bcsf0\x00') prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffa000/0x3000)=nil) prctl$PR_SET_MM(0x23, 0xa, &(0x7f0000ffc000/0x4000)=nil) 23:30:51 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r0) r1 = dup(r0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) timer_create(0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0xc10496740acafe84) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/fscreate\x00', 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x165) recvmmsg(r1, &(0x7f0000009f80), 0x0, 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x1) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffd) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0x202, 0x4) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffff9) keyctl$clear(0x7, 0x0) prctl$PR_GET_NO_NEW_PRIVS(0x27) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ftruncate(r2, 0x80003) sendfile(r0, r2, &(0x7f00000000c0), 0x8000fffffffe) 23:30:51 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x16837, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 595.973707][T11108] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 23:30:51 executing program 3: r0 = socket$inet6(0xa, 0xfffffffffffffffc, 0x401) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x2, 0x2) ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104320, &(0x7f00000001c0)={0x5, &(0x7f0000000100)="b208107e827b06b19e2f6108a3fd6ff7affcb5ce29f958539fc5dfac1b3710a95c6c2a6a44803e87ef1f817bebf629804103f790268acfc928f4e1db6cad4ff21527a9ec29da752bc7cfae58f507a2822574a04fdcf8aa2737e1deadb3168fce48dc081bbf06253a8058fd7ceb86957aebeefe3a9d9cab1ac26b20844a086834f95b62cf2d727fbe98e341385e3a6197c3747cc23a1d72bef440011978b6ecc385f8657f8eb2286e0c5242d569474fde174c0db6eb62"}) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000400)={0x0, 0x8000000000}, 0x8) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000500)={0x1f, 0x8001, [0x0, 0x7fff, 0xd, 0x3, 0x5], 0x8}) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f00000007c0)={'nat\x00'}, &(0x7f00000005c0)=0x54) recvmsg(0xffffffffffffffff, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x11, 0x200000000000002, 0x300) socket$kcm(0x10, 0x5, 0x10) sendmsg$kcm(r4, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) r5 = socket$kcm(0x29, 0x1, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000600)=""/222, 0xde}, {&(0x7f0000000a00)=""/203, 0xcb}, {&(0x7f0000000900)=""/116, 0x74}], 0x3, &(0x7f0000000480)=""/62, 0x3e}, 0x40) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x80001) socket$kcm(0x2b, 0x200000000000001, 0x0) r7 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000000), 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000d00)={0x0, 0x3, 0x7f, 0x8, 0x78, 0xee}, &(0x7f0000000d40)=0x14) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000d80)={0x8, 0xf62, 0x8009, 0x7, 0x9, 0x3, 0x3, 0x240000000, r8}, 0x20) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000f80)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f0000000840)=0xe8) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000c00)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000008c0)=0xe8) mount$fuseblk(&(0x7f0000000440)='/dev/loop0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='fuseblk\x00', 0x8, &(0x7f0000000e40)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=r9, @ANYBLOB='=\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=r10, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c6d61785f726561643d3078303030303030303030303030303030352c626c6b73697a653d3078303030303030303030303030303830302c64656661756c745f7065726d697373696f6e732c736d61636b6673726f6f740200000000000000643e724632b4456cc9900bf85036711b", @ANYRESDEC=r11, @ANYBLOB=',dont_hash,func=BPRM_CHECK,\x00']) syz_extract_tcp_res(&(0x7f0000000600), 0x809, 0x7) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f00000004c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000200), 0xffffffffffffffff, 0x1}}, 0x18) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) ioctl$VIDIOC_DECODER_CMD(r2, 0xc0485660, &(0x7f0000000040)={0x0, 0x1, @start={0x4}}) 23:30:51 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:30:51 executing program 0: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r0}) 23:30:51 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x301000, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000002c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="99000000e78bd2e228b39857748502b740f32f031b9f05b5e4eda5981a28e407d6d41bb58f1103cdc346de748e8ca510bd845ff0662d5411ce9c3bf02b9860c87c5ca165dbc3a791791d8f642ec92175a42ef044b0cb300a1c6e022586e17551c8561f9ae79e7284d8ce2c723365691ed1ebea005ad42a2aa5b1712ef8e4b83c235fb4b377140786397e9774f50900"/157], &(0x7f0000000380)=0xa1) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000003c0)={0x9, 0xfff, 0x0, 0x1, 0x96, 0x5, 0x9, 0x80000000, r2}, 0x20) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = accept(0xffffffffffffff9c, &(0x7f0000000140)=@nfc_llcp, &(0x7f0000000080)=0x80) ioctl$SIOCX25GCALLUSERDATA(r1, 0x89e4, &(0x7f00000001c0)={0x20000000014, "958b3110b16407632fcac80d82088ee57239542e95a37b39c3f671937f628f9bf8df108e5e235125452e17aae4ef68c5914a7909478ec7e00b6fc6bc382e230447bb40cf505bce4b254bf7c4760fc9ea5651f095e2e5b2dccbc2ab4661311bc22cd0596ca90376186c9ba16fe71c4efeafa21d7838a961472a41d83b1c0bb01f"}) connect$pptp(r4, &(0x7f0000000400)={0x18, 0x2, {0x0, @multicast2}}, 0x1e) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000011000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, &(0x7f0000000000)="0f20c06635000000400f22c00f218466b9800000c00f326635000100000f30dc880b00baf80c66b8d826e88f66efbafc0c66b80080000066eff0102e0f000f1bde0f01c80fc77df1baa000b8e100ef", 0x4f}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) [ 596.357451][T11162] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 23:30:52 executing program 0: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000180)='asymmetric\x00', &(0x7f0000000000)=@secondary='builtin_and_secondary_trusted\x00') 23:30:52 executing program 1: r0 = syz_open_dev$cec(&(0x7f00000004c0)='/dev/cec#\x00', 0x1, 0x2) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000500)={{{@in=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000700)=0xe8) sendmsg$can_bcm(r0, &(0x7f0000000840)={&(0x7f0000000740)={0x1d, r1}, 0x10, &(0x7f0000000800)={&(0x7f0000000780)={0x6, 0x100, 0x10000, {}, {}, {0x1, 0x9, 0x100000000, 0x5}, 0x1, @can={{0x0, 0x2, 0x8, 0x81}, 0x0, 0x3, 0x0, 0x0, "b12e22114e579d8e"}}, 0x48}, 0x1, 0x0, 0x0, 0x4010}, 0x4000010) r2 = syz_open_dev$usb(0x0, 0x0, 0x0) getsockopt$sock_timeval(r2, 0x1, 0x0, 0x0, &(0x7f0000000280)) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49e1}}], 0x2, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) getsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x3f, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000180)=0x0) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000000100)=r3) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000140)) ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000002c0)=0x0) ptrace$peek(0x1, r5, &(0x7f0000000400)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000001c0)=0x0) ptrace$setregs(0xffffffffffffffff, r6, 0x10000000c5, &(0x7f0000000240)="b200000000000000000000000000006e42a4f4b413bbb86e003c4ef7809d0700000000") ioctl$KVM_GET_REGS(r2, 0x8090ae81, &(0x7f0000000640)) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x2000, 0x0) setitimer(0x1, 0x0, &(0x7f0000000440)) r7 = accept$alg(r4, 0x0, 0x0) getsockname(r7, &(0x7f0000000380)=@tipc, &(0x7f0000000040)=0x80) time(&(0x7f0000000880)) recvmmsg(r7, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000000000)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1, &(0x7f00000011c0)=""/157, 0xffffffffffffff99}}], 0x1, 0xfffffffffffffffc, 0x0) [ 596.720524][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 596.726424][ C0] protocol 88fb is buggy, dev hsr_slave_1 23:30:52 executing program 0: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r0}) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) prctl$PR_MCE_KILL(0x21, 0x1, 0x0) getpeername$netlink(r2, &(0x7f0000000240), &(0x7f0000000280)=0xc) getsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000180)=0x3, &(0x7f00000001c0)=0x1) r3 = gettid() getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000014c0)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f00000015c0)=0xe8) stat(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r2, &(0x7f0000001700)={&(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000000340)="58f11b6186de4b044098f442690d99cdffa075ed4a5d7efb13b88dd336a0e191ce36961ae8b9beb1c889c12dc9c89142ec6f457cd37e671547ef1e0de8db6d8f0ecc6c99fa93f7b3fe72660b93f9758ec2aa4f05d79b7c2d942c2ba48cbd8a09af0f6ecb897486da5759896f1cbb4196ab76e032e60da697f39fbacd1a47d89916cf7cc48d78509c0ab8a845f2b79afe21", 0x91}, {&(0x7f0000000400)="26d8b6b1419c213e1574e498d3b2caf438f19bda0592f09f3265ed6ac9157065f22355782ff39ce52fcf06b1e226b97894d4f7b2c52bea8283497d6d30aceeb05fbf804b593facf7991269f4a48bb384aa8c0fbb70fcee0aa7cb6ed1cfac51a6d1db33a14d55f9b6d8372fd0b83baa33d461a3ab2be363a14216bf4fd87af788792d5e74d739219b945355d37777fb577b11d44c6ac01e5bae4b2ece4f0a46eeef929ebf84c26090b0739bf2ff7c8a181896d75e4991b0fa53bf1aa0236459db3787e50f6a7f91ef8a1a5caade947d92afffef77023d3182c98cc1d43c05b458392edbc50a0679ea61a944e69a14dbd501a00a146eb770a069cbd8eb42ecc2ff771b885186bf7b281efcbee78eb017b03f2a50d8a77bd5c6a81add0ced443ce2b35afec9304730f45651c2902c9c0910121f539de08e27727aa2cb0acaa831f0481735a0d5421613c565dbbc857aa6dd00f82d39c425bd10b403a782d4318df2a91e48504c2182d31567576b1aedfe55b61787a1282c27969a36b9f563c6efa811b03b85dde424044b515a8d1cfad5d8443b58f52a3a7119ccef79db03a49f33eff9fe6a957e2da88b20a95515274bb2ae942b6c9efd6b952f32958fcdaba63e6fdc4a3cb87887e5a3705073923ec5e0ba828b26a85ec2fbfc24e75c4a5482c8f02dfa023090106722aa1e900ad31f9c11f7dfa34ecc3443b2f2ec3156e090af5468b652048cc4587bd65be6b7ae86bd926ece86c4edca0f21938a8192deb5ef4bbb57e405d220618432238c1c5b0fc65639355622b9b74daf97e76d070ccff01db8b6473c9a5b41ba533ce1d9466dbe6999b43f597d8708ca5f63fcf7f1c4cdb6b7aa6ed5e563d385989b7b349f25c5e344f84ee23cc0b43903d221818a52f0780b90b695c5115665a1e89b1b1d3f847d086201b0c866a74dc8bf8b3a0aab3497c587b135d7320a2b35e41e66b6294abfffb46f668388d573f9f2790267ce1c8ee23579c298b444cd5f034eca77df7a9f1387751f1b1ac9fb62bf28ee8ac63e0d18f66360cafa564f51f75fd345acfdd9c47a65c34eecbfb250796d9a51c10f2fafb66466af5ce5b74ee5ecade0f8a9452bc600e3b486181795777e4a118abd44787e380655dc552a7e3d6915107164ee3b335a223655e9ed46066092d0b349f531ff3f5c9ca319f7f47e8282e3e1d09127cd25feac3bc50d933e7ece9c46e4d9f1ea3affd4a6a6058847f2ad0ea103f8069051eaaaac0cee63a589bf7181d920e10e289613311605fb93febe8a9b640fcca87045bc388cf831abb3444d0e879bb3a93743c6db2c0d29854405e1e8ac2dc5ff4bd7f3e7e60dd3b8b84ff4a8d268084f0190e9579e3ccb640d6700bc843415835ea5e92e4e7a86546714ba20f02bdb98655a4420651b56f0db23c3620b7a650e219dd1e3c646c82dfb0373789bf7d82f0fe3f0f677df5ca68f95e60470a35b1c5561d1458c174cddb297541f68858f687f786b99298868080abc0ff1443fd09e2796c851d87911da88be97d86292e93d63ea339d77930bd61133b26dc540d4d44e0c91df560ce325d463139235394779d2b1c305b69c6879f62c5559d853a878ae27c9e4c7398f09d9d163feedbe4feb95240a0c303e11f0c1e4cf38d713553731e24e60e0aeed699b0a8d7bb81dc613e50ba0fdf2df351285fab10b78214ff202b5cbcfa68c71267c36caae9e63d734d4313ac66d7fa94eed5775b98c176156323e519d90a10eece698b9f13590c4cc1823b64094ef62227084533e9ef98ddc492ec1ec6e2edbe12ae6cef8fad0021743f9cfdc0ffc2ae694b12cbd389bab4796936bc66970d2d5a9f663039252d8d4deed151512eb1a9ba82a77cfbe7b0d05879b9334958c4891f694834eff5d3633fef1901ea02a7171aecd6a94b2260c4e01b2d7f250c80d797163f5c19c75f7383bfd687696a5f1d0d3b55cbcd761ff475d8638dc1d4c14e6c307b6129e50d2e07e04031e0e4677f91fe942c8ed28f1aa0dcc79f3fa764572829198182d09129594cd856757d42c70eb7eeb5d0ce0ebec129246660a851eb3e1214096e5690b8af1d75b71d42fd363d38bd7cda6a5f4291e7fde46b4d024320d5fd84fda6d2689ec456f68a38c350caa70331e0101393511d45b4238c59a1566bd93dbd951a3c51f0f0aeef997b31fe70bce7a26c0cf4eee36e0b6eae3b4e336885aff2640ebadd87fea0a0234d5e03ca9b3e837a8d53779c81b6490994081af624b67fa9914735fcbbbf850ec7d24b4baf68ec9646c58d0d0d5576468586c742246068b8a561b31f2a94ed2ac6f9c0e58676565f7914c9a0c43f58de383a46827d4c44266c97fc0c920626585551ea3d3f9fb526eeff9774655dc97202100b7b6c2a45bd6665594406af187054d57a534fe5e5902de60a125addc733bfa00d3fe102196535abd9ed697fd0273ff14e0367b18e98de2b9b2bbbb23ab6438ad353789c48cf690894d288b0e85c6c0e617dd97b06330a5576b3aa5501691f5d01738ebeb3cc8151e41b2d24e226dd8201018c90bfc2944a57aebdfb07a6abe3055b1ba6ddefef4a47f28fd4d359431a13aac42e61687961deb291d7bab1121bb78f69be978fc74ed5a2f08b053f3bbb10602a0e96187755da121b82a262bcda70a83b2f15fcb7bb051a0ade5548f4fec1da1e07ea137d1ecaf9db813bfa4821893715bf9b73ecb7039b02256e1a87e2bcfdff693404f6c511a53feb6eead174cb22622f85889a1eeeb0865f5070991cfcd224b74cb672567086b33bab9947ebebb9af59bd3503b195e0a9c4481650bcdb62fbbe883969bb843d6b2b44a165ac31c97491969bc6e60bdb6dac969235d5897770076ed7ea09e55c61b8585cb384377aff5c5b976c63924f1a1fd254201e04f0396f7cc28b427b08818ddd44021ba4150aeaf7507b4357cd65db3e04ece92bb2d7e6012d22712235e6fb11e5ac63f0013fb1d543c1083625b91c007e11ecc2cac159cebb23286c2b5724176ee09226f9ade7a3a044c956dac0fb1c1da4bb4b3d9fed8b12e1969e7325797c80972867578a006bf8ce5a96b9aa7bb479485bec2475a93a28c7545385515b3ef222a2e8d1a47f02d54c3cc1dd64c4ea26bd1cc06a8b5eb5dc5e272bfc15fca5e5f7505f21428d7fe22835759b1ba056728318d1723ff5b93659dd626a2ff2a27040973f48af4fd4e4c155b816438183aa034fd9615929b8759b5e5a7139271e98a23150e591c5b4d53d335dfc0b7a28bd223de77760e4ec798d6685fd1cd15381f43d4df60242c4b26e552fd48861b50d35401f0bc68983d57c166f138f9081819fb03c944f20b57a25c743baf6cf578de40de1c98c45e4dfa947cbd08aca752fcb235041797526400d07339950495af4e0e193a39a5daa47faac7814c5d8a1b800aa1666e47ddd7a5d39992e4808d2cfaaaad32b75fb78d56aad1d3891553cc6950fdb55d31d38f167acf75400668a6aad331312e03a878a2b164edd500737a6f13dc50b99a14b6d87534136ca6b459ad4c93a6d292ca0fd00e32f411c479aae941c5ff721cb7995ed5d68749f8e1d3a630d853eb1d344dbb9e2faf7f1a27c551ece624b90eeb252847a1ed0c089a7b7b5af1375acde8c272bbdca1127a71370a91de786d12e19f03b13572fc154f7a43edf9049b48a7c3e6de2929b0fcd032ab9671993ad5d255abb87f1ccb02632c7571927bc9bbdf89f741b23b5635f2c1b122b88e115d7ed41333b86e5f05d1ea53dd01389a0f647a182881fb5272d8d5d0085069e9e91be258b4269ede003dd9e912c6cee5cf59b0feb8f7f702969ee7f239abc02dd4b4f49ed90d2c644a1d34ea357ca9cbf91c85c19d3d85e8817c57afcc43cb0fa93eadc5381e11fd86c24ec524c7b64e924b43d0425c666a046ebdcc33c10b46d85256f47a7acc9bcd0c0e2fa8030c5906be430ea40d2c9cfce703fdd4bef29adb4a881087bb06fccebc93971df38fdaa46bb0079b07624dd767f9f0804c055f32cc0b46c9148d5b17e19a6897a80178c8a5463cd9d8d772263d5484b7e184f89897f4d942608e61c9367066a92d872bd65d2b0b915f92af3decee4f8b7fec982408335d2c2072f3f9c1c5e48f992e9c602516ab7b938a3c743ef12d28bc615cc75b8a606a26c9816dc3ac2ad2f90cd2822673a3bea65f98e71856d4eddb0bc0f026fc0c73f3a664f80e7d27d05544848c22ae881a9615d90c9c1ae61f3994411d5d1d5535d6d2897d30ca65c8077c71e94dbd578dba6b6e87a24258668b35fd2b69f11669d540e7f83069687966796bfe66a801c64d03e2ee99755f2c5e603e2c95d5bedd194e3205a292d62e05ecf64254ed3a757490066f482ca7746ead29ee5b44253bae74090230144683271f972a429c1979bd2652d5c2cbdb2e961b1e2f61041c136121d054f9e3845c0acca22de6529209f2dfa8898f885d4dcee69516fb8673ac7f6c9b49b8674940c2dab981e77bee39ce32ed6431cb56c20807407d0029c8e1ee8fa08bef82de272d57a9048a42698994d7c6529f6e439b6b33e2a4d7d22b22db7161fb138ec76768a5c6a0791d3dbfae4adc57b9bf9fdf5e67a1026136e24189f61babf7eff7e758d3a4a5987645d7312944625201d3b531f1658ccca6727e2b996bab608c541f34700457db68aa0d61d7d786df23a21439944e1ff204810ef2b24dff2384aadcd6295a5ab15773fb6301d0ae5c515f1afa149634f0192659867217c9bd0d516f2bbc4075322b8681a2197978bffd48088f6df8e9803617944659f35ee4f173de3af021dd7370a82940fd1db757f7b8424fa5a8ecb5f7d94d0feeae651d26a651dda88b00c702217a0fcc430243a8e79645220d868c2e4402c7294acfff9a63ffc481cfe6c43c02a0b961b6dedf733ac0ab25f040f96384c917f6a0fdc306187123970940cfe2638bb48aae4eea6319475400c9cfd3d74a5e32a2449d1c9d4f390efac8c7190db275cbc56a5a9d2518b449b49aff30f8e16ca1b296080e7cd3ccc203738cff6f6518ddc38083013579302af5602a53e8db9eb4c5cfe60307f4f858be2170ce7a1f1824ccbfe91a09a4e4701846b778078d49cded7e0079c11a66966bfee4f147a7e1c4f4f9b90b1674dca429e8a96748955bc28911a9e12776af81fb6c5e9282fc659728488dd3431ed23f791cb7b3324ec1787202bf492d26bd2f46e8fcdaf06c4dde165ef692c59b14ff0797e645ec3ed0ee19ce7416892c0fb5dd4c4f23a5a7022919ff0c9adac8f91ae2b131eae05064c189b5b0c263d0458d4d52d7938b6c77a9c07f2f852154e658b8ad05c6438fe2f74fd367b533a3dc210d82b14ac110189020067669736057404f78c8f0e1eea1056c505adc7c4c450cf3b925419a8275436705367752183f00a5a84a5e2b92408a3fbf9411c99de2d5f095da4891a889e9911d89a6a3e65360fac182a7b0bba80e3f77b6d911f0fcb715bdde2ebedebe72124fd0024c774c57fcf8ca8a64c5d27a2fa05a466035a94ca980c4121156f633990ff1cd833cb043d01b5e631390ef17e5286b117e1ff5fb99d3ce0f262db1c348215e11a94820d2c57ad8160149f3c0f5df1c04e334c6d13f7cc912cb6ee0ea67918e715f92bc7dadc7cd853a39ed5c1c77e3fd0eb903e93cbf24a1920a9061de400ca77aa620ea363a08ce6cd97c6657259d552c72318fe3b97508e8bd9faf3b51170f9dc9e9ff2e940edf8fc4d742dbef0610cc7224d810353c05f381a702bc4a30cd163cf86bfd34b289c6", 0x1000}, {&(0x7f0000001400)="e365c93d8fc33bd60ae5772dc2b646cb388da9f72b10f1e39fbf69b193efdb2b2e2f3927f5ddf54e28c2da905926876e799914dcf2c639b15214eed70f2a8071091b5e4dd6193a4fcb89f73aef7ca296fab3a290bf91609eadd4d4adedb00bbc038013f8c27c946e6441e9", 0x6b}], 0x3, &(0x7f00000016c0)=ANY=[@ANYBLOB="100000000000000001000000010000001c000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="00bed800"], 0x30}, 0x4c044) 23:30:52 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x16838, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:30:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = creat(&(0x7f0000000000)='./file0\x00', 0xb1) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000080), 0x4) r2 = inotify_init1(0x0) preadv(r0, &(0x7f00000004c0)=[{&(0x7f00000000c0)=""/77, 0x4d}, {&(0x7f0000000140)=""/158, 0x9e}, {&(0x7f0000000200)=""/125, 0x7d}, {&(0x7f0000000280)=""/60, 0x3c}, {&(0x7f00000002c0)=""/82, 0x52}, {&(0x7f0000000340)=""/20, 0x14}, {&(0x7f0000000380)=""/210, 0xd2}, {&(0x7f0000000480)=""/6, 0x6}], 0x8, 0x0) fcntl$getownex(r2, 0x10, &(0x7f000045fff8)) 23:30:52 executing program 0: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000100)={0x7, 0x66}) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r1}) socket$inet(0x2, 0xa, 0x45e28e92) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) [ 597.031136][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 597.037539][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 597.158995][T11195] syz-executor.1 calls setitimer() with new_value NULL pointer. Misfeature support will be removed 23:30:52 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:30:52 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000240)={0x0, 'ip_vti0\x00', 0x1}, 0x18) r1 = socket$kcm(0x10, 0x3, 0x10) r2 = dup(r1) unshare(0x10000000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r2, &(0x7f0000000540)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000500)={&(0x7f00000003c0)=ANY=[@ANYBLOB="14010000", @ANYRES16=r3, @ANYBLOB="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"], 0x114}, 0x1, 0x0, 0x0, 0x4000000}, 0x880) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000026000500d25a80648c6394f20c31d2001000060000000000000082c137153e37173cbf3858cd4abffeb5", 0x2e}], 0x1}, 0x0) [ 597.202066][T11206] syz-executor.0 uses obsolete (PF_INET,SOCK_PACKET) 23:30:53 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f0000000280)='IPVS\x00', 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") r4 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2a482) write$binfmt_script(r4, &(0x7f00000000c0)={'#! ', './file0', [], 0xa, "34f98770c62f9fa3b8e72c0a3497734acde90647922722b4207be3c7fb91f1f7263dbe89308f07796aa458f9ee77ff2e4f"}, 0x3c) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x8000000000044000) io_setup(0x0, &(0x7f0000000240)=0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000680)) ioctl$NBD_SET_SOCK(r4, 0xab00, r4) io_submit(r7, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000, 0x407000}]) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000640), 0x4) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) ioctl$LOOP_CLR_FD(r1, 0x4c01) open(&(0x7f0000000600)='./bus\x00', 0x0, 0x140) close(r1) syz_genetlink_get_family_id$team(&(0x7f0000000740)='team\x00') 23:30:53 executing program 0: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = syz_open_dev$audion(&(0x7f00000004c0)='/dev/audio#\x00', 0x7, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000500)={0x0, 0xffffffffffffa1f2, 0x1}) r2 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x200, 0x3) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000440)={0x0, 0x5, 0x30}, &(0x7f0000000480)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000380)={r3, 0x3b, 0xb2, [0x9, 0x8caf]}, &(0x7f00000003c0)=0x60529dd8cfcf17ef) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000400)=@assoc_value={r4, 0x579}, 0x8) r5 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x101, 0x200000) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f00000001c0)=r5) r6 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e22, 0x9e, @mcast1, 0x20}}, 0x5c, 0x401, 0x5, 0x5149210f, 0x85}, &(0x7f0000000300)=0x98) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000340)=@sack_info={r7, 0x4, 0x1f}, 0xc) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r6, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r0}) [ 597.372307][T11215] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 597.427857][T11215] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 23:30:53 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x1, 0x115f9b71d1c385c5) write$P9_RXATTRCREATE(r0, &(0x7f0000000300)={0x6}, 0x5) write$P9_RXATTRCREATE(r0, &(0x7f0000000000)={0x7}, 0x7) 23:30:53 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x16839, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:30:53 executing program 0: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) write$P9_RRENAME(r1, &(0x7f0000000180)={0x7, 0x15, 0x2}, 0x7) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r0}) 23:30:53 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, "c2e77f465f0c99132ce04d43aeac88ad6d3d18"}) r1 = accept$inet(0xffffffffffffff9c, &(0x7f0000000540)={0x2, 0x0, @remote}, &(0x7f0000000580)=0x10) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f00000005c0)={'filter\x00'}, &(0x7f0000000640)=0x44) r2 = socket$inet(0x2, 0xa, 0x8) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f0000000100)={'caif0\x00', 0x2}) r3 = syz_open_procfs(0x0, &(0x7f0000000bc0)='\xdfSO\xcb\x01\x01@\x00\x00\x00\x00\x00\x00\x00\x97\x00\x00\x00\x00\x00') getsockopt$packet_buf(r3, 0x107, 0x2, &(0x7f0000000a80)=""/229, &(0x7f0000000b80)=0xe5) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000240)={'L-', 0x8}, 0x28, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f00000006c0)='./file0\x00', r4}, 0x10) accept$packet(r4, 0x0, &(0x7f0000000740)) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000340)={@in={{0x2, 0x4e21, @empty}}, 0x0, 0x2, 0x0, "24befacd93a6cbac5e1cb6e0631b890800c8cbf0285612b85a84b71d9b3da0513231f99032683ea4ae11dc36d39f93c0f1cbf85f6c825c64baeb084e063627612cdfdec98aa3b115b6e34bc0c9cdc8ac"}, 0xd8) lsetxattr$trusted_overlay_redirect(&(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x3, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(r4, 0x6, 0x3d, &(0x7f0000000480)=""/128, &(0x7f0000000500)=0x80) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') [ 597.712401][ T26] audit: type=1804 audit(1561851053.394:64): pid=11217 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="bus" dev="sda1" ino=16567 res=1 23:30:53 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:30:53 executing program 1: setgroups(0x4000000000000015, &(0x7f0000000200)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00007e5000)={0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x3b, &(0x7f0000000000)=""/92, &(0x7f0000000140)=0x5c) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x2, 0x40000000040) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000100)={0x6, 0xca4a, 0x6, 0x9, 0x6, 0x80000001, 0xfffffffffffffff7, 0x40, 0x3, 0x3, 0x2}, 0xb) 23:30:53 executing program 0: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x0, 0x2) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="c56f43aad913fb3f6f0087f07c1f8506109d3ab05530a3c7cb12b31b95d36405510a7741", 0x24, r0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r0) 23:30:53 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f00000001c0)={'filter\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x0, [{}, {}]}, 0x98) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff024}, {0x401}]}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e22, @multicast1}}, 0xf2, 0x1f, 0x3, 0x3e, 0x100}, &(0x7f0000000380)=0x98) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f00000003c0)=r3, 0x4) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x2000004e20, @dev}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000280)=0x2, 0x4) sendto$inet(r1, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) 23:30:53 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1, 0x2, 0x3d, 0x8000000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0, 0x2}, 0x3c) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x283, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000400)={0x0, 0x9a, "c03e54fb92ce845174fc277e71378852a56e43b4f286cfd3099fea3156b0d3430af9c8b3c2f0fcf6a15e0d1b86df152ece2b0f8f22dda2fd240759aaed8f544b1a23fff6ad55bc059065cf706791a2e4384063aeb2f76052094c6c2d71b8ddeecbbcd56f5e4c4d0682b8ac5be9b5d6a174c2fbe7fa6ee9bfedeee6b2aff6034bae37fffdc2a95b1d3f7a653010fba1f42d3eaf5aafd60cbd3476"}, &(0x7f00000004c0)=0xa2) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000500)={0x0, 0x7}, &(0x7f0000000540)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000580)={0xffffffffffff485b, 0x8207, 0x4, 0x9, 0x0}, &(0x7f00000005c0)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000600)={0x0, @in={{0x2, 0x4e23, @local}}, 0x37a, 0x200, 0x3f, 0x2, 0x24}, &(0x7f00000006c0)=0x98) sendmmsg$inet_sctp(r1, &(0x7f0000000c40)=[{&(0x7f0000000280)=@in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x23}, 0x80}, 0xffffff68, &(0x7f0000000ac0)=[{&(0x7f00000002c0)="d5cffd9038bb98d60cc504f77abb3d93611b834d89a58a423d2793434a4e9382da6907537ed8d188957063e2d8539b7dca5bcb63533f78850faa895962fd4d21326ca0f43ec04676e1f132353dbb98bae62ef50f910e8f1d6ce59309c61a4087ee59d4e8fe", 0xfd5a}, {&(0x7f0000000340)="eab88b5b51dd8258205ac513587f0a08da56c61a265c74eea022473800d9891f50a9f69a93f4437a6646e960e67f8132eaba02ad5f89e2ec0493297f7f094e116f94c4f2cc3d1e8b1a14d2f870a5fa", 0x4f}], 0x2, &(0x7f0000000b00)=[@dstaddrv4={0x18, 0x84, 0x7, @loopback}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x4}}, @sndrcv={0x30, 0x84, 0x1, {0x100, 0x5, 0x8008, 0x2, 0x8, 0x5, 0xc, 0x8, r2}}, @sndinfo={0x20, 0x84, 0x2, {0x0, 0x8000, 0x0, 0x8, r3}}, @sndinfo={0x20, 0x84, 0x2, {0x0, 0x8000, 0xf58, 0xffffffff, r4}}, @sndrcv={0x0, 0x84, 0x1, {0x7fffffff, 0x5, 0x200, 0x4, 0x0, 0x62, 0x200, 0x8, r2}}, @sndinfo={0x20, 0x84, 0x2, {0x1000, 0x8201, 0x7, 0x81, r5}}, @dstaddrv6={0x20, 0x84, 0x8, @local}], 0xf8, 0x4000000}, {&(0x7f0000000800)=@in={0x2, 0x4e23, @local}, 0x10, &(0x7f00000009c0), 0x3, &(0x7f0000000a00), 0x18, 0x80}], 0x2, 0x20000000) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000600), 0x0}, 0x20) r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x1, 0x10000) ioctl$TIOCSSERIAL(r6, 0x541f, &(0x7f00000001c0)={0xfffffffffffffffc, 0x2, 0x0, 0x5, 0x1, 0x48018ad5, 0x3, 0x663426aa, 0xffffffff, 0x101, 0x0, 0x2, 0x650, 0x6, &(0x7f0000000100)=""/160, 0x3bede486, 0xfff, 0x7}) 23:30:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/unix\x00') preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000080)=""/113, 0x71}, {&(0x7f0000000180)=""/191, 0xce}, {&(0x7f0000000100)=""/10, 0xfffffe23}], 0x3, 0x1d) 23:30:53 executing program 0: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r0}) [ 598.160511][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 598.166408][ C0] protocol 88fb is buggy, dev hsr_slave_1 23:30:53 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000040)="2e0000002a00815fe45ac187185095cf0400b0eba0b4d65cdbaa98cbb30007fff00000000000000051894d5d1dac", 0xfffffffffffffedf}], 0x1}, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000080)=0x7) 23:30:54 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x1683a, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:30:54 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(0x0, 0x0) 23:30:54 executing program 0: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x9, 0x3) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000180), 0x4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r0}) 23:30:54 executing program 5: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x16839, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:30:54 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$l2tp(0x18, 0x1, 0x1) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000040)=0x9, 0x4) r3 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1, 0x8400) ioctl$RTC_IRQP_SET(r3, 0x4008700c, 0x1a03) connect$l2tp(r2, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendto(r2, 0x0, 0x0, 0x0, 0x0, 0x0) 23:30:54 executing program 3: setxattr(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=@random={'security.', '\x00'}, &(0x7f00000000c0)='\x00', 0x1, 0x1) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) r0 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x7, 0x10000) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000140)={0x0, 0x0, [], {0x0, @reserved}}) r1 = open$dir(&(0x7f00000012c0)='./file1\x00', 0x0, 0x0) lseek(r1, 0x0, 0x1) 23:30:54 executing program 0: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r0) add_key(&(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)="e39ca99f0980405914bee4da43627adb444dca08f95117345c5d14ca5b6f", 0x1e, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r0}) 23:30:54 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(0x0, 0x0) 23:30:54 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(0x0, 0x0) 23:30:54 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x1683b, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:30:54 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000040)=""/246) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x3fc, 0x101000) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000240)={0x9c0000, 0x5, 0x1, [], &(0x7f00000001c0)={0xbd0bff, 0x2, [], @p_u16=&(0x7f0000000180)=0x7}}) ioctl$SIOCRSSCAUSE(r1, 0x89e1, &(0x7f0000000280)=0x4) chdir(&(0x7f0000000140)='./file0\x00') ioctl$EVIOCGREP(r0, 0x4010744d, 0x0) 23:30:54 executing program 0: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r0}) 23:30:54 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(0x0, 0x0) 23:30:55 executing program 0: syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0xbb, 0xa01) r0 = syz_open_dev$midi(&(0x7f0000000dc0)='/dev/midi#\x00', 0x80, 0x80080) r1 = accept$packet(r0, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000e80)=0x224) recvmmsg(r1, &(0x7f0000000d00)=[{{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000240)=""/190, 0xbe}, {&(0x7f0000000300)=""/226, 0xe2}, {&(0x7f00000001c0)=""/35, 0x23}, {&(0x7f0000000400)=""/151, 0x97}, {&(0x7f00000004c0)=""/238, 0xee}, {&(0x7f00000005c0)=""/105, 0x69}, {&(0x7f0000000640)=""/235, 0xeb}], 0x7, &(0x7f00000007c0)=""/253, 0xfd}, 0x8}, {{&(0x7f00000008c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000940)=""/77, 0x4d}, {&(0x7f00000009c0)=""/75, 0x4b}, {&(0x7f0000000a40)=""/42, 0x2a}, {&(0x7f0000000a80)=""/48, 0x30}, {&(0x7f0000000ac0)=""/25, 0x19}, {&(0x7f0000000b00)=""/173, 0xad}], 0x6, &(0x7f0000000c40)=""/153, 0x99}}], 0x2, 0x101, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000d80)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000f40)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000e00)={&(0x7f0000000ec0)={0x44, r2, 0x100, 0x70bd2d, 0x25dfdbfd, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x2}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x7, 0x8]}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x80) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r3) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000180)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3}) 23:30:55 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x1683c, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:30:55 executing program 5: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x16839, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:30:55 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x10000, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x3, @local, 'veth0_to_hsr\x00'}}, 0x1e) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804630000000081030fe90a000200400ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f00000000c0)=0x3ff, 0x4) 23:30:55 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(0x0, 0x0) 23:30:55 executing program 0: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r0) r2 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000280)={@dev, 0x0}, &(0x7f00000002c0)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f0000000300)={@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, r3}, 0xc) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r0}) [ 599.599980][T11365] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.1'. 23:30:55 executing program 2 (fault-call:9 fault-nth:0): r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 599.698605][T11365] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.1'. 23:30:55 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x1683d, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:30:55 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x10000, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x3, @local, 'veth0_to_hsr\x00'}}, 0x1e) r1 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804630000000081030fe90a000200400ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f00000000c0)=0x3ff, 0x4) 23:30:55 executing program 0: r0 = add_key(&(0x7f0000000100)='rxrpc\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)="98ea27495b7468ff5fcd64cc4e87d49e8f436a4b06a35ca37192518f9383a8ff11b35d88b3b7974b31170e20c8df", 0x2e, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, r0) modify_ldt$read(0x0, &(0x7f0000000300)=""/125, 0x7d) r2 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x8, 0x40000) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r1}) add_key(&(0x7f0000000380)='.dead\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000400)="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", 0x1000, r0) [ 600.060000][T11396] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.1'. 23:30:55 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x100, 0x0) write$P9_RUNLINKAT(r0, &(0x7f0000000080)={0x7, 0x4d, 0x1}, 0x7) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) syz_init_net_socket$llc(0x1a, 0x2, 0x0) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, r1) [ 600.103290][T11382] FAULT_INJECTION: forcing a failure. [ 600.103290][T11382] name failslab, interval 1, probability 0, space 0, times 0 [ 600.160662][T11382] CPU: 1 PID: 11382 Comm: syz-executor.2 Not tainted 5.2.0-rc6-next-20190628 #25 [ 600.170139][T11382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 600.180430][T11382] Call Trace: [ 600.183960][T11382] dump_stack+0x172/0x1f0 [ 600.188345][T11382] should_fail.cold+0xa/0x15 [ 600.188372][T11382] ? fault_create_debugfs_attr+0x180/0x180 [ 600.199058][T11382] ? ___might_sleep+0x163/0x280 [ 600.203964][T11382] __should_failslab+0x121/0x190 [ 600.208952][T11382] should_failslab+0x9/0x14 [ 600.213658][T11382] __kmalloc_track_caller+0x2dc/0x760 [ 600.219069][T11382] ? strnlen_user+0x135/0x2e0 [ 600.223874][T11382] ? strndup_user+0x77/0xd0 [ 600.228408][T11382] memdup_user+0x26/0xb0 [ 600.232681][T11382] strndup_user+0x77/0xd0 [ 600.237138][T11382] ksys_mount+0x3c/0x150 [ 600.241499][T11382] __x64_sys_mount+0xbe/0x150 [ 600.246320][T11382] do_syscall_64+0xfd/0x6a0 [ 600.246358][T11382] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 600.246378][T11382] RIP: 0033:0x459519 23:30:55 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x84000) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000002d40)={0x6, {0x40, 0x1f, 0x10000, 0x1}}) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000040)=@ipx, 0xfffffffffffffce7, 0x0}}], 0x1, 0x0, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r1, 0x40206417, &(0x7f0000002c40)={0x7ff, 0x7fffffff, 0x6, 0x0, 0x10, 0x80}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0)='NET_DM\x00') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r3, 0x702, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x800) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002d80)={0x0}, &(0x7f0000002dc0)=0xc) r5 = syz_open_procfs(r4, &(0x7f0000000a80)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 600.256798][T11382] RSP: 002b:00007fa0a85edc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 600.256816][T11382] RAX: ffffffffffffffda RBX: 00007fa0a85edc90 RCX: 0000000000459519 [ 600.256823][T11382] RDX: 0000000020000180 RSI: 00000000200000c0 RDI: 0000000020000080 [ 600.256831][T11382] RBP: 000000000075bf20 R08: 0000000020000500 R09: 0000000000000000 [ 600.256838][T11382] R10: 0000000000202028 R11: 0000000000000246 R12: 00007fa0a85ee6d4 [ 600.256845][T11382] R13: 00000000004c590b R14: 00000000004da058 R15: 0000000000000007 [ 600.540136][T11412] QAT: Invalid ioctl 23:30:56 executing program 2 (fault-call:9 fault-nth:1): r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:30:56 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(0x0, 0x0) 23:30:56 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="2102000000000000000009000000280003006e0800030000000000080001000100"/54], 0x3c}}, 0x0) 23:30:56 executing program 0: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r0) 23:30:56 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x1683e, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 600.676702][ T8972] libceph: mon0 (1)[::]:6789 socket error on write [ 600.706179][ T8972] libceph: mon0 (1)[::]:6789 socket error on write [ 600.778019][T11425] FAULT_INJECTION: forcing a failure. [ 600.778019][T11425] name failslab, interval 1, probability 0, space 0, times 0 [ 600.797361][T11425] CPU: 0 PID: 11425 Comm: syz-executor.2 Not tainted 5.2.0-rc6-next-20190628 #25 [ 600.806619][T11425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 600.816906][T11425] Call Trace: [ 600.816947][T11425] dump_stack+0x172/0x1f0 [ 600.825285][T11425] should_fail.cold+0xa/0x15 [ 600.829919][T11425] ? fault_create_debugfs_attr+0x180/0x180 [ 600.835855][T11425] ? ___might_sleep+0x163/0x280 [ 600.840741][T11425] __should_failslab+0x121/0x190 [ 600.845990][T11425] should_failslab+0x9/0x14 [ 600.846006][T11425] __kmalloc_track_caller+0x2dc/0x760 [ 600.846043][T11425] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 600.846060][T11425] ? strndup_user+0x77/0xd0 [ 600.846077][T11425] memdup_user+0x26/0xb0 [ 600.846098][T11425] strndup_user+0x77/0xd0 [ 600.876316][T11425] ksys_mount+0x7b/0x150 [ 600.880597][T11425] __x64_sys_mount+0xbe/0x150 [ 600.885516][T11425] do_syscall_64+0xfd/0x6a0 [ 600.890050][T11425] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 600.896097][T11425] RIP: 0033:0x459519 [ 600.900192][T11425] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:30:56 executing program 0: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x6, 0x48000) write$FUSE_STATFS(r1, &(0x7f0000000180)={0x60, 0x0, 0x2, {{0x20, 0x101, 0xfffffffffffffa73, 0x10000, 0x1, 0xffffffff00000001, 0x5, 0x9}}}, 0x60) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r0}) [ 600.924536][T11425] RSP: 002b:00007fa0a85ccc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 600.933139][T11425] RAX: ffffffffffffffda RBX: 00007fa0a85ccc90 RCX: 0000000000459519 [ 600.936125][T11429] IPVS: ftp: loaded support on port[0] = 21 [ 600.941125][T11425] RDX: 0000000020000180 RSI: 00000000200000c0 RDI: 0000000020000080 [ 600.941135][T11425] RBP: 000000000075bfc8 R08: 0000000020000500 R09: 0000000000000000 [ 600.941143][T11425] R10: 0000000000202028 R11: 0000000000000246 R12: 00007fa0a85cd6d4 [ 600.941150][T11425] R13: 00000000004c590b R14: 00000000004da058 R15: 0000000000000009 23:30:56 executing program 0: msgget(0x2, 0x20) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)=@builtin='builtin_trusted\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180)='keyring\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240)=r2, 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) [ 601.239951][T11417] QAT: Invalid ioctl 23:30:57 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x1683f, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:30:57 executing program 0: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r0}) r2 = shmat(0xffffffffffffffff, &(0x7f0000ffd000/0x2000)=nil, 0x5000) shmdt(r2) 23:30:57 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x401ffe, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_PIT2(r1, 0xae45, 0x0) 23:30:57 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000240)={'nr0\x01\x00', 0x4005}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, &(0x7f0000000000)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\x03\xaa\xac\x11x\xf4D3A}\xda\xac\xff\x82\x8a\xc7J\xe2J?\x00\x8b\x9c[\xdd\x06\xa4\n') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00\x00\x00\x00\x00\x80\x00\x00\n\xf4D3A}\xe4\xac\xff\x82q\xc7J\xe2J?\x00\x8b\x9c[\xdd\x06\xa4\n') setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000040)={0x0, 0x6}, 0x8) 23:30:57 executing program 0: r0 = add_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000240)="07c2fcd317b0aac3e23c", 0xa, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x100, 0x0) setsockopt$inet_opts(r2, 0x0, 0xd, &(0x7f0000000180), 0x0) pipe2(&(0x7f0000000280), 0x84000) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r1}) 23:30:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x6, 0x3, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes256\x00'}, 0x26) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x167, &(0x7f0000000100)=[@op={0x18, 0x117, 0x4}], 0x18}], 0xfffffffffffffd61, 0x0) 23:30:57 executing program 2 (fault-call:9 fault-nth:2): r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 602.127767][T11503] FAULT_INJECTION: forcing a failure. [ 602.127767][T11503] name failslab, interval 1, probability 0, space 0, times 0 [ 602.198991][T11503] CPU: 1 PID: 11503 Comm: syz-executor.2 Not tainted 5.2.0-rc6-next-20190628 #25 [ 602.208168][T11503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 602.211349][T11429] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 602.218338][T11503] Call Trace: [ 602.231202][T11503] dump_stack+0x172/0x1f0 [ 602.235541][T11503] should_fail.cold+0xa/0x15 [ 602.240422][T11503] ? fault_create_debugfs_attr+0x180/0x180 [ 602.246528][T11503] ? ___might_sleep+0x163/0x280 [ 602.251431][T11503] __should_failslab+0x121/0x190 [ 602.256402][T11503] should_failslab+0x9/0x14 [ 602.260907][T11503] kmem_cache_alloc_trace+0x2d3/0x790 [ 602.266511][T11503] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 602.272743][T11503] ? _copy_from_user+0x12c/0x1a0 [ 602.277694][T11503] copy_mount_options+0x5c/0x3f0 [ 602.282651][T11503] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 602.288911][T11503] ksys_mount+0xa7/0x150 [ 602.293300][T11503] __x64_sys_mount+0xbe/0x150 [ 602.298002][T11503] do_syscall_64+0xfd/0x6a0 [ 602.302602][T11503] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 602.308509][T11503] RIP: 0033:0x459519 [ 602.312419][T11503] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 602.332138][T11503] RSP: 002b:00007fa0a85ccc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 602.340607][T11503] RAX: ffffffffffffffda RBX: 00007fa0a85ccc90 RCX: 0000000000459519 [ 602.348693][T11503] RDX: 0000000020000180 RSI: 00000000200000c0 RDI: 0000000020000080 [ 602.356864][T11503] RBP: 000000000075bfc8 R08: 0000000020000500 R09: 0000000000000000 [ 602.364878][T11503] R10: 0000000000202028 R11: 0000000000000246 R12: 00007fa0a85cd6d4 [ 602.372871][T11503] R13: 00000000004c590b R14: 00000000004da058 R15: 0000000000000009 [ 602.507602][T11433] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. 23:30:58 executing program 5: r0 = socket(0x10, 0x803, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) write(r0, &(0x7f0000000040)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) getsockopt$sock_int(r0, 0x1, 0x4, 0x0, &(0x7f00000000c0)) 23:30:58 executing program 0: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r0}) 23:30:58 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x16840, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:30:58 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020d00001500000000000000000000000100180000000000080012000000030000007036000000000600000000000000000000000000000000000000000000000000000000000000ff02000000000000000000000000000105000500000006000a0000000000000000000000000000000000ffffac141400000000000000000005000600000000000a00000000000000fe8000000000000000000000000000ff0000000000000000"], 0xa8}}, 0x0) 23:30:58 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x5, 0x12000) ioctl$NBD_SET_BLKSIZE(r2, 0xab01, 0x4) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000000, 0x10, r0, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e22, @multicast1}, 0x10) syz_genetlink_get_family_id$fou(0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x40000) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f00000001c0)) r3 = socket$inet(0x2, 0x1010000000803, 0x1) setsockopt$inet_mreqn(r3, 0x0, 0x21, &(0x7f0000000000)={@multicast2, @local}, 0xc) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRES16=0x0], 0x19) 23:30:58 executing program 2 (fault-call:9 fault-nth:3): r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 602.686819][T11527] FAULT_INJECTION: forcing a failure. [ 602.686819][T11527] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 602.700078][T11527] CPU: 0 PID: 11527 Comm: syz-executor.2 Not tainted 5.2.0-rc6-next-20190628 #25 [ 602.709208][T11527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 602.719289][T11527] Call Trace: [ 602.722613][T11527] dump_stack+0x172/0x1f0 [ 602.726982][T11527] should_fail.cold+0xa/0x15 [ 602.731602][T11527] ? fault_create_debugfs_attr+0x180/0x180 [ 602.737556][T11527] ? kasan_check_read+0x11/0x20 [ 602.742457][T11527] ? __lock_acquire+0x1700/0x4c20 [ 602.747537][T11527] should_fail_alloc_page+0x50/0x60 [ 602.752762][T11527] __alloc_pages_nodemask+0x1a1/0x8f0 [ 602.758164][T11527] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 602.763906][T11527] ? __alloc_pages_slowpath+0x2520/0x2520 [ 602.769669][T11527] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 602.775418][T11527] ? fault_create_debugfs_attr+0x180/0x180 [ 602.781415][T11527] cache_grow_begin+0x90/0xd20 [ 602.786371][T11527] ? copy_mount_options+0x5c/0x3f0 [ 602.791496][T11527] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 602.797751][T11527] kmem_cache_alloc_trace+0x6b0/0x790 [ 602.803147][T11527] copy_mount_options+0x5c/0x3f0 [ 602.808135][T11527] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 602.814485][T11527] ksys_mount+0xa7/0x150 [ 602.818759][T11527] __x64_sys_mount+0xbe/0x150 [ 602.823454][T11527] do_syscall_64+0xfd/0x6a0 [ 602.827994][T11527] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 602.833994][T11527] RIP: 0033:0x459519 [ 602.837900][T11527] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 602.857611][T11527] RSP: 002b:00007fa0a85ccc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 602.866188][T11527] RAX: ffffffffffffffda RBX: 00007fa0a85ccc90 RCX: 0000000000459519 [ 602.874176][T11527] RDX: 0000000020000180 RSI: 00000000200000c0 RDI: 0000000020000080 23:30:58 executing program 0: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000480)='/dev/cachefiles\x00', 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$tun(r2, &(0x7f0000000500)={@void, @void, @llc={@snap={0xab, 0x1, "85", "4f2782", 0x896f, "7c01b858173194821a796309c60067ff5b2a94273b07b75f0d892b2d18cf811477f9ae3a28499edd124d6da6658ce22bf31fc1bec97c83eb4d774d3f6f80f3fa06f2625a14631574b3cff835259cd9be80f52fe925f575fb62e85ed61a4b7d47dd421b321c8042aed3ec9d8be38890963dafd8233d44652ed8bbccc6251e057280f603f9e5845f0f87cc92706da964a5cc5c9d13296f3f960f4df03eb094d7e4365edd9ddf9384f7f9c477481a0eced067b67d84ff8ac660e2dc30ba5e9f352199c9a6067c84c997a075c0667381a2942d0efd2852d758776adc61ec3ba0230e857bae3a36fa0ca287e0a3bda29f93"}}}, 0xf7) ioctl$DRM_IOCTL_GET_UNIQUE(r2, 0xc0106401, &(0x7f00000004c0)={0x0, &(0x7f0000000240)}) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='fuseblk\x00', 0x2, &(0x7f0000000380)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xc00}}], [{@dont_appraise='dont_appraise'}, {@obj_type={'obj_type', 0x3d, 'vmnet1-wlan1'}}, {@subj_type={'subj_type', 0x3d, 'eth1'}}, {@obj_type={'obj_type', 0x3d, 'syz'}}, {@fsname={'fsname'}}]}}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r0}) ioctl$RTC_WIE_ON(r2, 0x700f) [ 602.882189][T11527] RBP: 000000000075bfc8 R08: 0000000020000500 R09: 0000000000000000 [ 602.890196][T11527] R10: 0000000000202028 R11: 0000000000000246 R12: 00007fa0a85cd6d4 [ 602.898185][T11527] R13: 00000000004c590b R14: 00000000004da058 R15: 0000000000000009 23:30:58 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000002c0)="2da80104000024ab77ab8a705cc14edf9dc89f455d2e0e8bfe37702b7d0b240e5b7ded616cbe658b8550de8b2817f3da5e030f100e2e9883893c6e62c4387267cd8d9969b213ea72d92284c6c8b4216081bf2064207ce49556492c79cafc575278f5", 0x62}], 0x1) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x20000, 0x0) syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0xffff, 0x2000) openat(0xffffffffffffff9c, &(0x7f0000000740)='./file0\x00', 0x200, 0x8) r3 = socket(0xa, 0x6, 0x8000) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000780)=0xfffffcb2) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xfffffffffffffffd}) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 23:30:58 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x8400, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000300)={r0, r0, 0x1000, 0xdc, &(0x7f0000000200)="d49ed7f51ef146e8540c078b65c8c425f2c87ef0e7bcdbf93c37f9348bad72bd7b7ef4f0f73efdffe65b4dab59f9e23f499b497021eeb6f0373b0ac44c97c5c2e806cb4508b136c3054a53f4557738377f9f710704a6a08c9c981f0e4d86d91dc4931623c0d919afdf3f70bdb87825d88b5c2954f8cfe46c381716496a564df37c98cede16826360c61d8034d127b08932e8436b5d208e030fab87d824c84255e423c9671402be0f6fe8cf5137e188252a760cc653fc3375db7f50a3bc49f5fac40e929c20ef70f308e3a8a2bfee2f9ce2c342d79ca6ef3bca908ff6", 0x6, 0x9, 0x3ff, 0x8, 0x2fe9, 0x1, 0x0, 'syz0\x00'}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc31a2deffff1700004a891182d3cb122e05f25b74f89e1063658df20350") r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x201, 0x0) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000180), &(0x7f00000001c0)=0x4) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000140)='./bus\x00', 0x7, 0xfffffffffffffe6d, 0x0, 0xfffffffffffffffd, &(0x7f0000000580)={[{@nodots='nodots'}, {@nodots='nodots'}, {@dots='dots'}]}) 23:30:58 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x400000, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x501200, 0x0) openat$cgroup_int(r1, &(0x7f0000000100)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x4002, 0x0) getsockopt$inet6_dccp_int(r2, 0x21, 0x0, 0x0, &(0x7f0000000080)) socket$inet_udplite(0x2, 0x2, 0x88) 23:30:58 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x5, 0xe9d4a30b2c1cf4d6) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000140)=0xffd) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f00000000c0)) 23:30:58 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1000, 0x80000) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={r0}) ioctl$sock_bt_hci(r0, 0x400448de, 0x0) 23:30:58 executing program 0: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, r0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x40, 0x0) write$P9_RLOCK(r2, &(0x7f0000000340)={0x8, 0x35, 0x200000000000002}, 0x8) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r0}) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x800, 0x0) write$P9_RMKDIR(r3, &(0x7f00000002c0)={0x14, 0x49, 0x1, {0xf94723ee7e8001cb, 0x4, 0x2}}, 0x14) getsockopt$bt_sco_SCO_CONNINFO(r3, 0x11, 0x2, &(0x7f0000000380)=""/67, &(0x7f0000000080)=0x43) 23:30:58 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x16841, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:30:59 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000017000)=0xfffff7fffffffffd, 0x4) bind$inet(r0, &(0x7f0000011ff0)={0x2, 0x4e20, @multicast2}, 0xfffffffffffffcf0) listen(r0, 0x0) r1 = socket$inet(0x2, 0x6, 0xfffffffffffffffd) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002600)=0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @multicast2}, 0x10) readv(r0, &(0x7f00000024c0)=[{&(0x7f0000000100)=""/178, 0xb2}, {&(0x7f00000001c0)=""/236, 0xec}, {&(0x7f00000002c0)=""/191, 0xbf}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000000000)=""/10, 0xa}, {&(0x7f0000000080)=""/38, 0x26}, {&(0x7f0000001380)=""/179, 0xb3}, {&(0x7f0000001440)=""/75, 0x4b}, {&(0x7f00000014c0)=""/4096, 0x1000}], 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000002580)={0x0, 0x0, 0x0}, &(0x7f00000025c0)=0xc) listen(r1, 0x0) connect$netlink(r1, &(0x7f00000000c0)=@unspec, 0xc) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000002640)='/proc/capi/capi20\x00', 0x200000, 0x0) sendmsg$netlink(r6, &(0x7f0000005140)={&(0x7f0000002680)=@kern={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000005040)=[{&(0x7f00000026c0)={0x48c, 0x20, 0x300, 0x70bd2a, 0x25dfdbfd, "", [@generic="1f81f566eff939f37e61ac8c93fb89bda94a8f94c18d49e208cb12141ada30e298e0e05877b6044768baf193a8fcfd7080e3417e67c153197d7183eb29", @typed={0x8, 0x92, @pid=r2}, @typed={0xc, 0x50, @u64=0x7fff}, @nested={0x428, 0x65, [@generic="47cbb96ef7c0be7daf437322bbb9fde31c3cfbccc3ee62953ba28f2ddf08c55c278843a841d663fc973ff6b4c1b34d93e6ba4d60aa6d894f5bb76771c6a02b04db1d331dd7843700a547218ac25557af99dc08e827eeb4dd1f49a81e1366ab356f5b95ed0ce182e863957bf4f5cbd4fd9cb88d1b98b9ef76df10664b", @typed={0x18, 0x3d, @str='#}md5sumwlan0#!bdev\x00'}, @generic="0ea4506debe7338d0d70f98218f17fad22cd0028e4fe2a5ae48e370a6049706b8ba839965165033e269261fce21f0ee58bc1cd38476b50e3998c4427af8116c2f2df7b4cd698db0fecafd510af62e440ee4a04e7daa04cff065134234bd94a725866bff4b7ecf95d8db6d98ac51a7f153fc73bc03f7205c9432a2313c20830df81fb7d65bef5953e93d32157a792dc52bbd02432d7f01b93c5911bb1e6a6b484e3cb0fe4a6005990d1713e838dc5bd5f0eb99652e76d8d3f7363a35a2ad9a4fa", @generic="e55ca77ec300cb4847e125f422e28cdaa2a542a7a6b946cafff461230b764100380447fea0897afbe6aa2fe3e530ef593a08b4f0d263eb323d077ff045cfd470c73ec807a1a8cedad1ba4858826d9d83e8135be79928351fd3e4a22cad90ed4e922c3a3c6002b3625e120e63e26725ee924ed3c0cdff476ae65306bd83869b083d83e5b5a6c847ccf08828643f57541c9bceccfeca0925a354715cef783b7708ae316a340d8d4f343def5dee654c884957d49744701492fe4145b6ae27113d37bca380f16d8b9643a08446f3598d5d3e0fe630308a8cc042d0878c9c2f020b44cf35c55824ba2e34f85ff6ec715c4792", @generic="4313806423a500d49177cd067a54cf97b000612f1ca13e47169fc7d065537a98490ef0dfd30da409ad38cb23623d9f3d829e5a7af91792da1c716c20af8a8860fe6512501b27eb864c17020774903aadfb115c264189eda05bf82ef6c325a55d12afc0bb3586072aa3ee6f7a7f05d077f0628d1d00f4d1805ab9c928a63d090c4ba3ac7da2111605af1b40890b67b19fafc4ca1adf5f38eaad827c0c85cb79fdfa53e35bb334b1b9e972e3a7c1078202590c3b02a8bb45f10912453ba0ecad5bc4199cc45a94865fc9790d851f9abdd7d66a03758ee061549b3ae9df767f27f4", @typed={0x10, 0x43, @str='em1{]*GPL[\x00'}, @generic="ee5180d2aa6944d71b3b49bd403dd1c959efe9c07fe9d13e09c7b9c7d560f42b8542dfa96f27989b4535244810d6dce212367aa0805b6809ef553a2ebbd0472f762cdfbe465eff3c7b05558ae2f1d0d751d4a8eda9e55bd198595bfdc8ed6f7500816c63919b68701fdc1fcc2420127a090316abfc", @generic="491c2448781ea9a8571df455f58bd0fac961ab8507add41ea7644d40f9eae00a9ac4141ba17112affc57e7df28307c56ecd4c393819fa221bd2d6d7c093b560f668fd562699b82415ad68d5d729e99ff94cecd26eabcc6ccff236da3e942309efb186d6e7da5d6b26e5ce2e61fd722d5f11cf964dc9a2cd1c6c046"]}]}, 0x48c}, {&(0x7f0000002b80)={0x188, 0x41, 0x800, 0x70bd2d, 0x25dfdbfb, "", [@typed={0x8, 0x5, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @typed={0x2c, 0x5, @binary="9dc8b5f5d9551c55799b629c25e3be073daf5e744dbe8aff86df8a75646f8bd6aab8ba47ce"}, @typed={0x8, 0x2a, @u32=0x1}, @generic="4bed29f2aec84f9e92a1bfb47a316338d67256b8163211f24e17a71f583417a9dd87bc62ca167924a16fafce7166f7f1a953e90c846dc02539cf50d38c11ece87f2affc217b3ce39f18644873a215f7319127a21a5305f5e5643349720f8abd08f", @nested={0xd8, 0x96, [@typed={0x8, 0x5d, @u32=0x4a45000000000000}, @generic="0c1d416ff091cd94cc94a1542f5bbc95f65f2f7d8784fa710005f8bd08fc5d267b3ab3c84beb98fb3257352a44a36e63804ebe2b16083eb2a0a73a1c3aedbb31e7b76cb4c7f2a8fd893ba890da85f5ec5f9e433dbc486248622e8301be9feefddf9496d4c46d17162ad4c82a65676d2e0cc4e55579c7e441363fef8fd68217098d739fbfcb24e4b754664f5ebc2905b5ff53a2f3d4e1714b2fdc12cca86efbba678ff2142429c9b7277bc03d07ff17b677321246ef50812df62d71a272f7fedeccfd544511f9e1bdf9"]}]}, 0x188}, {0x0}, {&(0x7f0000002d40)={0x2150, 0x3d, 0xa04, 0x70bd2a, 0x25dfdbfe, "", [@nested={0xc, 0x1a, [@typed={0x8, 0x5c, @pid=r2}]}, @generic="325c330f1d7ebf7e6b7e30f16c4778adbdfd10f741041e50179502513bb4f2777b3c5c082498d1c09016bcf5232278f56ed1f134be1371954e3d158a2b3976e29be3d7d817535a29ae8d8d1e2223d48f", @nested={0x2070, 0x74, [@generic="7d8e7e", @generic="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", @generic="df71fcaa2a625659e5cb7b7102111776eb66a9f008b9bc0ca4f6804c7cf774d4f9b14e419ddd5a447e81f00dbd7020aaf137135c5618e016bcd3bcf1046d14891dbd28dcc71c6c487496ef72ec331feb46c537aa653529b6e0acfa343d0a48ca462f517ed2598b", @generic="b131e146caa4063e0451da36a68f1ce9102dcf55dd0221a0d2e6eef626ef0686abdc1944620a2844beed7f926be2ecf44bb292b1d539272adf4b7aa48cb29298aaaaec290e390a1939f29ae047fed622ba11b171464e3e34005c9ce49ee5cd04a9d0e493a36d3fd8e937a17d63ea1fc7683fb6ab5fa5669cf2d3c313746973cee80b0bb1c31c6043a1a90af4824bd844c3f4c4ed68b7dda4b3445696bae19ab72663bf12a78045ea64888b1d3e57f4cc3360184aa2ffdbd2088f5ec7e4d428163d39bbc2ae245018fedd7293346b7de57d5c6634056737eff63dabbbf1d38e8dbd466f83f3813bc965fbc87d828c6e2106601190c45c04369b346a043914e2d66cbcc4a7a449b0d815aeaaee9895993f14c5cdc758aadaf9be2344e44f791546600960c295f261874d1276366578201091515f01994337b32189516c1f8228d9bca0b2b7f19054d082ff363e038fd1e920902a521c9fe4119ad630ffb700364c1104f67f1056165bdcd4046d263ed0da03a4b229c50b41d00ee68a122fdf38d4e8d48dc59ae5c6630d4429db4e49d7df11bd511d6197025f3ff536765a02922b450892aa6d6442885eed82d803167e173d249cf5217f4aeeda7716041bfff4126fce35ea1c08fc215886f7df2700ec4ebcb7a0587709b98c37b88c38eedab5c92460f6a9370561de65cb65f0e3e6423bfa885611ebd2f338738f5e1fd76857e99308722907b0c2ad26a3ed2611de0b6323e9b3397b9efaff19b38c053216178a4cd136ee7149e2ed56153b24fa0b4dd2376577744cb3b08a64142ee37eda0e10837e847feddf096e5d86bf7a22002e220efaabfa8138bfa64e5558c2305600821a01d6f5f722dee963740dd78fd4ea467ae05ad48131f7e942cacb2a5c2dc47bb71de81534ee50ffbd8d79f5f41cd383867b8563ffc20fa6af87e9b58de1e28289fde75f566bb03b51d9d57d7531244c3df679d9f9ac9943e4fbd121bdd01a27e822b84062605834267cf47aef3ac75c512679958f83a5eff51b996c499bced45ac7696475d74d5a3541ac0f83c61e78bee94d5f6115a91522bb621fd27d9e699eb99bfe9230bd57c0ffad9c76cb348a4aab531529e282ca3c856bd2fa39f4499cdfac625dccb6f8dd8c46c070affc95e6b3063b55a939d82a01d02cf889980a18a7e96bf6887d15862c92b06fecfc1570950e48dbf115a4a3c78bf88f05d69bdfd3a14f433210d554f943f158ca961548e7c82f9fd11b9d0da7595c50a51a4a50daa2f0c6e3b844fbb90030a27d3e56cc171f82586ba171890efa99781cf59023393377f3539292a5e6c6ec455eca0212b45003ff3b7d4a1282d88d7eab7e3551337689300f077517e968f85f8eab1ecc9b4c7d4ca431661ab18e2459270fb031dfec147b56e7b2331ef7e8b6217ae092abe5cafb77368c4f6cb8071116f263805193bbc4a49d0802a49465365095db8e3aafbc7edd1f97ced703c89c6bdea4598095701d2503db51346493d2e788b0003d37236c1658edb169c5349a267921f5dd5c3e41b7879ea390f2b3133bc493926fb8d43ee9c0f1a4e44b6a18c6d68f1ee3be15f89d9e3c4790ee9cd69a68fa84930c1ded3e322a88e0ff75077054e3e77fd53a7982be71b249cc53689d7751b0c84eeea3776d1d592a9c7f0ab18dc1d451960c6161dafff748891d99a63f048ace34b5b0b3f9e1e7fea8f74346e1e503e9a94725dd25e0bf2059686268f2f816ab08f7bb28f84a40e213c526240a633bb5b0806c9da4eff493a682402daa952bb743ecd78bfc963a1dd384c998a303dd790a3c35acb3886625ea2d3936622f5afa2a8d675ee78204d3c5513551787dfe467b121dd6114513c352f20363c82fcad21525f4c215f8f7eba0ae2fa1bce27869a2acfbb9718e2f5e7849fbb89f370a433dbe53ebcca95906b0c430b1a4624c2d6e4b04fb4181f05280c2364d51203a71f8e7f87b68dbc1b363e8d6cae305d930f569eaa4360fb6cfa16f2504053b96edbb2be3b25ae9738276c4dc01a790f899334577208cf349ecda0b6c07c6fe56e39a71fd77057dc78240182270411fd72c1e78e7c0894eda2aef01c1da5b29cccc194918417a3288187caa0d7cb342d3b89bcedb746cf3034113b643647bd67a5b3708ec0e0e2dfeee2c1e9f35bdcece5e2f363f691da17c010a19e3949bb6b72d7d0978b3f7c60b3fb368d9b86cb363d0845b9c6fd3fe6b6dcc25dfe16f45194ac4c7b64f3c2bf6a1e7ac1a1213fa0fb7e7907bdb754916eed456cfa9814f8d5e339e243246c0fae8658a5fed1c20889efe0162f0f4ce4eed6be615c68d329dfceaec2823931059f31a1c2d14f2aba0d0e2150dfb56ba10264736d05e7be442115462804292e7787c043c969f25fb18f32cfce36a50fe7a65368affa1943a00b16e712f371131d89556f3d24296e4e114f9930f9cb34d0eb51f17b38b6ac6b2e4490cb619ea122fd9a0f77116bd42a9a20692cbd7b32c7c546ce54885ce630b22a73f464891c61d9fc01e67d02550281167996ac70d0676870cc6c5df3a489d0213dfea394b04a025f84d60c4799fa06175a2e79d94b6e665a715d1cbb1825f6bc8408394b914e17f32f249e945abfac9ca30645b3e31bf9d2427dac4a83fb252a3be1b7771b066ea739def72ad5fc8979a694ad7baace6e4159fc0c21d761ab32b665f4a73f8a2133fa1378e448b78190e07c23969a7d3ace61e7ff644bd7eb6f5d6d822f44da5b1d476d78c40f44ee5bd501bf1d1c146f1c500f535d72f3e55b27fe7b014aa042a2a673ba304e1686efd736d70b9028358588c412463d156d9fcf20e77787501729ef6e2969044f7a84e33b0ed29a1e1d049c6fb7751543064ceea4526c126aff21849e7f016c7fd3e671e60d33cdbb2f8aa2c252ecf7c34c28365116f45d489b7a02f3607fe1274bb7afba07388262f8f26ba27bbee466cb9ab8de361d01ccf630fb492840e843bfa3aa3b4f088bd55f5357556c5c0bf0632d2b73e73893d1fecbcc45d9893779ee189e3283819eeb1700456318b29658d45a1131d429ec5eb994dee572c7681479f0ec7d53349de656f381f82a6d35dd53ce1c456ff655f49bb58013193f05374654671b24e6b0a3c7a07a31f59dcce528283e18262b2cca9ab7b24ee115560cd3c571570db7f62986f11402dc9d6a2de525b2596018012f59e7586a133cf04a138ef09ee6532889b48a86f545e7bd3564b0ace7642d5a21de60ce06521726a485c60b25595243b8ce57c18ea7b2a16786bb096567205157109ec7d6fbc13b0912e569202c5bd538aa8ce54baa1cdb1f6bdc831158a85b700cf8798d1e5fe97e9724b7765968e4c713b49583960e819a6e23a80ec46b6a65c15139d467c15e9d06ecb3c7e4b7affc52cb281a498e0307ab1c1731d733dba14aabe641bab2ac9c602e888b0b2f9852a92af1eba08aed5ec0fdf915c8f472a5e97618209c752ce27a06d4620953024fc6ee333c5dad2a2a6172461e923fed2f5af17f715ccb9a466edecceb93d0e99b1bf4b3ce70b887014f9a2b75fe3d42276d81048ce71554fbbec5a1d5f00a854bedcbdf47ce5f04dba970fc82ce2b2d8396fbe80fc9552c9b8149b26c047041b93e3e601153d50b0c0fadc476269402866b74cb8bcef5d938576de1d061074896dc9962da1d38d698a8d20640a7a3abec5299fb0eb4ae5c45a44f1781e3e2c67884996820f233a2ffbb75d919d26bd3e3f8a8530484f27e5570d019a542921699f074238cb16f849ac53d3ddacc42003b6655be889a3aa55ecf5ad61e7a59a6d493b64e51f0af197827290ccea81cec8e83a4741a2c88dead027b39482e54c9d1f930db847ca875800fa58abbaa9d25011b93341cb585170832ffa4d9a0312af43f90649823e3247ea070009105703fa32feaea3685d8ccf1022c078eba8c23991aff793efa2cf2a8c9db1b11dc55ff21017ddef886c3864b30109c11697edef524112dedad863a54c3bf51e887213aec70f08d4136b9d1eed180f4c23e2ccd99877f77a8292913be5e09b751f87226a28e24f376171d72fa27a960eca3c02d5076e98f30e661d3c10641367bbf3e04a4d952afca4828e828b5c69b226c2624a23bca26fac7366a05007a4580c593e92738c84b1f5dec7897702e6d5a26918abac85ba16895654a113b426c3ec6c5d9a3cd0d335cb1ea1da09cee9f66379ce3f04319281a28ae233cc0aa89fda388ba9b2333054355cb357c6cc36d7f734a8977cc33bd7d9ac89cc2245a318c0d8bd2659015d21f4ad07f84ad390b1bb09dc2e8de11c68ac173279dfefb41d0832d320d1f331015b4170f6cbf9e3d1464eea5c60f34aa3c95b0fde7cd763f2e5146ae29e693828ab937cc9933809af5b970bc46d124cefe09bdcb21890cf6f30f70442b1a8c0c6ebd7e24d2840fefb75c7dbe146e5d7cc1c51be92c7b142c2f07d143c45c6ee94886130d650ac8bd3afbf0e742d34973f39f5334e7d67a4cc1c67ebc80170745f5e0a06ec172f25ab6881e2ac5c09ba2684824851179767f050dd28ded54b36a5606f1baee5042c450218d4e6e4d353e359054d9d92665f871d20b70dca8962dbd1ca703941cea5fcc8fba22bb1f56cfc6a2ea65fab9aa9e39b18375ffdd8abc47a830175c1d0a68abd5b450762bee77d2be6448a6bdb9f7a338ad2c568d423bf31390102a19284360254d0f3b3dfab79cbe29a70f023a59d7a199efb15943415fc1bcc930e7724fdf5f8c4addca4b3bb67ddda67d0944219075e913ec31bb6b44c6d6becd5d809ba18f23195f1a93caf69ba026eead9f11cc0d5baecf924d5603855b67193d073595add6c667d58a4c86cec077c1146ca1446c36dd5843608aaabd71320668db4c7aee8408340f9eaf6f2f046ecccb2a444328beb0a8eab411b975cb2eaccada5312d53b32f4c6d3f450c7eab2c13f96ce838e363217b0ecff765e788d9f9fc19864a7f6adbc96cf90e4e376ac041e527b156078e15b735a761db31b71d6291704c4db3c4e4e4b7ee351bcf24142ae89492f71af582d735f4b29ccdc14e5855d102f301cad7f7fb55c54a136dce0d49325e6f8efe8326e433e0d67f3a613d27fb9cd123b01bbe516b0ec185e8efd8b18fe5d5b31f1eae3ac5a8696fd6253a6046fe23e48c1e20e08462cc7fe64bdc89f511edeb13028823aa97f1d9b1cd67ceab376aaa321adf43c79fbb47343349f7c3586dc5c00ad0b6804f5ce9b59ab41af526ab5188dbe8d025e94687892cb136fce4bfb32af22c00c0d6ced43e6e2ccbae1a0c0e6d31f066785d6d55ef799c0f7096ae418ff8f53a02c7a63d54fbd99fcc1ca747579056134d08ed983505409dc835ed35486c4b3ecb5818552482ef6790903238b3ea1e715c2be42383cfb4c981c0297591992f1b5d4fa4367e0a18572d96abcb01d9552b194db8e96b53b5b8ddee23ab0e946059d7278fbb4dae9db246fb5a11b9af7892e19e0e7cdfe5fce60a96b50982aef46a15e691c3fbaabf7e3c4d401bba81dd96b7f18eaef94100dadb7988f5a9f5f343a0b69cce8287de60c0f866bddfc6e1349c76798c4aa2f10d6c255008a648af1459c3bb88da42ab6ef4b95132729cae8472e82d3751862ff734fc853d904cf69e857256b2735e04baf014d6f0481c9c68b02991d04229471de86fefc6fa6656c6c6b0b324c7834a0f68cb741ba80c509a036eb3aeb96641a4b312df151cdcc75fbdf9e001b99c92f565771d2eb988653635bd495e42f13494acc31c1e4342965f8df388960d50"]}, @typed={0x8, 0x87, @ipv4=@broadcast}, @typed={0x6c, 0x2e, @binary="790eed7ce724237e3540c2654fcf3e276d8e86d8015a68265efa7b8f93c5649c03e92771e51ff4bcd0c69a41776c33574a79ed6766e29f30b5b6d7259253113368359d92b6d14854bf50fd5297d1ddcf7a53cca1f04908eac9099d90d110bf3086644005ab15"}]}, 0x2150}, {&(0x7f0000004ec0)={0xfc, 0x28, 0x10, 0x70bd25, 0x25dfdbfe, "", [@typed={0x8, 0x53, @uid=r4}, @nested={0xe4, 0x23, [@generic="00e9f2d13f4600a103429daaf7f255521921e1daaa1d6582f8e758117a0d68d690342579c2d1ea5f5869486e8137ca5e6468f005acec480480692d6ad28fd9252a4821e588260c039187cd6ebce3aeb8d18a5034a90ebdfb497710aa5fedf1aaf0a2d59b18093607a7234b3c30d0a1e7add09f438f352d10176a45030318042c5cb6fad217cdb3807b827c6bf6245597d5b6d345e3414bd8df54954f0bf92d5dcddb131d82c332446634c1f07cc0eabcff690ff2bdd01f013d2aa3b30a74bf007a89e82dfac87097a516b83a42170c19424014b9988cb424efd59ae96ed4"]}]}, 0xfc}, {&(0x7f0000004fc0)={0x4c, 0x10, 0x800, 0x70bd2c, 0x25dfdbff, "", [@typed={0x8, 0x8b, @ipv4=@remote}, @nested={0x24, 0x18, [@typed={0xc, 0xa, @u64=0x48c3}, @typed={0x14, 0x5c, @ipv6=@rand_addr="7f6ec6b90803d1d4fe34b91796a9ef77"}]}, @typed={0x8, 0x7, @ipv4=@remote}, @typed={0x8, 0x17, @uid=r4}]}, 0x4c}], 0x6, &(0x7f00000050c0)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x18, 0x1, 0x1, [r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, r4, r5}}}, @rights={{0x24, 0x1, 0x1, [r0, r0, r1, r0, r1]}}], 0x78, 0x4880}, 0x40008c0) 23:30:59 executing program 2 (fault-call:9 fault-nth:4): r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:30:59 executing program 0: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$UI_DEV_CREATE(r2, 0x5501) sendmmsg(0xffffffffffffffff, &(0x7f0000008b80)=[{{0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f00000002c0)="de48ac664b352945bb420a1296739ebabd22904c6b2b89f4c07e6d5468c29766b1f6d82b903bbce62f21ecec7adb0cd66cd5467780995ab7ace47a592b4075890659bc9038e7704fcc9ea2768fc163260ca7196db6", 0x55}], 0x1}}], 0x1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0x1b) openat$vicodec1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video37\x00', 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x15, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r3, @ANYBLOB="0000000000000000950000000000000010f02e254519ff9173983b94fa2d7df1c35fbde05096c9414a8cd5ca8b11377caa56e10578c7efcc7c0fa65fb51036bff51a21f2a81a86abf74fa7da0dce4574068f83864d00c0d6e95815d47e357a1f96559bc23d5c923f33b3e6bdc46495e992eb8ec322ceffde422b53fa58d4f7a52266cb1570993b4cbdbb660e81684b76"], &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x800000000000000, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0xfffffffffffffff0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r4, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000003c0)='trusted\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r0}) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) 23:30:59 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xffc, 0x40) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000600)=0x23b, &(0x7f0000000640)=0x4) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @multicast1}, &(0x7f0000000080)=0xc) sendmsg$kcm(r0, &(0x7f00000005c0)={&(0x7f00000000c0)=@hci={0x1f, r1, 0x3}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="43c787197d350234d96bb025de904cef876ccdfbd9578c05c5f81ada5bde6d6acad7ab3bc38f0596af35dec6e1cd59a8411cdcd1f81dbf59c728639a39e2b0dc5ce4d2f68525c1aff8e89f7a794d8f333285d5696fa3c4658bd76ff90cb31a3a151c8dd47d1a1dd20c9b3dd76dc8c2ce012cef6e4ffa42f8f499f4c8121d92320a6a3b45c58b0bd29307bb56be8bb849bb2a88a568f68c5ea86ae92424e4a25d4daa17efcb55", 0xa6}], 0x1, &(0x7f0000000240)=[{0xc0, 0x11f, 0xc433, "e9ec50f643da91a035516451db978ea66999a3674deb4951a3551c1dac7c349377491882c711762ced8ed2c1c5e86e5e8cea0085d385f595d4941ae5ee42a2c67e437992609f8651454a9c3cf5152ac4ce89399a5a70de5addd183d383f6b071398f3c61f3adb5a5ec02cc01081638ad3b85377b6c7079765f83608bd25a7bd2fe46dbe38b681829eb2e09daa5e4843e3429ed351526b8dc3476b3ce1abb73077b3c9a69bd833b162e"}, {0x58, 0x10c, 0x0, "96b2a25504a6ac842163836bd75117cc5d96e7567fa1de464b34e6b7ee4d1364a2904eb44382af74648446ad36fe1c0178cad5be5d44a9d57804dd1649b2de41aff2e031a24bb3"}, {0x50, 0x11f, 0x3f, "6f959bc51aca4443c464f3a09efa819266f70e361fd63667c127d42d679ef1788e63996aa58d7a6522da927b81d6115b98eae3d00a5578e086de27adfb4e6218"}, {0x70, 0x105, 0x100000001, "9d43f48100355345472035ac700a6e2a63b83c1f10a2b4810a208ad1d5474f22368f7defc7311ba91ab830d469250043bd97856905c29b8bb78dcb8a9d3da40eaffe46790d89b980ff9ef1db58ee40f5b1acb603f426242d59cde758"}, {0xc8, 0x1ff, 0x100000001, "3e28725c72d6640a8eaee051e74c46526dab991678359a25333f95d678964e07fd074432ae19783c6a68edb8abeaf5c92cf54e30203135f696b9489e7ff5b545ab6f53c2e93253524b5fd9635eaee2adfd4ead00a9b92caacc159a214dccc1d720f2924acc3c23f4fc99e27787bd4e47eac81039c95dd1380055b9c7564fd005a3a82481fc4533d4405bc11f8b6f2dcc2fd045bc7ec1ee1e8c0fa69fede9ae6e20f6c2aec4468165b954a41afd9a8de89c480235ddf5"}, {0xc8, 0x104, 0x0, "c9fef9945ea385c70ccc41df0549ee6b10ef83efabecf35ca4d25842b999f862b9b3cc1179852facb36660b469bac0940eeadd0bdd08d7cb9c4595e660f1917496e38c3342fae68074049efcf3dc251f57525e8b7bb00aef13ed157ad5815b792587cd8c2c04b5e0a747111213ff0c8b381d73aad7774b9db1b707ff429c981e319bfab44194b8616d0b606adc8b9d9b2b10310934673a0a39adedc7003e316240d15d750d3d72570313b723c59697967d373b2045"}], 0x368}, 0x8000) socket$kcm(0x10, 0x12, 0x10) 23:30:59 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x7, &(0x7f00000000c0)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_dev$adsp(0x0, 0x20000000000006, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/3\x00') setsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f0000000080)=0x3, 0x4) ioctl$sock_proto_private(r2, 0x89ec, &(0x7f0000000300)="1c84ac2c3094ae5bb9fc054da279636b7f4b7e9804009bb198e4100fd223c3e9d523e006f69617a2d4346a30752b45f266bf8603930c8674f8e388d379b73be36a520e8d9c70553e89c6d6ae953b2365") preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={0x0, 0x43}, &(0x7f0000000040)=0xfffffffffffffff4) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000000240)=ANY=[@ANYRES32=r3, @ANYBLOB="0000a700b30f0269b1f9d88d4985ea89161156a2cadcd9353215fb6edeb76bb66ae08b4264efca83b8a7ff00e2250b87a4dd2d439269d11a2cf798fcb7fba7bd0496ec6ffb7996dce55cea1b4fb32e1bd5ae7b61a261a87f2402492b10111bf235d6ed5a0e1561f7a5e062a48451dbb444b12cf1a1a59a0844a4044eda53e0717ea807e2f76cbf61a69bc360f3b8587722746845eb2ca6e6a075ff"], 0xaf) 23:30:59 executing program 0: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r0}) r2 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x20000) restart_syscall() r3 = shmget(0x0, 0x4000, 0xa40, &(0x7f0000ffa000/0x4000)=nil) shmat(r3, &(0x7f0000ffd000/0x3000)=nil, 0x2000) remap_file_pages(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x7, 0x40000) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r2, 0x81785501, &(0x7f00000003c0)=""/4096) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@local, @in=@rand_addr=0x7fff, 0x4e20, 0x0, 0x4e22, 0x7, 0xa, 0xa0, 0x0, 0x0, 0x0, r4}, {0x81, 0x3, 0x9, 0x6, 0xf3, 0x1, 0xc810, 0x100}, {0x9, 0x1, 0x1, 0x7fff}, 0x9, 0x6e6bb4, 0x0, 0x1, 0x1}, {{@in6=@remote, 0x4d4, 0x32}, 0xa, @in=@multicast1, 0x3504, 0x0, 0x3, 0x4, 0x3ff, 0x6}}, 0xe8) setsockopt$inet_mreq(r2, 0x0, 0x24, &(0x7f0000000180)={@multicast2, @rand_addr=0x4}, 0x8) socket$inet6_udp(0xa, 0x2, 0x0) 23:30:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000040)={0x100000000, 0x4, 0x1, 0x4, 0x9, 0x8, 0x7f, 0x230, 0x0}, &(0x7f0000000200)=0x20) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000140)={r1, 0x64, "eb431090568abf66c35dfc600d89c22a1779cc6d1419c75cb467667d7f39e307a907cb746adffa57517c422f7a798cdce2f612e07d2446b8054be07d69c7678eeb022423590493cac50e8782086e3ff6e8ea8a95390d53acdcfb5749920f3370b2edd98b"}, &(0x7f00000001c0)=0x6c) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000000c0)={r1, 0x20, "339f6df492f7189f63ee46696c28dd30cab6a53f4f67e86bd5f48c96dc5d0d14"}, &(0x7f0000000100)=0x28) eventfd(0x100) 23:30:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x3, 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000180)=@in={0x2, 0x0, @multicast1}, 0x80, 0x0}, 0x8000) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, &(0x7f00000008c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) write$selinux_attr(r1, &(0x7f0000000580)='system_u:object_r:fixed_disk_device_t:s0\xfe', 0xff04) write$P9_RSTAT(r1, &(0x7f0000000200)={0xde, 0x7d, 0x2, {0x0, 0xd7, 0x1f, 0x8, {0x20, 0x4, 0x7}, 0x30000000, 0xfffffffffffffffe, 0x0, 0x3ff, 0x29, 'system_u:object_r:fixed_disk_device_t:s0\xfe', 0x29, 'system_u:object_r:fixed_disk_device_t:s0\xfe', 0x29, 'system_u:object_r:fixed_disk_device_t:s0\xfe', 0x29, 'system_u:object_r:fixed_disk_device_t:s0\xfe'}}, 0xde) 23:30:59 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) connect$can_bcm(r0, &(0x7f00000004c0)={0x1d, r1}, 0x10) sendmsg$can_bcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x5, 0x800, 0x0, {0x77359400}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "e3e8ca2320b5a500f48241903043b18cf94937ee7c7aca6e84f99073752a6b07f28635d285cc023e6ac68556e8fbefb09f851aebe35b498d5be794c228df670d"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x6, 0x800, 0x4896, {}, {}, {0x4000000}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "07ed8c1411380c61945f5ec9981b984ec62e2b32628f3a1ec080b502e0e83154d0db74dfca2d60efaa4c3f9af6a8a4ca4528043858dd1fe6e8230ea59cff2b0c"}}, 0xffffffffffffffb7}}, 0x0) 23:30:59 executing program 0: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r0}) 23:30:59 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x16842, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 604.119603][T11602] FAULT_INJECTION: forcing a failure. [ 604.119603][T11602] name failslab, interval 1, probability 0, space 0, times 0 [ 604.276849][T11602] CPU: 1 PID: 11602 Comm: syz-executor.2 Not tainted 5.2.0-rc6-next-20190628 #25 [ 604.286201][T11602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 604.296282][T11602] Call Trace: [ 604.299607][T11602] dump_stack+0x172/0x1f0 [ 604.303976][T11602] should_fail.cold+0xa/0x15 [ 604.308604][T11602] ? fault_create_debugfs_attr+0x180/0x180 [ 604.314531][T11602] ? ___might_sleep+0x163/0x280 [ 604.319414][T11602] __should_failslab+0x121/0x190 [ 604.324525][T11602] should_failslab+0x9/0x14 [ 604.329050][T11602] kmem_cache_alloc+0x2aa/0x710 [ 604.333935][T11602] getname_flags+0xd6/0x5b0 [ 604.338479][T11602] user_path_at_empty+0x2f/0x50 [ 604.343363][T11602] do_mount+0x150/0x1c00 [ 604.348068][T11602] ? copy_mount_options+0x5c/0x3f0 [ 604.353214][T11602] ? copy_mount_string+0x40/0x40 [ 604.358185][T11602] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 604.364465][T11602] ? copy_mount_options+0x2e8/0x3f0 [ 604.369697][T11602] ksys_mount+0xdb/0x150 [ 604.373973][T11602] __x64_sys_mount+0xbe/0x150 [ 604.378686][T11602] do_syscall_64+0xfd/0x6a0 [ 604.383226][T11602] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 604.389257][T11602] RIP: 0033:0x459519 [ 604.393169][T11602] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 604.412788][T11602] RSP: 002b:00007fa0a85ccc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 23:31:00 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer2\x00', 0x444400, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000340)=0x95a2) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$invalidate(0x15, r1) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r1) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x8}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000240)={r4, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}}, 0xfffffffffffffffd, 0xffffffff}, 0x90) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r1}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000380)={r4, @in6={{0xa, 0x4e22, 0x1a83d8fc, @local, 0x1}}}, &(0x7f0000000440)=0x84) [ 604.421229][T11602] RAX: ffffffffffffffda RBX: 00007fa0a85ccc90 RCX: 0000000000459519 [ 604.429220][T11602] RDX: 0000000020000180 RSI: 00000000200000c0 RDI: 0000000020000080 [ 604.437301][T11602] RBP: 000000000075bfc8 R08: 0000000020000500 R09: 0000000000000000 [ 604.445341][T11602] R10: 0000000000202028 R11: 0000000000000246 R12: 00007fa0a85cd6d4 [ 604.453428][T11602] R13: 00000000004c590b R14: 00000000004da058 R15: 0000000000000009 23:31:00 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x8, 0x3a4, 0x8000000001}, 0x3c) r0 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0xa, 0x0, 0x403618, 0x0, 0x109, r0}, 0x3c) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x3ff, 0x2) mincore(&(0x7f0000fff000/0x1000)=nil, 0x1000, &(0x7f0000000780)=""/51) ioctl$TIOCSRS485(r1, 0x542f, &(0x7f00000000c0)={0x2, 0x3f, 0x4}) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_SET_VERSION(r1, 0xc0106407, &(0x7f00000004c0)={0xfffffffffffffffe, 0x1, 0x74, 0x2}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000280)={{{@in=@remote, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@empty}}, &(0x7f0000000380)=0x11) bind$bt_rfcomm(r1, &(0x7f00000007c0)={0x1f, {0x6, 0x7, 0x3ff, 0x9, 0x1000, 0x8}, 0xf5dc}, 0xa) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000740)=0x1bf) getresuid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) mount$9p_virtio(&(0x7f0000000100)='/dev/input/mouse#\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x22d020, &(0x7f00000005c0)={'trans=virtio,', {[{@cachetag={'cachetag', 0x3d, '/dev/input/mouse#\x00'}}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@cache_mmap='cache=mmap'}, {@nodevmap='nodevmap'}, {@afid={'afid', 0x3d, 0x2}}, {@nodevmap='nodevmap'}, {@fscache='fscache'}, {@version_L='version=9p2000.L'}], [{@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@smackfsroot={'smackfsroot', 0x3d, 'GPL.'}}, {@fowner_gt={'fowner>', r3}}, {@uid_eq={'uid', 0x3d, r4}}, {@appraise_type='appraise_type=imasig'}, {@dont_measure='dont_measure'}, {@euid_gt={'euid>', r5}}]}}) 23:31:00 executing program 2 (fault-call:9 fault-nth:5): r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x3, 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000180)=@in={0x2, 0x0, @multicast1}, 0x80, 0x0}, 0x8000) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, &(0x7f00000008c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) write$selinux_attr(r1, &(0x7f0000000580)='system_u:object_r:fixed_disk_device_t:s0\xfe', 0xff04) write$P9_RSTAT(r1, &(0x7f0000000200)={0xde, 0x7d, 0x2, {0x0, 0xd7, 0x1f, 0x8, {0x20, 0x4, 0x7}, 0x30000000, 0xfffffffffffffffe, 0x0, 0x3ff, 0x29, 'system_u:object_r:fixed_disk_device_t:s0\xfe', 0x29, 'system_u:object_r:fixed_disk_device_t:s0\xfe', 0x29, 'system_u:object_r:fixed_disk_device_t:s0\xfe', 0x29, 'system_u:object_r:fixed_disk_device_t:s0\xfe'}}, 0xde) 23:31:00 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x16843, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:00 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x45, 0x8000) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000180)={0x77, @multicast1, 0x4e23, 0x3, 'wrr\x00', 0x8, 0x3, 0x5}, 0x2c) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r1}) 23:31:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0xc) sigaltstack(&(0x7f0000b17000/0x3000)=nil, 0x0) madvise(&(0x7f00002f8000/0xc00000)=nil, 0xc00000, 0xd) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000f00)={0x0, {0x2, 0x4e23, @remote}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}, {0x2, 0x4e23, @remote}, 0x20, 0x0, 0x0, 0x0, 0x77, &(0x7f0000000ec0)='netdevsim0\x00', 0xfe00000000000000, 0x2, 0xfffffffffffffc01}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, &(0x7f0000000640)={{0xfffffffffffffff8, 0x1}}, 0x10) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000680)={'team0\x00', 0x0}) sendmmsg$sock(r1, &(0x7f0000000e00)=[{{&(0x7f0000000940)=@xdp={0x2c, 0x3, r2, 0x7}, 0x80, &(0x7f0000000ac0)=[{&(0x7f00000009c0)="e390a7d642141e32171c3438e1481d599e6e1be46d69cc99a5d0d50fecc9d449a9c7166f017d2381ff4c6aed3d2b38dc182efd4966e870ec8dcec78b40b8b181995053a64215e7a3f6d4b1cfdbad791fa0ae0b662551aae8acce570df5fae6b1c06a22264f2b267685252b5c1719d728cc38ab2ed7e1e7955e4abf52f1d4c410e57869b1a1c9c830cdd802726b04959f53064f33d9d29fd7a10b111e4696f438eb2fce74f01bc2f3bcd06c46e41f45329a750c873e27a9e339282941dd8b14201f", 0xc1}], 0x1}}, {{&(0x7f0000000b00)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e20, @broadcast}, 0x2, 0x3, 0x1, 0x4}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000b80)="b410efb08cc518c4abe70f941130153851b0031697240013a0f20a84741ae0b17a79e66ac32f5b2e8468afd74d86e9597d82644c8f6d280b0d2f5df94c25a223efa26842ecda3c4e354301fc8fe6c51c1e9e6a7d1d9a9fafe6339e3f7129b0a32553abadd05070c93979b352443e33b8a70a52c49f28427a8ba668b2c7cad01d8c222589726d9491e5edcd8ca41a23f17a3a9a30a4f04e6107709633772c790125458bf113c0e6466a1ddd573491bde0a0526bf4eace53ff1bb66b76abf56312874fec66c5c3565bb39093733346b0c9d0b703", 0xd3}, {&(0x7f0000000c80)="24530cc3d88e8e8e9abda70daa2e95bad2f70df7d748d69173f6695dea9ec4f3ed178e69a64573397fd154ae389124cb20b180fd3f9a1b907dea73825abe47f45d9cfdcb21ca", 0x46}, {&(0x7f0000000d00)="a154f5ac5b07c0311cc79ff32930dc8b91777beb5880b9abf16dc9ccf084f62e", 0x20}, {&(0x7f0000000d40)="55b91f42a493ce569d4762c915f75406de0213218c90334566e1835880f02f9f951653ba88b0cd5fae3b0054ba587a6868c9dfe86da5011ac2d1ace2ac4e9d15731f5d44f91889776f3cfc7091e78d8e9f490a72b9ff7f22180669bd48203be0220a1c31be16ed482848b5107ccda8685b73940a95", 0x75}], 0x4}}], 0x2, 0x0) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000800)) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000000e80)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x9c}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x36}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x9}}], 0x48}, 0x0) 23:31:00 executing program 0: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x5, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x6533, 0x210001) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r0}) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000300)={0x2c64}, 0x4) ioctl$SNDRV_TIMER_IOCTL_START(r2, 0x54a0) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vfio/vfio\x00', 0x20000, 0x0) ioctl$UFFDIO_ZEROPAGE(r2, 0xc020aa04, &(0x7f00000002c0)={{&(0x7f0000ffe000/0x2000)=nil, 0x2000}, 0x1}) ioctl$EVIOCSREP(r4, 0x40084503, &(0x7f0000000180)) ioctl$KVM_GET_PIT2(r4, 0x8070ae9f, &(0x7f0000000240)) [ 605.192209][T11657] FAULT_INJECTION: forcing a failure. [ 605.192209][T11657] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 605.205743][T11657] CPU: 0 PID: 11657 Comm: syz-executor.2 Not tainted 5.2.0-rc6-next-20190628 #25 [ 605.205756][T11657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 605.205762][T11657] Call Trace: [ 605.205794][T11657] dump_stack+0x172/0x1f0 [ 605.205820][T11657] should_fail.cold+0xa/0x15 [ 605.205843][T11657] ? fault_create_debugfs_attr+0x180/0x180 [ 605.243190][T11657] ? kasan_check_read+0x11/0x20 [ 605.248090][T11657] ? __lock_acquire+0x1700/0x4c20 [ 605.253240][T11657] ? stack_trace_consume_entry+0x190/0x190 [ 605.259078][T11657] should_fail_alloc_page+0x50/0x60 [ 605.264305][T11657] __alloc_pages_nodemask+0x1a1/0x8f0 [ 605.269695][T11657] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 605.269717][T11657] ? __alloc_pages_slowpath+0x2520/0x2520 [ 605.269734][T11657] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 605.269761][T11657] ? fault_create_debugfs_attr+0x180/0x180 [ 605.286972][T11657] cache_grow_begin+0x90/0xd20 [ 605.297741][T11657] ? getname_flags+0xd6/0x5b0 [ 605.302584][T11657] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 605.309040][T11657] kmem_cache_alloc+0x64b/0x710 [ 605.313938][T11657] getname_flags+0xd6/0x5b0 [ 605.318622][T11657] user_path_at_empty+0x2f/0x50 [ 605.323508][T11657] do_mount+0x150/0x1c00 [ 605.328215][T11657] ? copy_mount_options+0x5c/0x3f0 [ 605.333444][T11657] ? copy_mount_string+0x40/0x40 [ 605.338415][T11657] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 605.338434][T11657] ? copy_mount_options+0x2e8/0x3f0 [ 605.338455][T11657] ksys_mount+0xdb/0x150 [ 605.338475][T11657] __x64_sys_mount+0xbe/0x150 [ 605.338497][T11657] do_syscall_64+0xfd/0x6a0 [ 605.338523][T11657] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 605.338537][T11657] RIP: 0033:0x459519 [ 605.338555][T11657] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 605.338563][T11657] RSP: 002b:00007fa0a85ccc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 605.401655][T11657] RAX: ffffffffffffffda RBX: 00007fa0a85ccc90 RCX: 0000000000459519 [ 605.409774][T11657] RDX: 0000000020000180 RSI: 00000000200000c0 RDI: 0000000020000080 [ 605.417774][T11657] RBP: 000000000075bfc8 R08: 0000000020000500 R09: 0000000000000000 [ 605.425990][T11657] R10: 0000000000202028 R11: 0000000000000246 R12: 00007fa0a85cd6d4 [ 605.434164][T11657] R13: 00000000004c590b R14: 00000000004da058 R15: 0000000000000008 23:31:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0xc) sigaltstack(&(0x7f0000b17000/0x3000)=nil, 0x0) madvise(&(0x7f00002f8000/0xc00000)=nil, 0xc00000, 0xd) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000f00)={0x0, {0x2, 0x4e23, @remote}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}, {0x2, 0x4e23, @remote}, 0x20, 0x0, 0x0, 0x0, 0x77, &(0x7f0000000ec0)='netdevsim0\x00', 0xfe00000000000000, 0x2, 0xfffffffffffffc01}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, &(0x7f0000000640)={{0xfffffffffffffff8, 0x1}}, 0x10) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000680)={'team0\x00', 0x0}) sendmmsg$sock(r1, &(0x7f0000000e00)=[{{&(0x7f0000000940)=@xdp={0x2c, 0x3, r2, 0x7}, 0x80, &(0x7f0000000ac0)=[{&(0x7f00000009c0)="e390a7d642141e32171c3438e1481d599e6e1be46d69cc99a5d0d50fecc9d449a9c7166f017d2381ff4c6aed3d2b38dc182efd4966e870ec8dcec78b40b8b181995053a64215e7a3f6d4b1cfdbad791fa0ae0b662551aae8acce570df5fae6b1c06a22264f2b267685252b5c1719d728cc38ab2ed7e1e7955e4abf52f1d4c410e57869b1a1c9c830cdd802726b04959f53064f33d9d29fd7a10b111e4696f438eb2fce74f01bc2f3bcd06c46e41f45329a750c873e27a9e339282941dd8b14201f", 0xc1}], 0x1}}, {{&(0x7f0000000b00)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e20, @broadcast}, 0x2, 0x3, 0x1, 0x4}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000b80)="b410efb08cc518c4abe70f941130153851b0031697240013a0f20a84741ae0b17a79e66ac32f5b2e8468afd74d86e9597d82644c8f6d280b0d2f5df94c25a223efa26842ecda3c4e354301fc8fe6c51c1e9e6a7d1d9a9fafe6339e3f7129b0a32553abadd05070c93979b352443e33b8a70a52c49f28427a8ba668b2c7cad01d8c222589726d9491e5edcd8ca41a23f17a3a9a30a4f04e6107709633772c790125458bf113c0e6466a1ddd573491bde0a0526bf4eace53ff1bb66b76abf56312874fec66c5c3565bb39093733346b0c9d0b703", 0xd3}, {&(0x7f0000000c80)="24530cc3d88e8e8e9abda70daa2e95bad2f70df7d748d69173f6695dea9ec4f3ed178e69a64573397fd154ae389124cb20b180fd3f9a1b907dea73825abe47f45d9cfdcb21ca", 0x46}, {&(0x7f0000000d00)="a154f5ac5b07c0311cc79ff32930dc8b91777beb5880b9abf16dc9ccf084f62e", 0x20}, {&(0x7f0000000d40)="55b91f42a493ce569d4762c915f75406de0213218c90334566e1835880f02f9f951653ba88b0cd5fae3b0054ba587a6868c9dfe86da5011ac2d1ace2ac4e9d15731f5d44f91889776f3cfc7091e78d8e9f490a72b9ff7f22180669bd48203be0220a1c31be16ed482848b5107ccda8685b73940a95", 0x75}], 0x4}}], 0x2, 0x0) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000800)) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000000e80)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x9c}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x36}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x9}}], 0x48}, 0x0) 23:31:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x20001000008912, &(0x7f0000000080)="c0dc00025e0b01047be070") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x22100, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f0000000140)={0x8, 0x14, [0x7, 0x1f, 0x9, 0x7, 0x6]}) unshare(0x8000400) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/exec\x00') ioctl$UI_SET_RELBIT(r2, 0x40045566, 0x6) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) migrate_pages(r4, 0x4, &(0x7f0000000240)=0x75021675, &(0x7f0000000280)) getsockopt$rose(r3, 0x104, 0x7, &(0x7f00000001c0), &(0x7f0000000180)=0x4) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0xfffffffffffffffc, 0xf43, 0x10001, 0x2, 0x10001}) ioctl$VHOST_SET_VRING_ERR(r2, 0x4008af22, &(0x7f0000000040)={0x2, r2}) 23:31:02 executing program 0: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x48400, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x1}, 0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000180)={0x2, 'bcsf0\x00', 0x5}, 0xffffffffffffff20) ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f00000000c0)={0x8001, 0xfff, 0xffffffff, 0x4, 0xbf5, 0x7}) 23:31:02 executing program 1: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000080)=0x7) read$FUSE(r0, 0x0, 0x0) statfs(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000480)={0x100000001, 0x2, 0x7, 0x0, 0x0, [], [], [], 0x7ff, 0x2}) 23:31:02 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x30000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:02 executing program 2 (fault-call:9 fault-nth:6): r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca50200a1801c87dddacfec7b704a") clone(0x11208000, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x6) 23:31:02 executing program 0: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0xc0001, 0x0) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000180)) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r0}) 23:31:02 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000001100)='/dev/vhci\x00', 0x200001) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000001140)={0x0, @in6={{0xa, 0x0, 0x0, @remote}}}, &(0x7f0000001200)=0xffffffffffffff3e) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f00000010c0)=0x2, &(0x7f0000001080)=0xffffffffffffff77) r2 = semget$private(0x0, 0x6, 0x80) semctl$GETZCNT(r2, 0x7, 0xf, &(0x7f0000000080)=""/4096) 23:31:02 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000100)={0x18, 0x0, {0x2, @broadcast, 'gre0\x00'}}, 0x1e) fsetxattr$security_smack_entry(r0, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f00000000c0)='\x00', 0x1, 0x2) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20\x00', 0x10100, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x20000, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000040)={0x25eb}, 0x1) sendmmsg(r0, &(0x7f0000005b40), 0x40000000000014d, 0x0) ioctl$VIDIOC_G_OUTPUT(r2, 0x8004562e, &(0x7f0000000140)) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000200)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000300)={&(0x7f00000001c0), 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x54, r3, 0x31, 0x70bd2d, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @mcast2}, @FOU_ATTR_PEER_V6={0x14, 0x9, @loopback}, @FOU_ATTR_PEER_V4={0x8, 0x8, @local}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}]}, 0x54}, 0x1, 0x0, 0x0, 0x44000}, 0x8040) 23:31:02 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r3 = socket(0x200000000000011, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000001c0)={'dummy0\x00', 0x0}) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x14) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000000)=0x8, 0x4) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000180)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x6000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r5, 0x22, 0x70bd2c, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x80) io_setup(0x7, &(0x7f00000000c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000040), 0xfdef}]) 23:31:02 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000003c0)={0x4000000000001, @sdr={0x41414770, 0xfffffffffffffffc}}) 23:31:02 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f000002bff8)='./file0\x00', 0x0) r2 = inotify_init1(0x0) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) gettid() rt_sigprocmask(0x0, &(0x7f000003b000), 0x0, 0x8) inotify_add_watch(r2, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r3 = dup2(r1, r2) ioctl$VT_SETMODE(r3, 0x5602, &(0x7f0000000040)={0x5, 0x8, 0x2f, 0x3, 0x835}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) pipe(&(0x7f0000000000)) 23:31:02 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x200000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:02 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000080)=[{{0x0, 0x4, 0x0, 0x0, 0x0, 0x30c}}, {{&(0x7f00000005c0)=@tipc, 0x244, 0x0}}], 0x2, 0x0) [ 607.131885][T11725] FAULT_INJECTION: forcing a failure. [ 607.131885][T11725] name failslab, interval 1, probability 0, space 0, times 0 [ 607.189456][T11725] CPU: 1 PID: 11725 Comm: syz-executor.2 Not tainted 5.2.0-rc6-next-20190628 #25 [ 607.198630][T11725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 607.208927][T11725] Call Trace: [ 607.212243][T11725] dump_stack+0x172/0x1f0 [ 607.216592][T11725] should_fail.cold+0xa/0x15 [ 607.221203][T11725] ? fault_create_debugfs_attr+0x180/0x180 [ 607.227042][T11725] ? ___might_sleep+0x163/0x280 [ 607.231917][T11725] __should_failslab+0x121/0x190 [ 607.236876][T11725] should_failslab+0x9/0x14 [ 607.241425][T11725] __kmalloc+0x2e0/0x770 [ 607.245691][T11725] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 607.251967][T11725] ? d_absolute_path+0x11b/0x170 [ 607.256935][T11725] ? __d_path+0x140/0x140 [ 607.261322][T11725] ? tomoyo_encode2.part.0+0xf5/0x400 [ 607.266722][T11725] tomoyo_encode2.part.0+0xf5/0x400 [ 607.272071][T11725] tomoyo_encode+0x2b/0x50 [ 607.276505][T11725] tomoyo_realpath_from_path+0x1d3/0x7a0 [ 607.276532][T11725] tomoyo_mount_acl+0x149/0x840 [ 607.276555][T11725] ? kasan_check_read+0x11/0x20 [ 607.276573][T11725] ? mark_lock+0xc0/0x11e0 [ 607.276589][T11725] ? lock_downgrade+0x920/0x920 [ 607.276611][T11725] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 607.307054][T11725] ? kasan_check_read+0x11/0x20 [ 607.311949][T11725] ? trace_hardirqs_off+0x62/0x240 [ 607.317121][T11725] ? lock_acquire+0x190/0x410 [ 607.321831][T11725] ? tomoyo_mount_permission+0x10a/0x410 [ 607.327509][T11725] tomoyo_mount_permission+0x16a/0x410 [ 607.333001][T11725] ? tomoyo_mount_permission+0x10a/0x410 [ 607.338761][T11725] ? tomoyo_mount_acl+0x840/0x840 [ 607.343895][T11725] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 607.350346][T11725] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 607.350363][T11725] ? strncpy_from_user+0x2b4/0x400 [ 607.350397][T11725] tomoyo_sb_mount+0x35/0x40 [ 607.350426][T11725] security_sb_mount+0x87/0xd0 [ 607.350456][T11725] do_mount+0x1d4/0x1c00 [ 607.350481][T11725] ? copy_mount_options+0x5c/0x3f0 [ 607.350497][T11725] ? copy_mount_string+0x40/0x40 [ 607.350513][T11725] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 607.376038][T11725] ? _copy_from_user+0x12c/0x1a0 [ 607.376061][T11725] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 607.376080][T11725] ? copy_mount_options+0x2e8/0x3f0 [ 607.376101][T11725] ksys_mount+0xdb/0x150 [ 607.376123][T11725] __x64_sys_mount+0xbe/0x150 [ 607.408984][T11725] do_syscall_64+0xfd/0x6a0 [ 607.409011][T11725] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 607.409023][T11725] RIP: 0033:0x459519 [ 607.409053][T11725] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 607.409069][T11725] RSP: 002b:00007fa0a85ccc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 607.460630][T11725] RAX: ffffffffffffffda RBX: 00007fa0a85ccc90 RCX: 0000000000459519 [ 607.468747][T11725] RDX: 0000000020000180 RSI: 00000000200000c0 RDI: 0000000020000080 [ 607.476832][T11725] RBP: 000000000075bfc8 R08: 0000000020000500 R09: 0000000000000000 [ 607.476843][T11725] R10: 0000000000202028 R11: 0000000000000246 R12: 00007fa0a85cd6d4 [ 607.476851][T11725] R13: 00000000004c590b R14: 00000000004da058 R15: 0000000000000009 23:31:03 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f000002bff8)='./file0\x00', 0x0) r2 = inotify_init1(0x0) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) gettid() rt_sigprocmask(0x0, &(0x7f000003b000), 0x0, 0x8) inotify_add_watch(r2, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r3 = dup2(r1, r2) ioctl$VT_SETMODE(r3, 0x5602, &(0x7f0000000040)={0x5, 0x8, 0x2f, 0x3, 0x835}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) pipe(&(0x7f0000000000)) 23:31:03 executing program 5: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='numa_maps\x00') ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000140)={0x8}) semop(0x0, &(0x7f00000003c0)=[{}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x2) ioctl$BLKPG(r1, 0x1269, &(0x7f00000000c0)={0x2, 0x1, 0x78, &(0x7f0000000040)="95e88768f8e4adb0d7f334a962a2006e1e090755bcb1fa2d6cae04f8c788ee2cbd2e0b891df51331aad5e9d39b45f141f72afd47b9e98737389b9fc0b2c0e8ade0177b47a86a5f39715bf1878bc00bcde02ddab99df56e9ab15ae17d84e62046e41d95a56dcff4c8debf44be9e46043e6d51ffb9ab15b1f4"}) [ 607.639118][T11725] ERROR: Out of memory at tomoyo_realpath_from_path. 23:31:03 executing program 2 (fault-call:9 fault-nth:7): r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:03 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f000002bff8)='./file0\x00', 0x0) r2 = inotify_init1(0x0) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) gettid() rt_sigprocmask(0x0, &(0x7f000003b000), 0x0, 0x8) inotify_add_watch(r2, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r3 = dup2(r1, r2) ioctl$VT_SETMODE(r3, 0x5602, &(0x7f0000000040)={0x5, 0x8, 0x2f, 0x3, 0x835}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) pipe(&(0x7f0000000000)) 23:31:03 executing program 5: io_setup(0x1, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) r2 = open(&(0x7f0000000180)='./file0\x00', 0x101000, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000001c0)=')eth1\xbd]cpuset\x00') r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x80002, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r3, &(0x7f0000000100)={0x10000003}) ioctl$SIOCX25SCUDMATCHLEN(r3, 0x89e7, &(0x7f0000000040)={0x47}) 23:31:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x2) r1 = socket$kcm(0xa, 0x800000005, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x7}], 0x20}, 0xfc) 23:31:03 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0xf0ffff, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:03 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200440, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000040)={'NETMAP\x00'}, &(0x7f0000000080)=0x1e) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0xed, 0xc02) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000100)=0xa759, 0x4) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000140)=@gcm_256={{0x304}, "9b12c4faef62bbb7", "52ae83951ddb4baa4a7e3529a282dd512816a78833459a0d3580b4fbd24a2d32", "ae436ce6", "cf5b0c6d182a330c"}, 0x38) write$FUSE_WRITE(r1, &(0x7f0000000180)={0x18, 0xfffffffffffffff5, 0x5}, 0x18) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000001200)={0x18, 0x0, &(0x7f00000001c0)=[@acquire_done={0x40106309, 0x3}, @exit_looper], 0x1000, 0x0, &(0x7f0000000200)="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"}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000012c0)={0xffffffffffffffff, r1, 0x0, 0xb, &(0x7f0000001280)='/dev/midi#\x00'}, 0x30) sendmsg$nl_netfilter(r1, &(0x7f0000001380)={&(0x7f0000001240)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x1c, 0x2, 0x2, 0x522, 0x70bd26, 0x25dfdbfb, {0x7, 0x0, 0x8}, [@typed={0x8, 0x78, @pid=r3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) mkdirat(r1, &(0x7f00000013c0)='./file0\x00', 0x8) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000001400)={0x1, 0x0, @pic={0x1, 0xe9e, 0xffffffff, 0x0, 0x8000, 0x5, 0x21, 0x0, 0x9, 0x0, 0x0, 0x2, 0xfffffffffffffffa, 0x1, 0xfffffffffffffff8, 0x80}}) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) write$P9_RLOCK(r1, &(0x7f0000001500)={0x8, 0x35, 0x1, 0x3}, 0x8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001540)={0x0, 0x0}, &(0x7f0000001580)=0xc) r5 = getegid() fchown(r0, r4, r5) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000001640)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000001600)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000001680)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f00000015c0)=0x1, r6, 0x0, 0x2, 0x4}}, 0x20) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f00000016c0)={0x2, 0x3, @start={0x4}}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000001740)=0x7c, 0x4) bind(r2, &(0x7f0000001780)=@nfc={0x27, 0x0, 0x0, 0x6}, 0x80) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000001800)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000001840)=0x10) write$P9_RMKDIR(r0, &(0x7f0000001880)={0x14, 0x49, 0x1, {0x81, 0x2, 0x7}}, 0x14) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001900)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000001bc0)={&(0x7f00000018c0), 0xc, &(0x7f0000001b80)={&(0x7f0000001940)={0x210, r9, 0x601, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x3c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_BEARER={0x28, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'hwsim0\x00'}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}]}, @TIPC_NLA_LINK={0x74, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x540}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x22}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x10000}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10000}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10000}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x400}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x10000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0xac, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc0000}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffbff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffff7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x210}, 0x1, 0x0, 0x0, 0x20000000}, 0x880) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000001c40)={r8, 0x3c, &(0x7f0000001c00)=[@in6={0xa, 0x4e24, 0xff, @loopback, 0x8}, @in={0x2, 0x9, @multicast1}, @in={0x2, 0x4e20, @multicast1}]}, &(0x7f0000001c80)=0x10) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000001cc0)={0x9, [0x3, 0x3d, 0x9, 0xdfea, 0x3, 0x8, 0x5, 0x1, 0x4]}, 0x16) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001d00)={r7, 0x6, 0x1, [0x2]}, &(0x7f0000001d40)=0xa) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000001d80)={r10, 0x8000, 0x162e, 0x1, 0xed, 0x180000}, &(0x7f0000001dc0)=0x14) [ 608.131477][T11764] FAULT_INJECTION: forcing a failure. [ 608.131477][T11764] name failslab, interval 1, probability 0, space 0, times 0 23:31:03 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000003740)=0x0) lstat(&(0x7f0000003780)='./file0\x00', &(0x7f00000037c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getgid() r5 = fcntl$getown(r0, 0x9) r6 = geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003840)={0x0, 0x0, 0x0}, &(0x7f0000003880)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003c80)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003cc0)={{{@in=@initdev, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000003dc0)=0xe8) getgroups(0x4, &(0x7f0000003e00)=[0x0, 0xee00, 0xee01, 0xffffffffffffffff]) r11 = getpgrp(0xffffffffffffffff) stat(&(0x7f0000004000)='./file0\x00', &(0x7f0000004040)={0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getegid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000040c0)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004100)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000004200)=0xe8) lstat(&(0x7f0000004240)='./file0\x00', &(0x7f0000004280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000004440)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000004480)={{{@in=@loopback, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@empty}}, &(0x7f0000004580)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000045c0)={0x0, 0x0, 0x0}, &(0x7f0000004600)=0xc) r20 = fcntl$getown(r0, 0x9) stat(&(0x7f0000004a40)='./file0\x00', &(0x7f0000004a80)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004b00)={0x0, 0x0, 0x0}, &(0x7f0000004b40)=0xc) r23 = getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004b80)={{{@in6=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000004c80)=0xe8) r25 = getegid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000004cc0)=0x0) fstat(r0, &(0x7f0000004d00)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000004d80)='./file0\x00', &(0x7f0000004dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005140)=0x0) getresuid(&(0x7f0000005180), &(0x7f00000051c0)=0x0, &(0x7f0000005200)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005240)={0x0, 0x0, 0x0}, &(0x7f0000005280)=0xc) r32 = getpgrp(0xffffffffffffffff) stat(&(0x7f0000004400)='./file0\x00', &(0x7f0000005300)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000005380), &(0x7f00000053c0), &(0x7f0000005400)=0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000005440)={0x0}, &(0x7f0000005480)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000054c0)={{{@in=@multicast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f00000055c0)=0xe8) r37 = getgid() r38 = getpid() getresuid(&(0x7f0000005600), &(0x7f0000005640)=0x0, &(0x7f0000005680)) getresgid(&(0x7f00000056c0), &(0x7f0000005700), &(0x7f0000005740)=0x0) r41 = fcntl$getown(r0, 0x9) fstat(r0, &(0x7f0000005780)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000005800)='./file0\x00', &(0x7f0000005840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005900)={0xffffffffffffffff, r0, 0x0, 0xd, &(0x7f00000058c0)='/dev/usbmon#\x00', 0xffffffffffffffff}, 0x30) r45 = getuid() stat(&(0x7f0000005940)='./file0\x00', &(0x7f0000005980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r47 = getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006c40)={{{@in=@multicast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000006d40)=0xe8) getresgid(&(0x7f0000006d80), &(0x7f0000006dc0)=0x0, &(0x7f0000006e00)) r50 = getpgrp(0xffffffffffffffff) r51 = getuid() stat(&(0x7f0000006e40)='./file0\x00', &(0x7f0000006e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r1, &(0x7f0000006f80)=[{&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000003680)=[{&(0x7f0000000200)="5a2163cc6abad68badd2dc375c64ff26d80841671b19e076177af4ee437e9d7196e460a4e06df41655b1702a5d6e29fcf367fee186cabfe1315934ba2f1c43249f260afb4cfccbf562f805cf3bc2", 0x4e}, {&(0x7f0000000280)="b104bf77129c4cc9b12bd504f3cfcb5ee64a3c3b77ddbfa2adc21c3b492ffa1fe018674f18addfc077d988f38ce2f2328678c28f1fd4c77b87143e5eeeb486f9f86fbab29e3236c69d91505d3ffd5ae63a01286d686b24d1c843086becdeb3398764efa592960a7c4d0aea4fc2a0bd435f70be3cbfd7829e583c4aed43df03afbcaacb5e5be7661f2ac3c29ba85d08ed624b2e908c8518b2b8b82acdde1e3d5ffe69b6e1f9310bb4ffd9113f0b5918307ba51aa6eaaab66b7b351c9661890226ebe8d1fcd41c56e285dec443c2003ffbc5f6a3b384ca2fb4674b329bf1eaaa33e4d973737f490338e6e10e6b558b4ae136", 0xf1}, {&(0x7f0000000380)="6aeb578dde544ee9beb9d78c9ffc4a511b362cbf43be08176c146550e37a5643cb4c81629d31d8254bc707f93fa7b20d5dbb063be2a7c1ca018667e77fb479997bf333a081c5303e9ca4931eb6546fea482a43e53a02827951", 0x59}, {&(0x7f0000000440)="b3ed955cb29087d3368d9d27f219ffbf22da310c4b865a9d0dba39fc4cc7af244d38fea5b63f4b1d8ce586925f89a657b0f414ff0c7e64165cc6fdc5581623d238a7216954619e614fc2af925a6ddf9aeaab6e048731407fbd92aa0964fbee480ad3f47422d1bfa29a029377b0fc6e1017545992c819c2120717846bed2abc60caa4a477cf7dfe3d88f0fcb95ea31f41a0974f45e82ea61b576c7cb541b0ed60889943303c096a412d4a6c68be9bc30eb254de1a653390142f6e803c7d0c14f9f06c670427a6e4fe9b7a1a6d1692ed6d914a9570234263fc568c7457c2bc5dec59", 0xe1}, {&(0x7f0000000540)="017311b7ac0d0530f3fd7acfe5613b44585d248cd53cf44d81c144b928b2a16b", 0x20}, {&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000001580)="ea390459cec1bfc0d14965b990f7ce9cec1fe4f18c3635353850a4773322afb24957b3280865591f7996c8786756f8266cc8f62a9c022127684831e444908275094b788835e8fe8fd988833aa03d0d4382addac812ca45b14ead6af1c180ad2f96bc5a93524260cf82aa036f6cfe45f544ab08f3db0d4ee60229064c13f73d5e490f876388e2b3e661d7ea48f49d9d4716cacc963759e85c169eeb7cb6688118d53a4f3350af93630bd012d16ae7b6b1c4425c6e08ea46c544f1423645878afc3eaec0b11e2337a03d55adfb3a716166df92f97fd3a127d4e046e650d32de4b541760aff9779547ea42f", 0xea}, {&(0x7f0000001680)="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", 0x1000}, {&(0x7f0000002680)="4f50acf8d3ccf99b1e32827431d57b300baef54a0f5ea8df277f88be9c09c66745b3a3a5b939fbd391ae242c343ecfbdd5cd350647ace6d08fb38328cadb4ef40d3caf3d9a5f7ace1b020f9b755d94aeee3f4159b1fcd415da3fcfaed3f58bfd2c325750ae43404cf4fea1d7250cb03fc4da4efc97d5e2adf5420a617d7ac906bb2f9be896e784c468e99915e0bcae43d4a276841bff77e1379e722d56d44c3b92b13ccc001ded0579f497c84b12a8ffdf6d1c5403515f66c2e019fa826770a5b5b8c7535c5cbf8d0ff23a541c50839f62c961e47c78a0273e87af02bf345140e58e7aa188ca71159039d33fa313879626ca2c76113c89341b4f2c76f74c7c5df5517e04dd003e703c300bb921b34ac9dba5fdd1e97daed56e82413e50c11ab362d0654c537b485deb2116a56e793b1e0a60735a2bcf8f85e008e068e4474a1b73c71f68ff9bd05ce1d765c1849effc6f3c81e86299eb2d728369c121fea3c58cac158fcf3fcf0f983a591f5eae9025c8251bc85a39041058ff7eb1aa3cbae514eb98d1ca70ce5bbfd2bc2a7fc78b5856d4e623e4007f6c3022bf53aa65d8ccaf94ef77c8510a1fafe64a04936241fef40f46f1180846e70eaaecda9594c37650e6aca3d535f0223a0db27f9cda68fbd620ae227cb5876a1cf64dcdf99115c33bb5d07026d1ff4b440d9ba97d6f98451bc1714b6dbc9813bfbf7d9b185a159454621f0fad6874398908865dd4d277ba1ace711468c92b21aecc5efad25ded19b11fa85ffc36b00a3597493a23af335ba1c93bbe60f57e5d44104d63bc0e9a49a536e190025a28c1fe8151b1dc7522dda4e0d942af01806a57a7fedab4c50d64f17a0c1f152233ad00aabaacee79a1b4707c00b685b9cdb17790b632efeb051471025f775be9f63d3b4b42420597289841e84bfd4c98edc746f81548c834b6cc2c11d8bfc9dbad611c612c76b973a0b7a0a3ba8a87859257c3acd13743fc2224c2197451e54c1d1636e8b86f2b6098cfb3f5c666213350cf865ab3ca47397ac4aedfef2780e4f1cde8b687abd9b485531d531e22201e5002c52b306106b23351703f9e415d3c9cefa2f93bf24c32da039b36276f44c36ed0578a983e745bdcd3159743b6da24c1fc10c27190cfea87d336573de017863923e2a097652d68c341a48963544b0806d750e1443794e4780cb657fe52a3cafd6a86e148c136944af232bcd12712b2f8943d685390f5e9619b2f41471aa6f00f8a8524beafa8f024d7d186c0c5ee3a3fac7398fb1d1a73acf5ba7847f23454d2544dc941c0867a38dfd4b3decbe7099eabe4bd443d82a8311608be0a3b59b4f92ff486224e655d492d53c63379ca46852a821ccc2fd5d411ea49dde1ce9ae96c6605b5aa629be645adab5cc790e6ff8f10a242753391d281d1a984f3c338005131f0980a3201b28134f80ccad6733a3e0ff91f3fd3c358b13750b720a64994239b9a9fc3d1871fa93aea37ea0c9544e598ee1a0a3508ed47b2f3b3b9b06c519edee26e906b31d5bdb38916d754c216d18d317e4a04c4b5adef0325d4d100d32bc696ce7c5c91aa88dc7ed5579bbb17f476730d3f2d93be5e55b0b3d139e03dd497609c5335eed30322aac791335166fa4511ce5ee25eec5bc6911d4521cb6c8783bcc0fcb71bb4cd522c9c084a4c6d26d0d5af7b1e45a957edc0adf68ddd7773f653e39808f2901d228004dd1f6d8d6209caaf3310c80701b999647cb93388080cbb484fac1aeaf892fc99554da8811697a147f7bff9b47e9795f74a1429c4c6d608b78b4d68489ebde37244cd9ee5616d931d1ec3a5a27a31e8a287426c058201acca4673dfe58d7340c50915e256aa5a8452feff322fdf6d20b0ae0b4ff6047be391e4416e83b1e682e2eb4aa56e2f77857a0a7a2fc738cb06a73907732219a6a871ef50c708071e1e9167221dadb2debfc2c0c88f7bbe1412a644ac5f19f85c011b3bb379708163fcf46abb6ea239f569d23d131076b64989d8b7b8c99a8adce5b9238c4b123df05004618039d243e864f0f8819b93c183aa1afebc1539d7adb22e60a1b280ab8aaa91c51940c60ba15eb7848df2642b3c73c72f840f7d17f72e795eec00ecdee3406a3a6af363348b95b6656a2fc7d0a31b348b99928ae56460f3187e3a2284434b74b3311dc860ab935cf51df5a96ea77bedbdae82980555f3c56b7410fecfddf82c2c5198f130141e68fa2c57e1dfc7513283a3ff4eccb0003eb58ad587dd8ac9f84184fadf06b6be68d57623f0555b7b86a6134af690201f9fac0c2ca0fc20c7c17dac31b12212b5e845a2b9883f67d54f47b0c631495d7e739457e838a6984bfca2d9e144b2d6760b4044a0c1238517b6b4d70cfd812c540a4d6ef8ce2a3f50513d89cfab17cc4b3fbdf831f8f1412634e572536598daa6e15d9a2c1460306901b6b9d419b04abaf15c045000e65c3e7bcbb557256d6c4da1ed7360f596d604150a70eaf9b239c58d5badc85cb37000859bf5d78ae6e14c826d712eed2a0d4f238ed7f6c95bbb03dc116e27820044f1320290a891bec49f2b55e7ae02cbfeac490d2b3bf491c00526d6237b22b8693274d55fe9a0fdeb6c6e1515174084cc60b6703c3515e66e0807febf4f541f6372040c6b49b1a51f7e49a64dcec2ae38ddc05444f8bc64334d2e5351ae96d2e4d35f13d9b1c3b2ceecfc5c159836fb802cee552a07608bddb06d62d687b7a5c748f9f7f2cff5c096685a5caec852b7b667f2f15a353c6506965e746d36219930d68958b0abe951c03e2a80850049171fe28d56f3101634489d77b9ed05da3872d6adbe05c3cc65b155e6b4d584e164d35099273a57811ad73e7ac50dea173f10becbcdd40b75d6a7e2f909a6c0065d13846205d5d81b635be245140904e070d4183ddf9411ce771de9748dc3fec30cbae6b65b4356b4430d7c23b9485bc94f3fb5cbdd0ca843ebc0495402e7105a15f8d36cdfd8c31e2c83a1c1d834ecf7e39000fc4012c71a7a4751207628d1d3975ae835452a33ba6d387c63579be73d6a2a269b6ed6dcfe0257f8a89274407e64db00ffa0bccae1e7d137e718b407780e5cb2b0825478c4209c0c65f8485e55426fbf9a7ee2c1d6bc8eff4dd0709f1dbe233d1e064c40d56c84a6426aa11e3252510254358a61cdfc07a883dd4a0d3fa0fc6f2a4e1d245963a2cc31df9215ac72846f89879f5a8692dbcc963b5596a8768c8a05703427d8bd6ed17be9bdcc14568f61ec458d7f233221d7a0f14bafc147734869e4693b60e61a3d4fdf302d7510e9d5cee7b3adc209220f3578edd4e52f4b26b26ba268c41080bf69972a4de29f4344c04cb8065a7da15da4f1db43c3da167e6f62b763ba0f79161f42f71206f532c38fc436dc12d58e23628eadaae218889ceac5edbbe28efc63c25af5aea32c066333b69acb7ece078ededc1da6f8e7a74fe65f9a6dc8dd444f4cfc3ff49c346f0322ecb76a6f3228940b25379c7dc8b473cbf5c8a466f62ac8a58b9f334d569be381630ef8a508a9a309941947f11725b0263de75e249cd90404a9757108bfdddab454458db02714102f085759cb63cb7e677c47952b1d0b361944f3a84e5eee7f8b5fa5709cef43cd55e91fdf55453d18baace166d0e3705c5825f194b6d12a00af5d047f6fb98381e72cd51a55e7f78783d4bb7013736f18b40afddf49b87fd45decc333739b5efb746771417d035e0f0294482ddd02509a674bb1d190e75e8884453ad2c705f1be2a1857e792db0d60a323e6054330bef2b1368d60b7ad0f4ee82e2c91fefffb201d1ab6ceede2e1d230406eeeb74f075b81b5ec67bcf1bb042fbf12a88a4c7f161771e927e83c456b4335b3c1e4b693591a23f71b23c8a0f9b8e6297301af628e204172dcad678d275258400d0b0d0152457de487bccc181560d308c93605d4b02cc8b0ed7f55628e5d08dd19be5c338a187766bc9c2b2355ed4a4e2e41aa1c490699d41156719bfc85d7a08add11959627f6f75231b647915e451ebf62d89c042992332145b330445ecc815de31275c5517942719cda57710f233f3202ff3ff54409a1a645c64285549214abe0e27ccae5222385980c654a5490136b600eda018ba2fb7329142fb86cfd709bc8d133318d6a45cd087cb0cc4856d1a80e653ff46b9f1b628ff2c3b1aa9a96e0b27faf64b73758a96e3137a21ef856b95c589cac5d6cf9b031c3702a66d712cca7f3628e591e93e01d1affc52f8a01c69762ea05e7b7dee923bc659bbfa6a21bf20e0324e925e015f8a3dab0eded23becb128bd02e5324ed7f540c0e74fb30c1968a4511bc5cbd4d21ee58957b14733c5bd6f03eaf5003d47550aeef5ba5eeb5146c72b1d4a5cd2167e2551d5f94d0558386c49f2a313ef86957766dcf35a3434c3bec90adaf133be1138df4a8a44a31850732a4cdb8d30de56848befd56b85a5f0e25594a47b1e0052445dde50a02a19b34afc2b3f50188cad5252fe735f6e45ee05b32277d47b2544324cf15616ce0555c632a6e62749bb4f004449103c6e52b7d8df3ff697e552b0fd721ae7dde0a8c017b23cc2888d5acbc404a46672633bbbcf2f3f81f4e9a97805bf46f91b9e9c2a9b18ca6b0f636cb1a8b92e9158f550756559b3c65288696330b5db9dc48910bfd2e204f9ff4de08ea860b014ccbdafdd26e1d861acad1df3a582bbd87a3cb1e15a05c939574a57967499bcb2ed657f2ff300a62a66b37ad264a57d58528f05476faa2f347726a88f519b7759f91db5284d90a1d1ec8ebc4817cd740c80ee94920fc19696e8c928143a1eafd75ce089dc8814b1c34656f3918ce36093b74fa046b573be31e6918519120cbb59584efb320cad7b9ab47434f12667374f5f569cceae474d46aae8d658497839b96cf5ff2cb11c4a3a0e411760c711367c035d9e46b72d20d911fb42b7d952bb3b319cefcf8dc5055ffae10d211f694da69c2863295be8ea6e38267bec748c8f1e03d72cb05db3ee6ec8dfea38be6d3f9babd9dca474ac13a57c7b87959e4a5f840ccfb10bb51d567a839531f309c9503580628339a7ecb7a8fcafca54f64cf02d0544bce70a3f97b378591c0792c7915dcf57dcadcf517c2319f9ef402c1f9fe77912afe67abd3c8e36d7b1e53b60794a95e6cfdde55075d41fc383fc08fe1d27199a5638e42b87616abbe80e9d91cff70b219df8df730ab2008eabfd80829ebf7e09956871d2bd1b04fd10ab6ae805085eb086677cff518f8a3b09ab58035b918393195b98b9223e7968f90e3893027e5d85457357fef7d76bec989cebb7e6a202a84e819b4bd19cf8114e8614b8a25b654b4f39cbb8055677878f5f731eddad14e21768dc7e60bfea5e6aae3966e3a6ec092cf2e2049a16b7832feb7c077d7c0afe90b483b4a3aa8acf2c8408b8323c65b58fc8bdf1e0de07de61f5f7ad30c298bc1e5268e76dab91a628cf143d460ccca26f57ffd4aba616e50ac4c1c158ea521fcc42068317cfab825c1ff507bd63708ad182c97eb73bdc16655a46eb74460745c3f5bebeb121813db7297fc4d79764ca7bb03ead65dfacc2515ca75a44bc5c8a5091f9869e70657a600fa3fddaf14e84500512a1073442ac8c6146e242ff2613d9d4f71ed13e1d46842078cd10db801826291c2e4f0a08a27d342ce86a5e5ee761ce8809c13d2d5f7e24804b4a9ef1a3ef03f45a7db72d7e2b6193d011faaa617e5ce74753bacaab79b6c7ab6d3c03b1b0c6b029c40aa7c0b6b42672204f9bec36de0e2c3ea858cfe4f6fcb3", 0x1000}], 0x9, &(0x7f00000038c0)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}], 0x40, 0x400c0}, {&(0x7f0000003900)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003c40)=[{&(0x7f0000003980)="41ee1a28944a3318fb6a548cca332295869f1ff93ad10d0a6e249720f5a98b7e6ae27666add14b91ad7570f2dddb20b186f0d561dd38c9c9e42439b71414383820e275a9b76954bb8c2f43e55403fe6acac24f303d0bf492c7c2c02cd7e5f5f0bf246df2f002a1438c1f95f42976d7500a55a390bac5f0b01bc5fcdf757ffcdf414192bbc1cbd85cfea71e0bc9a7870b60d6b17581b43e2a964999d86fab30c8fa5c39d6ddf5d457d2b9223df1d01d0c4980d2683e73a1cfef4728f07dd5e15f8ddc0604", 0xc4}, {&(0x7f0000003a80)="6bcfade3558729272ae092b34086c6f4539bbe791f59af288e50d59219c9625075739f3cf368af0263c2f89a1240043dbccb033e49475310ea36d1a505faf7b5ec9ad0ae7c670253e347f592c4b36376b721b39c91f27fc3ea53787ffe01183203021c5459b8b1c7dee7524f21f853f91ba5eabc7dbe7f4b77b15a9c7c77c2438d8aa57d230a34e17a3fa3f944553ac673b094eda756ded4803449798b0c54704ed9b33607341ca8ebaf7ed68f742db9cac351f62c59f3f2888eb8ba823c7c174d58750ab93b00d08dd8c7df03203c2ce800fc810f594ef88c1e02dee5b82e419f70788b98ff828505c0192d77f32479", 0xf0}, {&(0x7f0000003b80)="c9febd09f6472977d0dd70e1f0d5fbd7b2864e6436afe8969d4431091315eb1bf882472a182b1f3a0f6b6e05f156e76bcf74c9ba2d857697294ce475dc063c1e0d78f71a5fc913ebbda5ba00bbf1e23e238ee53489eef963104e5dc9dbace84e552f5511469bc5ec84476a80ea7c8ee4a7006a4704e07817ca5abf1617b462476f2144b39741183aa8f6f406e6977649450661b6d218829f9c0f0278e00bbf", 0x9f}], 0x3, &(0x7f0000003e40)=[@cred={{0x1c, 0x1, 0x2, {r8, r9, r10}}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x38, 0x20000000}, {&(0x7f0000003e80)=@abs={0x5cbdc31f32034aaf, 0x0, 0x4e21}, 0x6e, &(0x7f0000003fc0)=[{&(0x7f0000003f00)="1843e1d61257b8c34f6d321bf1acc0096131a4627df47345292e0c1e7a956706146594f375955a009ccd078aa360910b9bf8b628064b4477f17a515e100a6612bc0a26c22acf367902d0b09020ac2f879f80443f20fa8328e1af6e0642b8ccaec05f5cff491427a849e554fc185bcfaa390b2ea163c69316caff67bae34d35ab59cba4dd587d3b272d792d0a0d5fd4863b080400af92d554b60a3093bd0f8b8b539f3bd8d047175939b34de8fa31c2b19ab5938d5971a008e9", 0xb9}], 0x1, &(0x7f0000004300)=[@cred={{0x1c, 0x1, 0x2, {r11, r12, r13}}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r14, r15, r16}}}], 0x60, 0x80}, {&(0x7f0000004380)=@file={0x9b7d92c5c63bdf64, './file0\x00'}, 0x6e, &(0x7f0000004400), 0x0, &(0x7f0000004640)=[@cred={{0x1c, 0x1, 0x2, {r17, r18, r19}}}, @rights={{0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x70, 0x8000}, {&(0x7f00000046c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000004800)=[{&(0x7f0000004740)="ff43420e27622abcac9b4e8a5d1a093f5c502019c2c4dd0930cb81eb927d069a767cad684398c4f76321c7524eec0871a95b613de49c10ffb6bbf10b7dcebadd174cecdf5714089916c8aa611832f330102a44f75907e9b523a4efbe4479c1e2609a6cf9760261e2644dca329e5d7ccbd6e02d9c4389ffdd82ce581c7a015b3b7edadf9ef9125ae44380a86be80e4074b9b6bc0e133be3bdf152ae970212b7266b73f67025e3", 0xa6}], 0x1, 0x0, 0x0, 0x840}, {&(0x7f0000004840)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000004a00)=[{&(0x7f00000048c0)="43f7404f7d5559ce416c0a90c4e9981a39ae47a7831d400a9aa05e9ade9b668be0964dd1ee0b4a4db51f", 0x2a}, {&(0x7f0000004900)="7e6661c8476aaf69ebe792f60baaf0142dd8c9e5abc2aefca8147f6baed1a58e973836eb29724e2ca1f792c2c101e27dd2af6340f91d28a465256f14cbc3371398c84a1167f7ffc653a32b091f2cee1478bb3eeaac2c12ce05483f87553c364a9dc83d05f9fc5be699ccd448d627066061471ad95a1099f37262b95f5cb01e5fa83f55f92b9ad3b45950968dbd196e0ff7dab8f2045a5aa751e9d363bed75d1d2a94319034e51032b721e6709720e444b85657cdf36a0af70e6ca56f8b0741245c84582f55", 0xc5}], 0x2, &(0x7f0000004e40)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r20, @ANYRES32=r21, @ANYRES32=r22, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r23, @ANYRES32=r24, @ANYRES32=r25, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="00000000180000000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r26, @ANYRES32=r27, @ANYRES32=r28, @ANYBLOB='\x00\x00\x00\x00'], 0xb0, 0x40000}, {&(0x7f0000004f00)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000005100)=[{&(0x7f0000004f80)="74293c70a0674f39757261909692185d466e249a1793668de27a8c6895df8880567a0d44c781470823bd105579709661852069a1a36afa73d35dd07b9384e147429c6642b6d1a693dd6b7851b3b8540f675a1868841354413ef6b7519f8f55c9542bd807ac7e7d143d253a5138ae1af838", 0x71}, {&(0x7f0000005000)="678112eac311e0c38f4a5f4a4cbae63ee4f39b4e119d680effbb811960c08cc0af6cb9869979ddc7aa5df286ba46e031e0edd2b691a5ee2f28f7d7a81be35c171bec58addfca6818696e1e82a02254585acad923d1106b8514327afc80cf5665feafacbba91ec2601396e8b4ce59d8f358a8f642f210473b4c7b24b80cf31627f7c6a056ac4d10836ff81bb4aa2e36f01a629aca3e79b7f9d6f3d54536f3909e38e8d2ffa26059f386a13c08727446ed80c35515898b8f0cd343b02d0eeeb2432ff0f49634c5b5a2183b7179df58d0cce19c88221839833f905f48195adb64b1541ec8a65a310fa35a", 0xe9}], 0x2, &(0x7f0000007140)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r29, @ANYRES32=r30, @ANYRES32=r31, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r32, @ANYRES32=r33, @ANYRES32=r34, @ANYBLOB="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", @ANYRES32=r35, @ANYRES32=r36, @ANYRES32=r37, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r38, @ANYRES32=r39, @ANYRES32=r40, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r41, @ANYRES32=r42, @ANYRES32=r43, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r44, @ANYRES32=r45, @ANYRES32=r46, @ANYBLOB='\x00\x00\x00\x00'], 0x110, 0x4801}, {&(0x7f0000005b40)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000006c00)=[{&(0x7f0000005bc0)="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", 0x1000}, {&(0x7f0000006bc0)="e887cefe112e16634a9149f3e91ce4b0650da757be0a73aa999d2fda4856adfa7c", 0x21}], 0x2, &(0x7f0000006f00)=[@cred={{0x1c, 0x1, 0x2, {r47, r48, r49}}}, @cred={{0x1c, 0x1, 0x2, {r50, r51, r52}}}, @rights={{0x18, 0x1, 0x1, [r0, r0]}}], 0x58, 0x44040}], 0x8, 0x41) r53 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x100, 0x0) getsockopt$bt_BT_FLUSHABLE(r53, 0x112, 0x8, &(0x7f00000000c0)=0x22, &(0x7f0000000100)=0x4) r54 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x0) mmap(&(0x7f0000a05000/0x400000)=nil, 0x400000, 0x2, 0x8012, r54, 0x0) 23:31:03 executing program 5: fremovexattr(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x7f, 0x10000) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f00000000c0)=0xffffffffffffff9c) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000300)) readv(r1, &(0x7f0000395000)=[{&(0x7f00004d2000)=""/4096, 0x1000}], 0x1) connect$l2tp(0xffffffffffffffff, &(0x7f0000000400)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x26) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, 0x0) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x10001, 0x4000) [ 608.292471][T11764] CPU: 1 PID: 11764 Comm: syz-executor.2 Not tainted 5.2.0-rc6-next-20190628 #25 [ 608.301634][T11764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 608.312001][T11764] Call Trace: [ 608.315408][T11764] dump_stack+0x172/0x1f0 [ 608.319769][T11764] should_fail.cold+0xa/0x15 [ 608.324379][T11764] ? fault_create_debugfs_attr+0x180/0x180 [ 608.330211][T11764] ? ___might_sleep+0x163/0x280 [ 608.335099][T11764] __should_failslab+0x121/0x190 23:31:04 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f000002bff8)='./file0\x00', 0x0) r2 = inotify_init1(0x0) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) gettid() rt_sigprocmask(0x0, &(0x7f000003b000), 0x0, 0x8) inotify_add_watch(r2, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r3 = dup2(r1, r2) ioctl$VT_SETMODE(r3, 0x5602, &(0x7f0000000040)={0x5, 0x8, 0x2f, 0x3, 0x835}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) pipe(&(0x7f0000000000)) [ 608.340061][T11764] should_failslab+0x9/0x14 [ 608.344586][T11764] __kmalloc+0x2e0/0x770 [ 608.349041][T11764] ? tomoyo_realpath_from_path+0xc0/0x7a0 [ 608.354813][T11764] ? rcu_read_lock_sched_held+0x110/0x130 [ 608.360665][T11764] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 608.366412][T11764] tomoyo_realpath_from_path+0xcd/0x7a0 [ 608.372024][T11764] tomoyo_mount_acl+0x149/0x840 [ 608.376924][T11764] ? kasan_check_read+0x11/0x20 [ 608.381811][T11764] ? mark_lock+0xc0/0x11e0 [ 608.386276][T11764] ? lock_downgrade+0x920/0x920 [ 608.391416][T11764] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 608.391436][T11764] ? kasan_check_read+0x11/0x20 [ 608.391462][T11764] ? trace_hardirqs_off+0x62/0x240 [ 608.391499][T11764] ? lock_acquire+0x190/0x410 [ 608.411689][T11764] ? tomoyo_mount_permission+0x10a/0x410 [ 608.417444][T11764] tomoyo_mount_permission+0x16a/0x410 [ 608.417478][T11764] ? tomoyo_mount_permission+0x10a/0x410 [ 608.428700][T11764] ? tomoyo_mount_acl+0x840/0x840 [ 608.433929][T11764] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 23:31:04 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x1000000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 608.440247][T11764] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 608.446521][T11764] ? strncpy_from_user+0x2b4/0x400 [ 608.451660][T11764] tomoyo_sb_mount+0x35/0x40 [ 608.456365][T11764] security_sb_mount+0x87/0xd0 [ 608.461159][T11764] do_mount+0x1d4/0x1c00 [ 608.465465][T11764] ? copy_mount_options+0x5c/0x3f0 [ 608.471626][T11764] ? copy_mount_string+0x40/0x40 23:31:04 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) socket$isdn(0x22, 0x3, 0x24) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={@remote, 0x0, @bcast, @bpq0='bpq0\x00', 0x0, [@bcast, @rose, @default, @netrom, @default, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}) [ 608.471655][T11764] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 23:31:04 executing program 3: r0 = socket(0x40000000002, 0x3, 0x6) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000080)=0x81, 0x4) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, 0x0}, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000000)=0x8001, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) [ 608.471670][T11764] ? copy_mount_options+0x2e8/0x3f0 [ 608.471688][T11764] ksys_mount+0xdb/0x150 [ 608.471706][T11764] __x64_sys_mount+0xbe/0x150 [ 608.471725][T11764] do_syscall_64+0xfd/0x6a0 [ 608.471747][T11764] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 608.471760][T11764] RIP: 0033:0x459519 [ 608.471776][T11764] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 608.471784][T11764] RSP: 002b:00007fa0a85ccc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 608.471800][T11764] RAX: ffffffffffffffda RBX: 00007fa0a85ccc90 RCX: 0000000000459519 [ 608.471809][T11764] RDX: 0000000020000180 RSI: 00000000200000c0 RDI: 0000000020000080 [ 608.471817][T11764] RBP: 000000000075bfc8 R08: 0000000020000500 R09: 0000000000000000 [ 608.471825][T11764] R10: 0000000000202028 R11: 0000000000000246 R12: 00007fa0a85cd6d4 [ 608.471833][T11764] R13: 00000000004c590b R14: 00000000004da058 R15: 0000000000000009 23:31:04 executing program 2 (fault-call:9 fault-nth:8): r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:04 executing program 0: sysinfo(0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) write$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000480)='./file0\x00', 0x0) fanotify_mark(0xffffffffffffffff, 0x11, 0x2, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x84) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r1, 0x0, 0x8800032) bind$inet6(0xffffffffffffffff, 0x0, 0x0) clock_getres(0x7, &(0x7f0000000080)) write$P9_RSYMLINK(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, 0x0, 0x0) [ 608.779890][T11764] ERROR: Out of memory at tomoyo_realpath_from_path. 23:31:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = semget$private(0x0, 0x3, 0xc576ab6e8844daa) semctl$IPC_STAT(r2, 0x0, 0x2, &(0x7f00000000c0)=""/68) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x8, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB="0000000000003000000000000000000000122e6f5d3c89c28675d46904c391c63016a5fcb6be1828d4382e02e0a8f00a657446290a26e3b0bd8376f89f225d0ed0c51a47bf7be8cf07977cc1333be678a51b154df435b3854336e87cbea3db919bf091303cdbe71e16a1c3ef2c0b51fdd644c76398a615cd3649c60d25c9d08c4660c30e4e9a358c3da23fdbe1acf810cbeaf4adc49dfec78dec2f2b38de6efe1060fab46d54"]], 0x0, 0x0, 0x0}) 23:31:04 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x800000000006, 0x2dfff8cef9e98d32, 0xffffffffffffffff, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x20082, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000100)={r0, 0x0, 0x5, "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"}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, &(0x7f00000000c0)) 23:31:04 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x2000000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 609.087363][ T26] audit: type=1800 audit(1561851064.754:65): pid=11800 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16549 res=0 [ 609.194508][ T26] audit: type=1800 audit(1561851064.884:66): pid=11809 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16549 res=0 [ 609.242233][T11804] FAULT_INJECTION: forcing a failure. [ 609.242233][T11804] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 609.255613][T11804] CPU: 1 PID: 11804 Comm: syz-executor.2 Not tainted 5.2.0-rc6-next-20190628 #25 [ 609.264972][T11804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 609.275057][T11804] Call Trace: [ 609.278393][T11804] dump_stack+0x172/0x1f0 [ 609.282765][T11804] should_fail.cold+0xa/0x15 [ 609.287391][T11804] ? __kmalloc+0x163/0x770 [ 609.291839][T11804] ? fault_create_debugfs_attr+0x180/0x180 [ 609.297680][T11804] ? do_mount+0x1d4/0x1c00 [ 609.302119][T11804] ? ksys_mount+0xdb/0x150 [ 609.302171][T11804] ? __x64_sys_mount+0xbe/0x150 [ 609.302187][T11804] ? do_syscall_64+0xfd/0x6a0 [ 609.302205][T11804] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 609.302221][T11804] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 609.302242][T11804] should_fail_alloc_page+0x50/0x60 [ 609.302257][T11804] __alloc_pages_nodemask+0x1a1/0x8f0 [ 609.302277][T11804] ? __alloc_pages_slowpath+0x2520/0x2520 [ 609.302303][T11804] ? fault_create_debugfs_attr+0x180/0x180 [ 609.302325][T11804] cache_grow_begin+0x90/0xd20 [ 609.302344][T11804] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 609.302363][T11804] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 609.302381][T11804] __kmalloc+0x6af/0x770 [ 609.302403][T11804] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 609.302424][T11804] tomoyo_realpath_from_path+0xcd/0x7a0 [ 609.302455][T11804] tomoyo_mount_acl+0x149/0x840 23:31:05 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x40000000000a43c, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x204}], 0x1, 0x0, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x100000001, 0x80000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) 23:31:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) r1 = socket(0x40000000015, 0x5, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r1, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 609.302475][T11804] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 609.302492][T11804] ? kasan_check_read+0x11/0x20 [ 609.302509][T11804] ? mark_lock+0xc0/0x11e0 [ 609.302528][T11804] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 609.302546][T11804] ? kasan_check_read+0x11/0x20 [ 609.302570][T11804] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 609.302608][T11804] ? lock_acquire+0x190/0x410 [ 609.302624][T11804] ? tomoyo_mount_permission+0x10a/0x410 [ 609.302649][T11804] tomoyo_mount_permission+0x16a/0x410 [ 609.302671][T11804] ? tomoyo_mount_permission+0x10a/0x410 [ 609.312057][T11804] ? tomoyo_mount_acl+0x840/0x840 [ 609.312090][T11804] ? __phys_addr_symbol+0x49/0x70 [ 609.312120][T11804] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 609.312138][T11804] ? strncpy_from_user+0x2b4/0x400 [ 609.312157][T11804] tomoyo_sb_mount+0x35/0x40 [ 609.312178][T11804] security_sb_mount+0x87/0xd0 [ 609.312201][T11804] do_mount+0x1d4/0x1c00 [ 609.312217][T11804] ? retint_kernel+0x2b/0x2b [ 609.312238][T11804] ? copy_mount_string+0x40/0x40 [ 609.312257][T11804] ? copy_mount_options+0x252/0x3f0 [ 609.312272][T11804] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 609.312288][T11804] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 609.312304][T11804] ? copy_mount_options+0x2e8/0x3f0 [ 609.312327][T11804] ksys_mount+0xdb/0x150 [ 609.312347][T11804] __x64_sys_mount+0xbe/0x150 [ 609.312374][T11804] ? do_syscall_64+0x5b/0x6a0 [ 609.322650][T11804] do_syscall_64+0xfd/0x6a0 [ 609.322678][T11804] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 609.322692][T11804] RIP: 0033:0x459519 [ 609.322709][T11804] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 609.322718][T11804] RSP: 002b:00007fa0a85edc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 609.322733][T11804] RAX: ffffffffffffffda RBX: 00007fa0a85edc90 RCX: 0000000000459519 [ 609.322742][T11804] RDX: 0000000020000180 RSI: 00000000200000c0 RDI: 0000000020000080 23:31:05 executing program 5: syz_emit_ethernet(0x0, 0x0, &(0x7f0000000100)) madvise(&(0x7f00000a2000/0x600000)=nil, 0x600000, 0x8) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0xc) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000080)={0x1, 0x6, 0x1, 0x80000000}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") madvise(&(0x7f00000a2000/0x600000)=nil, 0x600000, 0x8) 23:31:05 executing program 3: r0 = socket(0x10, 0x8000e, 0x0) sendto(r0, &(0x7f0000000140)="120000c6a080001200e704007b1a3fcd03000000a1", 0xffffffffffffffc1, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400210}, 0xc, &(0x7f0000000100)={&(0x7f00000006c0)=ANY=[@ANYBLOB="52998ed34bd5ace13aa1c5a60421f7f65881f089bfd00cd12a6ac4a3bf62e7c7faaeccf13381ab3d4d95b55ad005fd39b5dd0820af2da8e6cbcb8112c688160f74c76150ebe5e385c0cf4dfb002bde7bf53c6667f26fa2789d99f5ebf2e70c409242147c2404178fa5bae6831413c01116cf09bb3f20f0db2a3ead423a9384d9970f31ba01e56662917c265c428cfbdef3267bbd9d5a1b717f0ec012004aba60693fd05270c5df9a3efe5a6578d0df1f48947dd007069754e069903ddf957ebe7c724de1d1270e2581c5e786bfeaa20b59e9267048f01f30a0637ab888ad0401dd", @ANYRES16=r1, @ANYBLOB="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"], 0x194}}, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000000)=0x7, 0x4) recvmmsg(r0, &(0x7f00000037c0), 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 23:31:05 executing program 2 (fault-call:9 fault-nth:9): r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 609.322752][T11804] RBP: 000000000075bf20 R08: 0000000020000500 R09: 0000000000000000 [ 609.322761][T11804] R10: 0000000000202028 R11: 0000000000000246 R12: 00007fa0a85ee6d4 [ 609.322770][T11804] R13: 00000000004c590b R14: 00000000004da058 R15: 0000000000000007 [ 609.490750][ T26] audit: type=1800 audit(1561851065.164:67): pid=11818 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="cachefiles" dev="sda1" ino=17165 res=0 23:31:05 executing program 0: r0 = socket$tipc(0x1e, 0x2, 0x0) io_setup(0x1, &(0x7f00000001c0)=0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x1, 0x10) io_submit(r1, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0, 0x7ffffffff000}]) 23:31:05 executing program 3: r0 = socket$inet6(0xa, 0x100800000000002, 0x41) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000000), 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='smaps\x00') recvmsg(r0, &(0x7f0000000280)={&(0x7f0000000040)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000480)=[{&(0x7f00000000c0)=""/91, 0x5b}, {&(0x7f0000000140)=""/19, 0x13}, {&(0x7f0000000200)=""/92, 0x5c}, {&(0x7f0000000300)=""/152, 0x98}, {&(0x7f00000003c0)=""/175, 0xaf}, {&(0x7f0000000180)=""/62, 0x3e}], 0x6, &(0x7f0000000500)=""/104, 0x68}, 0x40000042) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000640)={{{@in=@rand_addr=0xf1e, @in=@dev={0xac, 0x14, 0x14, 0x26}, 0x4e20, 0x7, 0x4e23, 0x401, 0x2, 0xa0, 0x0, 0xff, r2, r3}, {0x10001, 0x1ff, 0x2, 0x3f, 0xb296, 0x1f, 0x101, 0x1}, {0x7ff, 0x3, 0x0, 0x4}, 0x8, 0x6e6bbd, 0x2, 0x0, 0x1, 0x2}, {{@in=@local, 0x4d4, 0x32}, 0xa, @in6=@mcast1, 0x3501, 0x4, 0x0, 0x3c9, 0xd, 0xffff, 0x5}}, 0xe8) sendfile(r0, r1, 0x0, 0x88001) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f0000000740)=0x56cd) 23:31:05 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x420400) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0xbc, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x1, @empty, 0x3ff}, @in={0x2, 0x4e20, @empty}, @in6={0xa, 0x4e24, 0x1, @ipv4={[], [], @local}, 0x6}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e23, 0x3, @ipv4={[], [], @multicast1}, 0x20}, @in={0x2, 0x4e20, @remote}, @in6={0xa, 0x4e22, 0x4136cc60, @local, 0x8001}, @in6={0xa, 0x4e22, 0xa1, @local, 0x1}]}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000200)={r1, 0x1, 0x10, 0x2, 0xfffffffffffffffd}, &(0x7f0000000240)=0x18) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000001c0)={0x1, 0x2, 0x5, 0xffffffff}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) socket$inet_udplite(0x2, 0x2, 0x88) r3 = memfd_create(&(0x7f0000000640)='\x06\x00\x00\xb6\xafTJ\xa24\xbe\x02\xff\x8b\x90\x8a\xd3\xb3\x8cm\n\x94E\xcb\xec\xfcMpG\x1f\xdc\xb2\bK\x90\xbc\x9e\x04MP)\xb0~*#b\xa1F\x99\xe0\x0eD\xc60\xde?\xcc\xaa\\Y\xe2\x8f\x1b\x01\xe9\xa6\xb1$U\x94\xea#\xd3\xb7\xf1\x8b\xda\xba||\xeeZ+\xed^6\xd1.\xc0\x029\xd8\xb4]\xea\x88\x95\xc0Km\x10\xebP9\xb5\xe6I,tx\xaa]\xfeH\xff\b4\x8fHmj\x91@\xc6y\xd9\x12\xbe\xe1 S\xda~\x89\xf5u*\x92\x05$Hvo\xfa}\x15\xec\x85\x85\x19\x18\xcd\xb4\x8fyR\xeec!\xa9&\xad\xbd\xdd\xa6\x19j\x04\v\x80a\r\x9b(*\xafS\xd7 \xd2D\x06nIQ\x0e\xb1\xf3)\xbd\xaa\xa1\xf2\xadh\v\xd3l\xa7\x9c\x9f\xde(5\x9c_\xc3M\xbf(\xb4\xb8\x89e5q\xf4oI\xfd>\x8d\x19V?#\x95\xf3l\xd3\"?/t\x1aR9\xce\xc1\xaf/\xae\xd7\xd6a\xa01>', 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) fallocate(r2, 0x11, 0x0, 0xc00000) 23:31:05 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x1, 0x0) io_setup(0x3, &(0x7f00000001c0)=0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r4, 0x80605414, &(0x7f0000000040)=""/16) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000200)={0x800, 0x5, 0x4, 0x0, 0x0, [{r0, 0x0, 0x2}, {r1, 0x0, 0x7f}, {r0, 0x0, 0x8001}, {r2, 0x0, 0x2}]}) io_submit(r3, 0x2, &(0x7f0000000700)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0xa, 0x0, r1, 0x0}]) ioctl$TIOCGDEV(r4, 0x80045432, &(0x7f0000000080)) [ 609.918876][T11839] FAULT_INJECTION: forcing a failure. [ 609.918876][T11839] name failslab, interval 1, probability 0, space 0, times 0 23:31:05 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x3000000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 609.996547][T11839] CPU: 1 PID: 11839 Comm: syz-executor.2 Not tainted 5.2.0-rc6-next-20190628 #25 [ 610.005709][T11839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 610.015812][T11839] Call Trace: [ 610.019140][T11839] dump_stack+0x172/0x1f0 [ 610.023625][T11839] should_fail.cold+0xa/0x15 [ 610.028247][T11839] ? fault_create_debugfs_attr+0x180/0x180 [ 610.034091][T11839] __should_failslab+0x121/0x190 [ 610.039062][T11839] should_failslab+0x9/0x14 [ 610.048155][T11839] __kmalloc+0x2e0/0x770 [ 610.052518][T11839] ? tomoyo_encode2.part.0+0xba/0x400 [ 610.057924][T11839] ? tomoyo_encode2.part.0+0xf5/0x400 [ 610.063326][T11839] tomoyo_encode2.part.0+0xf5/0x400 [ 610.068551][T11839] ? tomoyo_realpath_from_path+0x322/0x7a0 [ 610.074398][T11839] tomoyo_encode+0x2b/0x50 [ 610.078855][T11839] tomoyo_realpath_from_path+0x1d3/0x7a0 [ 610.084532][T11839] tomoyo_mount_acl+0x149/0x840 [ 610.089551][T11839] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 610.095051][T11839] ? kasan_check_read+0x11/0x20 [ 610.099930][T11839] ? mark_lock+0xc0/0x11e0 [ 610.104382][T11839] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 610.109966][T11839] ? kasan_check_read+0x11/0x20 [ 610.115037][T11839] ? __this_cpu_preempt_check+0x3a/0x210 [ 610.120702][T11839] ? retint_kernel+0x2b/0x2b [ 610.125341][T11839] ? lock_acquire+0x190/0x410 [ 610.125361][T11839] ? tomoyo_mount_permission+0x10a/0x410 [ 610.125385][T11839] tomoyo_mount_permission+0x16a/0x410 [ 610.125401][T11839] ? tomoyo_mount_permission+0x10a/0x410 [ 610.125418][T11839] ? tomoyo_mount_acl+0x840/0x840 [ 610.125437][T11839] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 610.125472][T11839] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 610.146977][T11839] ? strncpy_from_user+0x2b4/0x400 [ 610.147002][T11839] tomoyo_sb_mount+0x35/0x40 [ 610.147021][T11839] security_sb_mount+0x87/0xd0 [ 610.147046][T11839] do_mount+0x1d4/0x1c00 [ 610.147069][T11839] ? copy_mount_string+0x40/0x40 [ 610.147085][T11839] ? copy_mount_options+0x270/0x3f0 [ 610.147111][T11839] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 610.147127][T11839] ? copy_mount_options+0x2e8/0x3f0 [ 610.147149][T11839] ksys_mount+0xdb/0x150 [ 610.158555][T11839] __x64_sys_mount+0xbe/0x150 [ 610.158576][T11839] ? do_syscall_64+0x5b/0x6a0 [ 610.158594][T11839] do_syscall_64+0xfd/0x6a0 [ 610.158619][T11839] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 610.158632][T11839] RIP: 0033:0x459519 [ 610.158649][T11839] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 610.158665][T11839] RSP: 002b:00007fa0a85edc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 610.188727][T11839] RAX: ffffffffffffffda RBX: 00007fa0a85edc90 RCX: 0000000000459519 [ 610.188738][T11839] RDX: 0000000020000180 RSI: 00000000200000c0 RDI: 0000000020000080 [ 610.188746][T11839] RBP: 000000000075bf20 R08: 0000000020000500 R09: 0000000000000000 23:31:06 executing program 2 (fault-call:9 fault-nth:10): r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 610.188754][T11839] R10: 0000000000202028 R11: 0000000000000246 R12: 00007fa0a85ee6d4 [ 610.188761][T11839] R13: 00000000004c590b R14: 00000000004da058 R15: 0000000000000007 [ 610.194892][T11839] ERROR: Out of memory at tomoyo_realpath_from_path. 23:31:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000000), &(0x7f0000000080)=0xc) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) ioctl$sock_ifreq(r1, 0x8937, &(0x7f0000000100)={'veth0\x00', @ifru_settings={0x10001, 0x0, @fr=0x0}}) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x4, 0x0, 0x0) 23:31:06 executing program 3: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x10}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x7e) utime(0x0, 0xffffffffffffffff) 23:31:06 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0x0, 0x4, 0x0, 0x180}, 0x3c) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1000, 0x40) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f00000001c0)=""/253) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x6, 0x8, 0x4}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={r1, @in6={{0xa, 0x4e22, 0x6, @ipv4={[], [], @remote}, 0x3}}, 0x8, 0x401, 0x0, 0x7ff, 0x10}, &(0x7f0000000180)=0x98) 23:31:06 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) getpgid(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000180)=0x0) r1 = syz_open_procfs(r0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00\xea\x89Zczo\xa6\xa6\x80\x00/\xb8\x05\x94#\x1d\xe0\x8c\xcfe\x00\xb6BQ\xfb\n\x10\xbfjX2\x19\x9a\xed\xe9\xea6\xadx\x98\xcecx8Xy~?8uJm\xdarFYZ\xfev\xefz\xff\x813/P/K\xbb\xdc\xa2\xdd x\x05\xa9}\x99[KQ\xc2\xc8\xc1\x19\xb4\x1ba\xae\xa5\xdf\xa9\xe3cu9\xebA\x89/\x9d#\xc7\x19\x01\xd7\xf6;\xac\xaf\x11\xec\x1b\xc4\xcb<\x02Z\x17\xb5\xcd\x1f\xc7\x995\xbe\x0f\x11\xd3\xfc\x00'/145) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='status\x00') writev(r1, &(0x7f0000000080)=[{&(0x7f0000000100)="793a83230a", 0x5}], 0x1) preadv(r2, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/161, 0xa1}], 0x1, 0xfffffffffffffffe) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000340)={0x4bec671f, 0xc, 0x4, 0x400000, {0x77359400}, {0x7, 0x9, 0x4, 0x3, 0x2, 0x5, "fed60566"}, 0x7ff80000000000, 0x3, @userptr=0x8000, 0x4}) [ 610.638027][T11873] FAULT_INJECTION: forcing a failure. [ 610.638027][T11873] name failslab, interval 1, probability 0, space 0, times 0 23:31:06 executing program 0: socket$netlink(0x10, 0x3, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/video35\x00', 0x2, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_GET_CPUID2(r0, 0xc008ae91, &(0x7f0000000200)={0x2, 0x0, [{}, {}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000280)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000380)=ANY=[@ANYBLOB="02000000000000000100000000000000709b1dc3f0d1193b0023b77e65e9cb75bbfd1fcb449cc701220000007189dccb00002ee89eb40000000000000000000000000000000000c700000000000000000000000000002428321c170c30da1820426b0e4beb969226f1f3b9650ddee09683a0dda94139cc6262ec63249b4852afe95f2bcc"]) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x97f4, &(0x7f0000000040)="c0dca5055e0bcfec7be070") pselect6(0x40, &(0x7f00000000c0)={0x3}, 0x0, &(0x7f0000000100)={0x1b7}, 0x0, 0x0) [ 610.765538][T11873] CPU: 0 PID: 11873 Comm: syz-executor.2 Not tainted 5.2.0-rc6-next-20190628 #25 [ 610.774831][T11873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 610.784945][T11873] Call Trace: [ 610.788473][T11873] dump_stack+0x172/0x1f0 [ 610.792825][T11873] should_fail.cold+0xa/0x15 [ 610.797527][T11873] ? fault_create_debugfs_attr+0x180/0x180 [ 610.803363][T11873] ? ___might_sleep+0x163/0x280 [ 610.808263][T11873] __should_failslab+0x121/0x190 [ 610.813260][T11873] should_failslab+0x9/0x14 [ 610.817815][T11873] kmem_cache_alloc_trace+0x2d3/0x790 [ 610.823213][T11873] ? kasan_check_read+0x11/0x20 [ 610.823254][T11873] legacy_init_fs_context+0x48/0xe0 [ 610.823269][T11873] ? generic_parse_monolithic+0x200/0x200 [ 610.823283][T11873] alloc_fs_context+0x3a7/0x690 [ 610.823302][T11873] fs_context_for_reconfigure+0x73/0x90 [ 610.823320][T11873] do_mount+0x8f5/0x1c00 [ 610.823342][T11873] ? copy_mount_string+0x40/0x40 [ 610.859422][T11873] ? __sanitizer_cov_trace_const_cmp8+0x1/0x20 [ 610.865609][T11873] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 610.871884][T11873] ? copy_mount_options+0x2e8/0x3f0 [ 610.877116][T11873] ksys_mount+0xdb/0x150 [ 610.881384][T11873] __x64_sys_mount+0xbe/0x150 [ 610.886097][T11873] do_syscall_64+0xfd/0x6a0 [ 610.890638][T11873] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 610.896940][T11873] RIP: 0033:0x459519 [ 610.900873][T11873] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 610.929056][T11873] RSP: 002b:00007fa0a85edc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 610.937506][T11873] RAX: ffffffffffffffda RBX: 00007fa0a85edc90 RCX: 0000000000459519 [ 610.945506][T11873] RDX: 0000000020000180 RSI: 00000000200000c0 RDI: 0000000020000080 [ 610.953504][T11873] RBP: 000000000075bf20 R08: 0000000020000500 R09: 0000000000000000 23:31:06 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x4000000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:06 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af00, &(0x7f0000000180)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000140)={0xffffffffffffff9c}) accept4$packet(r1, 0x0, &(0x7f00000001c0), 0x80800) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) accept(r0, &(0x7f00000002c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000340)=0x80) recvmmsg(0xffffffffffffff9c, &(0x7f00000041c0)=[{{&(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000400)=""/114, 0x72}], 0x1, &(0x7f00000004c0)=""/63, 0x3f}, 0x380}, {{&(0x7f0000000500)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000580)=""/141, 0x8d}], 0x1, &(0x7f0000000680)=""/230, 0xe6}, 0x2}, {{&(0x7f0000000780)=@isdn, 0x80, &(0x7f0000001900)=[{&(0x7f0000000800)=""/142, 0x8e}, {&(0x7f00000008c0)=""/59, 0x3b}, {&(0x7f0000000900)=""/4096, 0x1000}], 0x3, &(0x7f0000001940)=""/192, 0xc0}, 0x1ff}, {{&(0x7f0000001a00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000001bc0)=[{&(0x7f0000001a80)=""/24, 0x18}, {&(0x7f0000001ac0)=""/255, 0xff}], 0x2, &(0x7f0000001c00)=""/4096, 0x1000}, 0x3}, {{&(0x7f0000002c00)=@pppol2tpin6, 0x80, &(0x7f0000003e80)=[{&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f0000003c80)=""/25, 0x19}, {&(0x7f0000003cc0)=""/104, 0x68}, {&(0x7f0000003d40)=""/255, 0xff}, {&(0x7f0000003e40)=""/55, 0x37}], 0x5, &(0x7f0000003f00)=""/145, 0x91}, 0x1}, {{0x0, 0x0, &(0x7f0000004180)=[{&(0x7f0000003fc0)=""/37, 0x25}, {&(0x7f0000004000)=""/233, 0xe9}, {&(0x7f0000004100)=""/93, 0x5d}], 0x3}, 0x80000000}], 0x6, 0x10000, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f00000043c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004400)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f00000046c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000004680)={&(0x7f0000004480)={0x1d4, r3, 0x400, 0x70bd29, 0x25dfdbfc, {}, [{{0x8, 0x1, r4}, {0x1b8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x10000}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}]}}]}, 0x1d4}, 0x1, 0x0, 0x0, 0x4040040}, 0x20004004) 23:31:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) inotify_init1(0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) clock_gettime(0x0, &(0x7f0000000100)) clock_gettime(0x0, &(0x7f0000000300)) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000080)='filter\x00') 23:31:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x4) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000080)="480000001400190d09004beafd0d8c560a8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r1, 0x0, 0x2, &(0x7f00000001c0)='$\x00'}, 0x30) ptrace$pokeuser(0x6, r2, 0x2, 0x800000000009) [ 610.961504][T11873] R10: 0000000000202028 R11: 0000000000000246 R12: 00007fa0a85ee6d4 [ 610.969495][T11873] R13: 00000000004c590b R14: 00000000004da058 R15: 0000000000000007 23:31:06 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(r0, 0x0, 0x0, 0x0) 23:31:06 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000001100), 0xffffffffffffff0f) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x800, 0x0) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f00000000c0)=""/4096) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)='\x00\x00\x00\x00', 0x4) [ 611.317505][T11923] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 611.341264][T11923] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 611.399043][T11923] Error parsing options; rc = [-22] [ 611.428086][T11928] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 611.451652][T11928] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 611.465039][T11928] Error parsing options; rc = [-22] 23:31:07 executing program 2 (fault-call:9 fault-nth:11): r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:07 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x63) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @mcast2={0xff, 0x5}, 0x3000000}, 0x1c) 23:31:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000100)=0x5, &(0x7f0000000140)=0x4) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0xffffffff) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xfffffffffffffffd, 0x200) write$P9_RCLUNK(r2, &(0x7f00000000c0)={0x7, 0x79, 0x1}, 0x7) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="180000002900327c5c1e8cbef58500000110"], 0x18}}, 0x0) 23:31:07 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x5000000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:07 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000fe8)) r1 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = dup(r2) getsockopt$inet6_tcp_int(r3, 0x6, 0xb, 0x0, &(0x7f0000012ffc)=0x80fb268a) write$P9_RVERSION(r3, &(0x7f0000000080)={0x15, 0x65, 0xffff, 0x7, 0x8, '9P2000.L'}, 0x15) mmap(&(0x7f0000fa8000/0x4000)=nil, 0x4000, 0x3, 0x32, r0, 0x0) dup3(r1, r0, 0x0) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) 23:31:07 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) ioctl$SIOCGETLINKNAME(r0, 0x89e0, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000040)=0x14) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={r1, @in6={{0xa, 0x4e20, 0x8e90, @rand_addr="3dbc84162b9c351fd002d38730b00542", 0xfc1}}, 0xb2, 0x100, 0x2427, 0x9, 0x10}, &(0x7f00000001c0)=0x98) 23:31:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x1, 0x2) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f00000000c0)) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd000000100001000b0310000a0000000004fcff", 0x58}], 0x1) 23:31:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) symlink(0x0, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) syz_open_dev$amidi(0x0, 0x4, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="75707065213be22f699d726469723d2e2f66696c65302c6c6f7765726469723d2e3a66696c65302c776f726b6469723d2e2f66696c653184890303242edc9127af6056c1d7780fe969faab0f724c78347807a5d9a125011d0404bd7184c31e9ccbc4efa31b8f5beea2ef0f045c856fdbb6153e65b9d40556f628efc7dd28498885debc034ccc077637fadae9b00552874c27024fe83cb931ecfa7ffc16c8a5e67533b4e9026aee7bb3"]) 23:31:07 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x6000000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:07 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x101400, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000140)={0x0, 0xa0, "a481b7e6d1d4e92c24b8643fbc51d6216e3878fbbd2c858f19271dc00de9271171495c90a24b646148ab97b586430473e1e828cfd308d651684217657f0bbe7c289c55f9126b1f7b27524c4d54d232cd35a7b57b2011b5d5038f30be1f917b0340d04e65ba408100cd1000ac0c690d57fe169c483ec2a9e4ef2d516d0fa46068feea4e1c9d1a99cc7adf600acf35e91c1429deee48fa9cb67106f9b30d434175"}, &(0x7f0000000200)=0xa8) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x2) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000240)={r1, @in={{0x2, 0x7, @broadcast}}, 0x8001, 0x3}, 0x90) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000340)={0xc5f, 0x1ff, 0x4, 0xcbe9, 0x4, 0xff, 0x8, 0xac7, r1}, &(0x7f0000000380)=0x20) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000000c0)=0x7) r2 = socket$inet_udplite(0x2, 0x2, 0x88) lsetxattr$security_smack_entry(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='security.SMACK64IPOUT\x00', &(0x7f0000000440)='/proc/self/net/pfkey\x00', 0x15, 0x2) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000040)=0x91028) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r3, 0x10d, 0x6, &(0x7f000079bffc), &(0x7f0000000100)=0x4) [ 612.365703][T11973] overlayfs: unrecognized mount option "uppe!;â/irdir=./file0" or missing value [ 612.464494][T11973] overlayfs: unrecognized mount option "uppe!;â/irdir=./file0" or missing value 23:31:09 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(r0, 0x0, 0x0, 0x0) 23:31:09 executing program 1: r0 = socket$inet(0x2, 0xfffffffffffffffe, 0xd9e) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x4000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='\x00') setsockopt$inet_opts(r0, 0x0, 0x8, &(0x7f0000000040)="071f080000000000972e00c6fe76cf075768acd251e36def2300020000", 0xffffffffffffff3e) getsockopt$inet_opts(r0, 0x0, 0x4, 0x0, &(0x7f0000000100)=0xfffffcd0) 23:31:09 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="666a32ef9600000000000000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 23:31:09 executing program 5: io_setup(0x3, &(0x7f00000001c0)=0x0) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, &(0x7f0000002980)={0x7}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x100, 0x0) ioctl$KVM_GET_NESTED_STATE(r1, 0xc080aebe, &(0x7f0000000900)={0x0, 0x0, 0x2080}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x4, 0x6d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000200], 0x0, &(0x7f0000000000), &(0x7f0000000200)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff020000000000000016000000600474756e6c300000000000000000000000767863616e31000000000000000000007665746831000000000000000000000067726574617030000000000000000000aaaaaaaaaa2bff000000ffffffffffffffff0000ffffffff3601000096010000c6010000766c616e0000000000000000000000000000000000000000000000000000000008000000000000000100020099b7040070687973646576000000000000000000000000000000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000006c6f000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000050400000000000000000000000000000000000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000634039360000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000072656469726563740000000000000000000000000000000000000000000000000800000000000000ffffffff00000000150000000000000088f7000000000000000000000000000000006c6f0000000000000000000000000000626f6e645f736c6176655f310000000069666230000000000000000000000000000000000000ffffffff00ffaaaaaaaaaa26ffff000000fff600000076010000a6010000636f6e6e62797465730000000000000000000000000000000000000000000000180000000000000002000000000000000100000000000000010000000000000069700000000000000000000000000000000000000000000000000000000000002000000000000000e0000002ac141411ffffffffff000000012100304e224e234e234e200000000072656469726563740000000000000000000000000000000000000000000000000800000000000000fdffffff000000004c45440000000000000000000000000000000000000000000000000000000000280000000000000073797a30000000000300000000000000000000000000000000000000000200000600000000000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000fbffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000fcffffff02000000030000001400000088ff76657468305f746f5f7465616d000000736974300000000000000000000000006272696467655f736c6176655f31000074756e6c300000000000000000000000aaaaaaaaaa12000000ffff000180c2000001ffffffffff00de0000000e0100008601000071756f74610000000000000000000000000000000000000000000000000000001800000000000000010000000000000004000000000000000400000000000000637075000000000000000000000000000000000000000000000000000000000008000000000000000500000001000000434c415353494659000000000000000000000000000000000000000000000100000000000000000073000000000000004e464c4f4700000000000000000000000000000000000000000000000000000050000000000000000800000004004f0000000000ff6abcc4a813a93b4aca404bd539320bc15a0d40bcb6f280e4c08fbcd9c991dccfdbff81ab52df22668a8922a8c59f70dd4df5428e350a5d13292b2cd64676210000000005000000400000008809697036677265746170300000000000006263736630000000000000000000000069726c616e3000000000000000000000767863616e3100000000000000000000db23d87c03deff00ff00ff000180c200000300ffff00ff00a6000000ee0000001e010000636c75737465720000000000000000000000000000000000000000000000000200000000000000000000ffff1f00000020000000000000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3000000000000000000000000001090000000000000d09000000000000434c41535349465900000000000000000000000000000000000000000000000008000000000000000200000000000000"]}, 0x748) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x7107, r2, 0x0, 0x0, 0x0, 0x0, 0x2}]) 23:31:09 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x7000000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:10 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(r0, 0x0, 0x0, 0x0) [ 614.368954][T11999] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 23:31:10 executing program 1: creat(&(0x7f00000002c0)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x40) syz_mount_image$minix(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$void(r1, 0x5450) [ 614.439757][T11999] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 23:31:10 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000100), &(0x7f0000000140)=0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x3) utime(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)={0xff, 0x40}) r1 = memfd_create(&(0x7f0000000240)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001440)='./file0\x00', &(0x7f00000001c0)='ramfs\x00', 0x2000000, 0x0) chdir(&(0x7f0000000000)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') umount2(&(0x7f0000000180)='../file0\x00', 0x2) symlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file1\x00') readlink(&(0x7f00000002c0)='./file1/file0\x00', &(0x7f00000003c0)=""/4096, 0x1000) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r2 = msgget$private(0x0, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x1e4) msgctl$IPC_RMID(r2, 0x0) pwritev(r1, &(0x7f0000000040)=[{&(0x7f00001f2000)="aa", 0x1}], 0x1, 0x800000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1ffe00) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=@v1={0x1000000, [{0xcc, 0xfffffffffffffffa}]}, 0xc, 0x3) [ 614.602592][T11999] Error parsing options; rc = [-22] [ 614.629467][T12008] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 614.694233][T12008] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 23:31:10 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='\\fat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 614.837751][T12008] Error parsing options; rc = [-22] 23:31:10 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x8000000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:10 executing program 1: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x7000000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:13 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000000140)=[@acquire], 0x0, 0x0, 0x0}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) write(r1, &(0x7f0000000180)="51298bec130cc74d8030eb33b6a1dddb629724a875640ccd7dc67dd9e9aabdd20995bb55ed5e44e400ebd06a61690da46b238dbabe8f92e82d97a7e7254990e04ccef6283148968ac92d70ce0dee4e40bb9be741ae5dde1e98dfe3f9b809add5f05b92b73e2560b4079304d6b785fe3d3edd538c37c16e870331a79fd62525f0ecbbf66a9edf1377c43fb57dc1ad86a3b1c2459a3e672f9b79f5798edc2392092e35118a365ca3273695749e15641859dfbe63a8924d9b60c666d0c0cbe301515be9f701b0f28e440e7f2fe7667f1395d750547ba10bee844fb0d1f9178958b9ee252f606f3156d20b7b5db4addaf817a93749", 0xf3) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x4, 0x0, &(0x7f0000000000)="acff0300"}) 23:31:13 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x5, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r0, 0x80046402, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f0000000140)=0x100000001) 23:31:13 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='v%at\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:13 executing program 1: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x7000000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:13 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0xb030000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:13 executing program 5: getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @loopback, @loopback}, &(0x7f0000000080)=0xc) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/exec\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x13, 0x1ff, 0x20, 0x6, 0x80, 0xffffffffffffff9c, 0x9, [], r0, r1, 0x4, 0x1}, 0x3c) write$UHID_INPUT2(r1, &(0x7f0000000140)={0xc, 0xe, "17367daabcd7112b094b90f50217"}, 0x14) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f0000000180)={0x0, @reserved}) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x1, 0x4) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f0000000240)=""/207) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000340)=0x9, 0x4) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000380)={0xffffffffffffffff}, 0x113}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000400)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @in={0x2, 0x4e22, @multicast2}}}, 0x90) syz_extract_tcp_res$synack(&(0x7f00000004c0), 0x1, 0x0) sendmsg(r1, &(0x7f0000000700)={&(0x7f0000000500)=@ethernet={0x306, @remote}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000580)="21e014ab5ea710f724b1168428dce2f5b11d76a56c2a210456ec016c22edd5a6e1df1657bfa0edd797c6eb8aeb415fc8b78d2b3a7f9a334352252544ca48126ccd6a37c227dfff2f00a3456b51554ce7148f4960dbaefd5f40e9295a43edeca846fe53a7d89a5b45ec6692c4b63f0ffac4d0a56304e2fd91c432831fa9dec94c2495bb9079cf074edd4261a6d7d5e3b55b455d8f1ec13c772895f72b94437c3ea8ca4210023e7d2dc683a65df5fc00c4da91e77662d30669572977eef529708137f22d97bfab4a8e6f5a571911e3aa52c6600c427c08e8ce1affe1531eb631ccd328a1061bb9323073182e204599", 0xee}], 0x1, &(0x7f00000006c0)}, 0x4000000) ioctl$TIOCCBRK(r1, 0x5428) r3 = syz_open_dev$dspn(&(0x7f0000000740)='/dev/dsp#\x00', 0x200000, 0xc0040) setsockopt$inet_sctp6_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000780)={0x5, 0x7, 0x1, 0x7}, 0x8) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f00000007c0)=0xb6, 0x4) r4 = accept4(r1, &(0x7f0000000800)=@sco, &(0x7f0000000880)=0x80, 0x80000) r5 = fcntl$dupfd(r4, 0x406, r1) ioctl$UI_BEGIN_FF_ERASE(r5, 0xc00c55ca, &(0x7f00000008c0)={0xc, 0xb1, 0x2}) ioctl$GIO_SCRNMAP(r3, 0x4b40, &(0x7f0000000900)=""/117) ioctl$VT_RESIZE(r5, 0x5609, &(0x7f0000000980)={0x10000, 0x3, 0xdca}) getsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f00000009c0), &(0x7f0000000a00)=0x10) listen(r3, 0x3) r6 = inotify_add_watch(r3, &(0x7f0000000a40)='./file0\x00', 0x800) inotify_rm_watch(r3, r6) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f0000000a80)) write$FUSE_NOTIFY_INVAL_INODE(r3, &(0x7f0000000b00)={0x28, 0x2, 0x0, {0x2, 0xffffffffffffffe0}}, 0x28) getsockopt$inet_udp_int(r4, 0x11, 0x1, &(0x7f0000000b40), &(0x7f0000000b80)=0x4) syz_open_dev$evdev(&(0x7f0000000bc0)='/dev/input/event#\x00', 0x3f, 0x78878a25c8a5fe10) 23:31:13 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(r0, 0x0, 0x0, 0x0) 23:31:13 executing program 3: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x1, 0x2) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000140)) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r3 = perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = dup2(r0, r2) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000680)={{{@in=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000780)=0xe8) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x6, &(0x7f00000005c0)=[{&(0x7f00000002c0)="037d718ad898682e2e4589533c1d5f967efd9dadd46b317dc897f2f8cc2950f00c0735f37008bf2c49f0cfa90e8cef03092756dc48e7fe08a998f661d9c29ea0757d9f703a1673a020e3804c0fe27e09840f324445235509ee39498ee230340d833dd143215468ca0491619156aef930683b71462215f6c11b2d144dace460ba9119f750d64cae451c045853f1850102e2b250e3f7745234f0e9c166aa228e2bd8f434676ba15d1a7d7fe885bed037318f1e2a03535a9af4ad33c2c45452b5b02248cff0dfd340a90223fcd9c694ff26a1cb178a6327489840969f323d3b0d", 0xdf, 0x4}, {&(0x7f0000000080)="d61d83eff31c24c145de1a83c3409f7860d20ba4e7f782c63568f54bd0a4acb29cf149aa466dcbbe", 0x28, 0x8}, {&(0x7f00000001c0)="b4fa0052d7bbee60099b251458e6486aa675c7381d85513db0293cc076689e001574e2b903ae5e3cf7ba87abf14ca06c2934cdffd1ca3ff8638ccc10448a8dbf7bd20f876292dd2a2e7b5dec7dc73cf21a13b19ca6786eee9638c81259f457415e93461e91c923", 0x67, 0x7}, {&(0x7f00000003c0)="966c1301b1b886ccf46023a99f700fdba5d7", 0x12, 0x5}, {&(0x7f0000000400)="828dfef77b718f737501a388467a201d0ad25924a07709987fc4801c7d251136201e969e014fea0d04a5b584ecafe3b452996035e009af4e0375ab90fd7ec507c74ae4b0f89be3a0e21d156dc8a105d08810468846bf8b70e384d20d67167743231f32dc4a4e6fb67038837d0f928cf0a7e7691a41c5af37b21d257220c384fb36b4fbc4d0626b6b652000df6284b3eaa42dd422de2c02b36433c89ccd6643fc04bf41697e79c0cc09560143537cc303b1b16b880563170beb35e7f20061d53b", 0xc0}, {&(0x7f00000004c0)="632527a9005511b5cefb89c4f95b8a2a9ba82498dc498e9f44983f8744cf474d6560008bdc36ed3bd7b0f0e1bb512ee45a7e6a1cab4aaee7a5b6ffc41f1c0f7f15bb4a1a1f550b0352a301968306aeb5d496cb0a92c18f09024e3fdfdc6172ba2bede88e85addfb768e41a4effd973960c22fb67d1b101fd8f99b354f14fd75a869bb2bac79556d2b68dc94dc663487fdb15345206578a08b0f3173c1f7c7a26f611419e4f8c4f9b35135b50c1fa7451c2110a2d31b0d257e1425d978b6310b58e0af3c628961c9d4b9036da9d8f", 0xce, 0x7}], 0x30010, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRESDEC=r5, @ANYBLOB=',smackfsfloor=/dev/cec#\x00,obj_type=,euid=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000980)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}, &(0x7f00000009c0)=0x10) r6 = syz_open_dev$dspn(&(0x7f00000007c0)='/dev/dsp#\x00', 0x1000, 0x800) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r6, 0x84, 0x71, &(0x7f0000000800)={0x0, 0xbde2}, &(0x7f0000000840)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000880)={r7, 0x8f, "1ae19487a97aa3937795125eb904b584c4a65b24649574e7d2397388cfeda81b81e27cd140016b395b9f8ce5fcf3ae47b8630303a687ef26e8aa5bf92998c8e738a0742c1b2d32015a26830cb9e2e3fa47f422420554f5dadf7133e9fa5617ff89808bfaa443abb98d0554f436c90bbab8373dcae59b372cf9c17b05efa47c1737c1a4e8fd283af37cefc4aaba866a"}, &(0x7f0000000940)=0x97) close(0xffffffffffffffff) 23:31:13 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='v.at\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:13 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) r1 = dup(r0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0xf7, "de848468fb7bdba2ab4de7f285ee81ff80eb5cd2214b44f69ed28f45ef104d69eb473dfea7d12b03e27785541d117e19e84aa6c7b91f73fd8367b39e9f3afe919b6d7247c4b60c206ccec9b00c058cc7b02cca17e49f07d55be267926a179e95ec73bed42d55cdc7f29fa2133b347ec2316fa7e2a7e037665e37ab760409d0a630e7c1ee01fe2e68aba7831500db5eca5e74f647e1796ce76bcfc7715123a41abe7b442dbd6215b840ae4676d0d133c06110424c3bdf86a0dd416a3c283697bb5174841c2116fbeff9bc256da8dde7005047aac0d5e62f7ce4c6854c4b9663c4daff054f3e1624163e54348db36239daeda23bf081ac54"}, &(0x7f0000000000)=0xff) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000080)={r2, 0x7}, &(0x7f0000000100)=0x8) ioctl$TIOCGICOUNT(r0, 0x545d, 0x0) ioctl$TIOCSETD(r0, 0x8910, &(0x7f00000000c0)) [ 617.818092][T12078] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] 23:31:13 executing program 1: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x7000000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 617.860061][T12078] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 23:31:13 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0xe000000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:13 executing program 3: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0xb030000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 618.006879][T12078] Error parsing options; rc = [-22] [ 618.062951][T12094] sp0: Synchronizing with TNC 23:31:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = socket(0x10, 0x3, 0x0) write(r1, &(0x7f0000000080)="1b0000001a005f0014f9f407000904000a00"/27, 0x1b) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000000)=0x1) [ 618.427085][T12104] sp0: Synchronizing with TNC 23:31:14 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='v/at\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:14 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, 0x0, 0x0) shmat(0x0, &(0x7f0000ff9000/0x3000)=nil, 0x2000) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x8, 0x200, 0x1, 0x4, 0x0}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={r2, 0x1, 0x8, 0x80000000, 0x49, 0x4}, &(0x7f0000000240)=0x14) sendfile(r1, r0, &(0x7f0000000080), 0x869b) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cg\x04\x00upX\xd2\x12U\xfbJ\xce\x98y\x93R\x10.net/yWz0\x00', 0x200002, 0x0) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x10) getsockopt$bt_BT_SNDMTU(r4, 0x112, 0xc, &(0x7f00000002c0)=0x6, &(0x7f0000000300)=0x3e2) mkdirat$cgroup(r3, &(0x7f0000000100)='syz1\x00', 0x1ff) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) listen(r1, 0x200000000002) socket$nl_crypto(0x10, 0x3, 0x15) accept4$tipc(r4, &(0x7f0000000340)=@name, &(0x7f0000000380)=0x10, 0x800) r5 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r5, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r5, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) 23:31:14 executing program 3: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0xb030000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:14 executing program 0: r0 = socket$inet(0x10, 0x3, 0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="24000000010307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x2, 0x17, 0x7, 0x7, 0x7, 0x0, 0x70bd26, 0x25dfdbff, [@sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x26}}, @in={0x2, 0x4e22, @local}}]}, 0x38}}, 0x48840) 23:31:14 executing program 5: unlink(&(0x7f0000000040)='./file0\x00') seccomp(0x1, 0x5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7ffffffc}]}) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x400000000000165, 0x0) connect$unix(r0, &(0x7f0000000240)=@abs, 0x6e) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/igmp\x00') sendmmsg$alg(r2, &(0x7f0000005740)=[{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000380)="61881462f8fb5355a37545f6e4858f2e8857d5819526a603a111da1a8cac2f6badb36fc53de87609338ecf16b04a47243f42ecdc8d35366f6bf473e762a7b73c8b680e75bc93a6420735ce15a5608f19d5918e20a4d67f859f64f85ff4ff2fb0b87c5597782f623221a3b2ebbfbdb378a33d547a1f7f70942c02280e8206ad4d66e0641562da403ac107015ad197da931e4910ef43b4e3b4a2882c6025a1029753f27a794f942ac9d4b999d51c8c990060611bf9dfc12714b97cdecdf0949e5941d6bfef12d6f9cd69fc7f3596fc512159d0b713befa955dce96b227b224a761795aa06389300a79f1c6818fe95c0e43dcfe", 0xf2}, {&(0x7f0000000480)="f7a348b15279e030c4fa9fbb2f0e9edb427bfd825f33aeefd74e06e272d57d4d403852fd74a048d95b0be44c99d5ee6adfcd6dbdc185d79ef460cd0ae7b10060aa5abdcee99aef837e14f83045cfb38c", 0x50}, {&(0x7f0000000500)="530afc4843450e49a6a207a46230517a705c0296074503a355090f5051147e622d7f9c5fbe2baaa6b5c14cfbc85ff1503320d21b976641c9797e9b1fd89375b776a56f0f7952cd1e9e8a857ed4", 0x4d}, {&(0x7f0000000580)="f7231db99b7fde5164f07dd05153f62ff0820fcd3e670c3fbf8a8a36cac31846eaeab488ced9b107a83e481c4a276ce8ea9fab5ab2b61aeaa5d73a84ca12dc490b7f219573eb31ded5bb0a9201603585df7bea6a25146e99df4c803fe28c47e234b0d03a81a2ebcbda8d7d79b0", 0x6d}], 0x4, &(0x7f0000000640)=[@assoc={0x18, 0x117, 0x4, 0x9}, @assoc={0x18, 0x117, 0x4, 0x7fff}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0xc0, 0x117, 0x2, 0xa6, "20eb5e1275f5e983194c25986e235ca1013e696b715c80410e6b5d39446670a7af104359241f4061325c0c6f110230b45685d0a126d3b81b133d0b5b0007033870d1bb04ff9fb586f4efb653e71c97748bfa2a8ba477f7172074079a290cee96585924868ae43f6924de03368266de8a810c665b29540e03e1acea8dd2b6318e5986ac0042117a2026a3c639c31a2a99b3e2f31021a7d1d99694e9e203cc6d18c4bb15220265"}, @iv={0x50, 0x117, 0x2, 0x3a, "ea9dd6744582515544fcb9689cbabc98eb12ae2e605f0381ca09ed9c5e0a4c9e510cdaf22d4e7f5028e6ab4d46e415d80e0bdc100c27acc18c5a"}, @iv={0xe8, 0x117, 0x2, 0xd3, "0c551b9bcd85edc61ba24c2df6865c3bd8a367c1a61f9ee9a4bf534b767a86e5b5502c712b482b4509f7fff1a272d1708b4752affe4c4b92cbbe1b5cdfcdf5a267f933d4eced22a075b483ada472a91cc2881384d5ed9fd6fdd07086946f7d684eb59e7370ba4ad7560a1ae3a7395240d807836990ff2d43277bc025cf19f5844465d4e1f9df391e6cbba13f0b25e7353ffd370d79f3b9007bd7bbc6db1ae7e3535c56eba833d017c57b35fb8d51627263f59183a55d41081dceefbdf1446235253306163048a12e7614ce850711ea62567d29"}], 0x240, 0x40}, {0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000000880)="d4e01b92fb1171333e5a2127812e7da20c5088c17a7e7844c26ec675720c9fe441a5b7fda13c14065b1ed81a7719666c4c17909193ec534006505553c678224a8b7512d184a7c08e076d00d155048f652a86fa4498c2fe5cac93c1bc1677e8ccbbfb347432a61126ce9a69716001659d68dd1eaf81e9492ee3a5276fc58c408e112a1e2338ca075065332af406e87287fafaa42b002cc362b107b9721f7d76f579f51d2f3bc3f153a802ff2389e529ba2a90417576c552d1321a3d45a9c51bcce499304427967159447c8af6eab5d15d8c6701eda0ff679a6246a83ad44f364cf1008df118f858e547d68d79d87ca9c81a4896bb5a4d45a80db05a548fc5cf6df20c92f529cb7a5c2d913f1f4c650858312f0970a1fef21e1dcb2cd8591087044e0c929a3c9aa51b0afb31e0a00cc082d752c75ece7ad2a8ef3d21a58790dd22816e19f5be89263ededcc49bd617cd674744deae8b403faba0b59b613059855a6e1822594fe5604f688685ef0a95c810b267497b59477f1f32aaaa75990cc2f1f72eadf2bcd705e5fc6992ed8a67d86d85988759fbdc31c8f684d11498c63bbdfd75818ae05058358efa32fe7c177d6798ecc78dba8316a152f54d92ee47008699f785e3dd70f927be203ddeba5e48c97157424c07afaaf62e311c61f3bb2557f1fbe56a3b569dda0a1c918091de6a19f42b52cdc9207cc1754703d0a1543dce97333e1affbf2126a1ece978c14b670f7918f3c735260388d5204b3f9a2320cf334b17ecc3fe55dec6509b449dd4458391a06f04fd312c28c1683c39fd6efb7d741bb4fc830281e8d937de501c9c5e632992597c4c3cb381fb964a9f2322e3a14762d7dac0fd737d06c2dd1d8faefb91aaf7da9dd7c72922bd2efcf8fba97909b66965eab76d4dda3e0ac4228f00780f0888bf41de0f180b3651bd5865adb263e398690c00bc6a3835f7562718282b6643f8b91a4cdfac04c84fb6487664e33963cd60f934cba9e43bbb66ae9353e56863b8a607cc279edccce58f026afaed5af48f7a7b170eff102959262249654220529626e596ffb84ee1c38fb1fe07d4e30f125a8e91bb7424c3756a8db5ca0f675fd8a8b4e051915341df32933edd184ba8a95c1b5ea77f4705601636f46b81ac363538b7eb2b98b8256f8b7094d32037831f9187fd551673fe4ee215b6a63715c50ad60e49c9aa8f99348c6e15eb095170bc888248c698e0123ab696042b7a14d150d278d8b31b9149339a362d17b24a9e3c9116377de2341def0f9c04bb2c515c7dc734658a153d1760af4cb26d22fa7d227d7ecb054ef6e7fbed93703314f9a8c147f44c40680bedd15886819e829a7e66510800ac2f158b4e3ec0de3e7595a1ac48b941b3ebdb8ee63100ba5645dd9711aa62dfd10c9a465fd21a6a436872f27ce8755848d7f694fb6dbfe984233f95d4200736ef35464914c20bc87c6f6dd0d69f1511a75dc619110759d5b650a95fe4bc8624d9784f737fbdecf187a689a3ebf664ca089eae7921c10af11ac373a81ba0740d8905a3d4b6ef1d4effec1562d6ec5ba77a178cbb021f8369f374ce480324d6ce6bf04c7c83ac4db97dfa83696383bea94b4f6e005d7a50ba25faae60e83c96772e92e1e2e578380a739a44ea0d418f4864a5a39c59280c0bff38a06c10794b36e673ef75f6b0cce810d04c8cd69fcaba7e864a8d329a10b654d55b5c809b07f1c0be6ececaeee8357c2f2c91580329cf29ceed448747396a58482bff069700278f8d29e65209c00032654e6556528872f7dd43ec04b838c71ca74b0a5b88e931c3800dedea2286e714eb67384eef6ce6e3f4fe95ff5c3970abb5d23a30cfd4e0ba8c998180bf9aadba1eb46105ec88adc3b64534038128e6dee19a191d660d73ca18c7089f440b6f333a1609ce013674c5d7e7676467ee2423e2fc27bd647e161b9fdb01258fd54d795bd4a7f1b805275fbe312bae17eb2ad1c9a22cc67ee165299354ce17936fbb3bd131e4999f28c20fe6b7506e550c0c2baa1e647c953ee55ed8a4f27e6fdfb34215feaa431ec314e1760d230164c6b7f26140081559e791525e988543c89e3c3069a6ab2ff874bb0c5107a168011cffe8c7ce68236f3ba6b25decdc53244bf596a9a4a8c73afc8b3dcca589969fbc2d222ce271e3d51d8dc1eec53eda98296bdc16500d514fd5299ace6edf4671a32469af69cd8957ef1915f87f4dd4c03b78e541577e83ea1087cc961b80b2807af0f298b5c50b68cb5aba5efda5071dec6c4f51d3160193bf554ac1adc3765e2d909373cfea29d53725aa0c20fc29702f6a9390b3d2c7d2752674e2b9ed087e648b9e22bab86377dddea0ae32b0e99a0972d15b6c8d222a49ea04d80d76902184897eae7a4d840eadb1c7b3bb6d408ba30bf9400df450d73db9fceb93a71102d9d328115d01cf19ec2f042ef291d04f1d43b175cba48bd40333e0c15ff5ff9482c336dfc98ee8c570a34ded34ec19a10b8f9a2db2dca9b2b79f4c56fa4605602f4b2e3615b5221271e3ff2c419b3a6287ccfe6eb9b910ad8f9c130b7cf7d9eb4e7d403772d0a9594095e7089c39cd2ea720549540c2d1b32718e8023d06940d2b93c010405d1684129f14f57c6d897381ad5541fe0c1794dbc237fd4a015e40e508139a5b2e9eeac482d658ae98e5fc46427bfaab1eda96bc1b1aa8a1205863e0da2066cae3a29bb230b20d6339aca32b1faa5283c0a4ec24a095e6e336321281e8536b7489f42f9d1303cbe0acbb9b91b8c495b7484eba837289af1a20d42eafc7eef568ca58cfed5958d7edb836e650522efcb84fbad4414bee3559a0a9bb7aef0c53a191226d3a2cc7358f76896f4fbe9567c3632e10877f8a043ea24126ad363ab9912e72e8971677f04879b5e41372602ce159d3e52653590d5043000019792e3e76cf13f83ee2faac90c0bf77277ee7e6e3a1c91d154de7efaa053aea2e8fe822fd64310c5ad976d4df902adf03c23c65b8079812104f6cba7f130d45a0a3da38b3e1e235229cb1fd3c259988acc21e63a8ad7e74145e504537f40a8920aff1e4c83576c9b0d11399f576e094dbc61c77e54eceb3237fc7cd8d16ba27931eb85f188f287046defe928cea541e7ed0392782751cb385e8d5b18e560be92c242c947fe11e86e02d7eaaab449004984357a1c7309dcef5613b11c4f5379b72ee74e9b41bc697b3e2fa20e6433bb22d4b4b79e1c4bb6c583e04d4ab20980ef9ce6c0fb44772dbc24f3345727e2de532a67747ade105afa194010a975a7b8eb73b83be2eb073c0142b814c9e21931e44cbeff9e302a4162c1fa35aa29054423b5e5db175cb6739c1623b1bdbc4a6467ac9bc9affa717e8aca62f711be4f15a2a31f9521ada190af60f7cae55b97594129e1293f2c48f71d136a72df41510e706edf991345107bf09fb67ed7f0523b1aa744432a799e89de298d451a089840c279cd65cd5fbd2e0523874443b16893bd4e960b66c302404337edc4993eb2b3a27916b95562160e1355c40834a7452512ba71fd8b35a78dba1fad520ca04a771dfb8aa218569cb50fea76f9f4b719963bb1c41f8aa5907eb3748c9dd571855bc9a81b7bf02d5f459805c0ae58167bc29c7bd6324580302f54d4bff4d6547acddac219be01206b1f308f96beec3ce41cbe1e6373b0de884b40c0361dbed47dc0d0d511e908b0670de42f35433d12bffa300d1c52114a3dcefb94b6779bd1deb547db4824dc9718fafff239778ead0c804cd8b5ddaabeec0405d501cccf256ba8f0e41dd886305bcce54cce238eeb48d3866edd4dd32fd6f1c0cf1eb11f2baef524192974296d8a64377596cb4e2cb6887ce63028f646d0de230bff2f357485c29dfae2213984f6546a0e47c196f2c73d7fc46f51342d495744086a1787854fe73011d8ce70e292328adb594cb97ab988237fb308f70541ceecfc575fcb505982c81747c5a88d2ca4eca36da55c8ab37d38dd4a839351f897a42550d993b8d50e84ef352e305778ae222ccf6ab91f64b452103c36310afd4a655440b30e4fa6ab3ba56d0ec57d47f37970723471e28fa0a5958ca00554772c81d47c70053693af9726ce17a68867e9f3fec91d9f8eb031dfaf4fc302fce213143002e2ed2665f804050498c8b1eafd56bdf9cbbed8574fe5afd3bc08b081be8edf82784c842f6c996c49e49a99a36307e470cc7d59900691bfe2d96eaaec152e9a7ca8798d32593b8c8b51d6a7e7804f2ac6e48adcddc6ec8f14214d728c1377c4712702e801479c4f6d729644a939f70a873207d9c06a8e7464f3381f7c706c0810634541bb8c01f0e58058a42356f26430ab0133f416d16e12ae98aacd6fdcda7806d40f3e55e65f869ff5b9601bed683d8570e8edf7c8f6dcc053d7d522bddf8edc0af39672afdcb2549ccdbffd34dc4e356a27d5d26d0fc4e7a465ec0b78060e47a6074e5958c1118cdd549a0f224272c4867109201b7d690397e6a7bcceb3e39f721a5c8b03f95d40e36e0c22a2bafeff2fd14314066778c577410d3bbd8ccbb8903ca93824f798ec6c7fbe65edc412cf8b0c8e6f69a5ce5b2ec8689ef7be6c1cae4c0ed7d1e9e4bf6087a5dc076801fb55861d7f21e16a2610c2bbed6540f78609e675debafa67aa61a94f615035e7f0124bcb87b6698d30a27d366a0905cb966db6dee483b7e89e60c273a3f5f2d35e8ffbda28623219dbc739825652f193761f86f69211b38f5c338f0f277e249c0ef9ab4cbe1a45b0cacd3f00b414578fb51ac0c01e09a1c55da2f61a5ffe072c3856c48bb9f262e5b969ee9cace99c2c1995c3aaadf9a4c56d74d10ad8aee5ab6ad2697487269354a4dec5fc3e24832c067d5b8f8e1f509b996b1084d9e99e1e9cbed6ceaeab403f9e4be0b86176e36dfd3ed68c7ec963664e32cf4486ac2fc14dab1fdd4edda1a79e30d39c404a5a3418061eac159637bd64e396b25c8dc0cc0b9b5e8dee8721ace7bc529aba0c1a5aff21bb8e1184368a22e7fbb012ab5f0ca66e51265b7e8ea6606ae357de30e2ae348431a854f4004e27ca45d04e4e89c238f00dbd70a4668157395cd7a23e62ab5cebc25515b4fd93e073aeb9c18119d61e42fd5de31135e4cccebf9276fbef4b9ee6faf2d90d77c8570f6678f7ce9b89979edb3b5e826ea4fd6d1f7676581e7a618a02408dbad7e33e5d9d359f112a373d5d99ea8c0c1c535e183240e7a316ec7f7a10bf6ae6bd334a6e3ed1e9965218acef6b435884ec20ff71403342b9687a199045597e8b6d94cc5c0beded4dc528d81504b8e97e8e5b1aa42ecacc8cba777744e979261fef3e74f2cae2ce92bd1eca990f4ec782ff4b555b9b53710071503e15e7e981e7e4629055b8753d750b097ad064df8488fcfbf173e5277d9f77079ce307994b53176b12e02959459243a2293102a111fab26b7cf022e4d80cba9670750ee59f5a8915f1dedf28ef0a406df0d2f94186f72f23a4a33f9c1f1278afdff4c8cc18ed88e046661e10e2ace3ef5deab282b9328ab86ac445c071fd8a31f74e6dbfbf167afd15cfe0b36c793b7d0a6d643ab2cfd4b3ba67efe39880a49056c4542bfc3f8b6886ed1769bf0c4f15e62ab6ced9b09777f0796ef2f6312617236dbf795cfa4a39c3f59b903149d5a0c0de2c0f5bd161170eaaf8b8c78979eece9bcfb2a29e43fbcfebbef779a2282559e0c9709fc964941d4aef090741cec39c16188d5e181e98a665d0754d1f1f1e0f14e49694c21772be810e29fc10e2f838415ce398f7ff4b3eb0b", 0x1000}, {&(0x7f0000001880)="d60b4b2bcb04666fd0ab5abe67c6993afd66ba847ed183759a8275f13a28f7298d8b631def2ed6cb10770c244699934f9553f8fbc510ac5bd8", 0x39}, {&(0x7f00000018c0)="06342477e1f2f0e312b244a9783f94b29cdfc51d55b18639f930776b980b272b094941f0bcfb321f4fbde641597d236629782f1cf148858ccc279ffa063b5375921b174a266c2e34412374d32144837467f8e55ae57ee0cd11d9fdc5188ee8766f266b181babda60ea91e0bbb9f47a6e36c01f85fc4472ac32eb9ba23c4af749be097c9f1b0a73c58765bbebee1a204022ca6aa808e979f6a9034575cfcaef24c1cc8af695a6bb2f76961024a391e09e6a9132eb58938be447e5", 0xba}, {&(0x7f0000001980)="6d3deca6efb67b149bb1d4d0a4662274309ff5d8b84e88e14e8099c25e666463b7fa876c94b0", 0x26}, {&(0x7f00000019c0)="0f4a796a49b3694fd72ea67239fe3e916cc29c874d5412397c68ab9a71e3ff2d01ff48be593c2b972c5e0c7d0e1be85bc0205da76875202a6d96473138e957784597640b50229150da2a5a57c90d992403830da8b38ed3b99a1158b869d323d056b420e49711ec4186866f540c3ed4236c7bc003b14c6125abe4557622b498db5c8cf53c6d26709e3b2cd3764543bc3b1fc03ce582486b8a50787a6d87b23cccea49f0dd1798ee77f17548f79187e92076b8084728b3a27788f1b6bdba2e9a674c2563979f4fec4fd28514f1309c5708dd97270b65b5c840d139586da6d04564a16da43ca348309658", 0xe9}, {&(0x7f0000001ac0)="674e1900856ecfface4b61302e5ae44f52700a36ec8d30cc5afcada48ba977fd08ccb145aa70d34f4bcb9cf4b63535fb432af0", 0x33}], 0x6, &(0x7f0000001b80)=[@assoc={0x18, 0x117, 0x4, 0x9}], 0x18, 0xc810}, {0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000001bc0)="de8337e4c9b7e42733868c25c31738207ae8d45de06b355011fcc368e880eba40741155251805698fd41f2b2e373c306", 0x30}, {&(0x7f0000001c00)="abec07ff271bcc1cc5cd406f260cfb8dba94ccee30c4077e2d04ac2a8bf5d847c31a9377651f1556bc6da8063197ca44761566023eef5a6f7e2226dcc58ff17af1aa8a79fbc259b6708fd71ed441ed83905f42b7f31754b8dc7d1a4af825ebefe99c179fac7b345dff605cb7ded4c541ab7f094c483268c72808c71fa942ae08fa78f3a314b810d35840dfe09227df17f5f4d283588dc60dd38ae6bd65827150244ff75b5a842d9691764129c79cc94d7601f49e726d752107e473ef5d7c9320c768e69bbe7b04c9a03d24fadc0929c87c02c6701bc55882bb34a5c109cfd35bef", 0xe1}, {&(0x7f0000001d00)="32a8cd49ea8b287aef1b0255690da5771e5f5c762eb29bea3b7c35e8878b50bfe705c0dd7aff3886fd8249897b1ccf072c281b14da1f096b06526b070ac8b0b549f1e564269579cd54f88c1f79fc04eaefabb679610d8f3a560cc2249b3f2200264172671831b0fa9560a04a325b7ead4951767a9b07a0c45f5bc85dd89d9d16db609214bb8ec97c70a30a41660c50b07b09072a9a6c86cc", 0x98}], 0x3, &(0x7f0000001e00)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x1}, @iv={0x1018, 0x117, 0x2, 0x1000, "32aafabb2975822b2f6fff0101b070d8cd58839d270e877bbba4ce45ce54fc3e8834ed73270ddf7d92c2a6a9912d30c52d789922dd3ea69e4ba650049d2c6d993b2f2eb6ec8e6e382bff60e8a9064486559035f6a1fbe450e071a033277d897f07f2372ab8aa42a45ccf1f36fe154587d61e7bc5795371da57bcc9d02fc57a7e37def1b16be3cbb640de6ac0cce24e6d04c31e1094d4d79be28adf3fe99728f7394a8a8950d1c1add7e9d07d0a283dcd9a483dcdea00e43254fcec6f1f61e1f83441982115761c96bafe6734244b8cf5b6da73424b363a5aa5c9166e3c47dc76c6d15ae883f1a48bcedbe2dfc01967b8557248ebce5cf984b6cf905fc4974272b864205e77ae1ff401b5e1d771c6d48616c19b74add3fffb26f1c9b67290888ead0f45072e86503f6fd3f886214b6f4736ae20dd5dc4257e290ef704a8f18ae7a3023edace5c48f2e67d0e182da5f38c437ede36b16481114ce4103441e9e524197d704ceb95ce68a86d37ad07b26347e48963884e07a29dfee0fdb5c774566f4e73e7c93c7b47104dc532ead8133969dcb4721279d3c96675bbe334610a07494a0dede78c969b48b7a7e361fb1d3cea01081ee57983235ae080b619689550b8bdb64a9336f8a55b50b459639dd2fccb33b07680a8a0c6db7ec0be45af238412f23923fcbe67054287cee42a485b50477d183c62f24ca15ad4bfc047055593350d4efe6864ca61e474628609c0d1277cc9c42645fab7d0201a422749efa377ce1c7662e5a70851ad457868435179304cee08d8a3dfcb24671acf660d42b015ebb8dab862436915d5fa3316229f1578563ebd03d793bf1e0e794e71b2c5d7f526373e3a07ac348fb1814ce611e5b1c2b37c9d1a975a7311890c77b3060204f0ec7bd2fc8b962e853560a5898ee3f83a84e8e895c407e31a93b79dc9cf1745ad74990a6b5ea0e70cf566d5a48c3aa5905dda7f038ee271e77bb957db0ade859d43dc3932d78fbc277f2affb6b52eae1d26d7397bc3e6a8d2fd181a858928175033aa2462e164745707bae8818a28fe9188d61149b7d19603e8cd660ecdc271538a9207a28d34b4f97943a53cca6f43232d7d4b1ce86848fcb5e161d1a66aa1c95bbd61e53bbb164e8b1e82774b957b992ea88fb9ae1be262f7765be6a48b2deff71d49f15b948457f242fdaf2627a9686b5d00c586be3dedcca58a92dab9e18730bb5f1b7b86b2b31fc35b25e279995e0be8d2b3e7daab2fb5a24a0258a26d4070c3c2a4481eabb2805d05fed552724b279b9cb05a50bbadaf4357aa32806de0de8627c3642150d50011c5b5f6740bd2f1f377411cc222f958da7709e5761fcaa9da4acbef24b0d990e9f005e2bd42cc82cd40c181df325a265f27b57e2a851d6c9abe02b83f2db91fc24a055d9c61812ce71c36dbb52ddacdc39d1ce2943047db95c3f8d64e6cdeba90b0c709eafe5b5493b1ec1c10570edafafabea560bffce1e4c7df53e10ea44d6a3ac46f78676dfd0c34e18edc82f1cc4cdcc8266f198e8b67cc8b77162124eac65a862f00dc756d105aace3a736de2cb20344b47cbadf76b95c692a511f21622e2b9352ace15e50f5e2a4153357d2ce62eba41586f0677a824ab75aef2c59752e0b8e54d1d2ba2f789b6684144312cd50c4134085685e030153fef4c36590a7e259794948f9c41e9b8afe56233f5e4f4f82787ace6a31092f2d7eed5051d37ba5c088ee9738d34747f4e22662353ae6079cf708e6ad2e4854c9cc58af6467bacce9b59876640905552f830a9b59c170bc8c1a1da34ad61a37537ad7c3c12341a268295788248d215b9952da4835e897126bbaa68e8842388dc6887cd838d639d9b1afed537ee6d31a608ac5fcb30bbc67f0c3ec86c99b17216f164602348aacb5cd66f02500a1649cb1835c0d1909f150d42748a053660874b2e7e098a1af21d1efceb3f8a0e75cc2d645d1734dd503c3ffd1fef4763d1cb2da1e602b81e3f151da363a911f1e100a3bf9d33d5223cfd114af1982c1cad87869f6fb086b3655cbffeb3aeaeed3bb04c7dabd31b13136317434332bd02a7f7db6058509d75f22ab7464f1142d751adbe2145999800775c6a7192a5cd8a8960aeb3d01d215b697eb0672497a32d5c9e405241c135d14ab11771c36055642902c1893a45a7159d23672828e28763bca91796f3df9bd1afeb8ac4d9f7753ce686c2788778b22c6d188174e77e85b0a0f784f4867af325f36608e2fd97370ea80921d18caf3b5d2cd066d4e604e08f68334584bcc74dd014d49d2b0fb206cdc37289488d2c9ebd49aa118de1247fba8f9b961cff838a77baa1b8f942e73f481cc23a12926df179b403e876e4a6661734a519469fae31d4d2fcd1901a6531fab86dc96b20ff4613ce9295744b0f5f82eda32244d9e31e797e85910b467f4c9648d186df22bdd53136061c4c7e11589211f6122cc38dcdca6c20d508aebe27ba7f865933d0486f2f6358154fbebfd1707213170705144e4e3065bfe46f7b1d835d61de3f9e782a404f6048bc0642fc974de1a2b6fb7e4b9c1a854aeed51f85a7f6bf71066c08fcd38bfbf419be5d84a9b155c4f4debacc508cd6e7f20352516a35ed945a7f7cc16ed2c1f1627a63e7c763fb01527b323b4268f59218af1ab25222dd6af300f8d971ea4b573293820ae8e37d07b6fd008b182e7055cbe6d9a8a3436c041dea8310fe0555bcb7de7ad59c89b2cae6626d9ead303300174f513017995b967da6b2f6dca03fd340926a6f484473860f3c029fe528dbe51a0e4045c00a38d1a05e53fe10868d727c3ad07dc2526635d3f6579b356d65f33c3bb5752a6d3fa7f82f8bac0cdf79d448a1c0b008cb2335e667a56a9c1c74a306e7eadc8ef7f8b286b79bc7a3aaf06473930e68594399ef8a12b99b4da356b39bfec345949f2941fb1788f44dc6c1db9a0017e6e755b4e0c6a00419643ff67d86cf8bd81e0a50199501f01625df3d3e1c99a67fbe08764fd62bb55e0c1ffa33b4c2cfc800da35844ba82247d865c02dcafb368e7f0b4a746ed29cca895d6500313a08cee16fb5e59f2faf3ce830bfe54d4a7c8a599ad8608a98dda914541e38aa4f05897d95ab844785adcacb8da707f62c2fd0984aeee04334e4930ba13d5ad2f2a92832bacdcc133bcabfd98f4a69c64e8e0ad56b9055c133d8cbb8b24f86b5636a188a849c78d831e7c14f3945dce7d291dcb9df767637a651608ef9a109eeadd3bb6876848e66d5bdc9393eb1f8ee16476dca222a4d9c69d60546293bfbaae2dfa4a12aca790247e7eac143cfa321bd4765578ab1460588e543607eabca8a4827c2666daef8c10f0f337ccc45363c3690fc4a3121672eb9504e569b9f21ad97b739dd2fe6b5de5e46059d7c68a649f7cf6715f27cfc7fc9f3be525db0bef2da80de852e7c50d067cf605675417ece8ebeb2704734aac459ec0fb9cf18a1f89fabd6b0373f22e0075a4c8bd64570a30e26dcfd78a70e0f79b0f023c12fbfb710de820375a5e1e13c1e667d47087fee64fd921bbfc274c913b6d2ee49d50640aff7214e316fbe304444c6d10e6f0755303906924d4f82eb45d0950172496d1c4902b9761565f41cfa9d3e00bedcf1ac491d2c0fdc0c93ba696592e20513dc073e5c0767f2f3da9bf067e69bd3aba8267b60a2071760ae6f59d31d583746fbdee72271c28722b9759124e212da42e47c4af8309d899395607679ab5ff17f5c2e17131ff432f3a82eba80f3f946f002b4bbf0008d770f60c897e983b8e42004950d4d54064f34780408be417514394abf0ab168243a1f42f0e48133904ce2d83e5a66dcccd060d9acc46011eef6fd354baf1f59ef3687154e9555666c761a0a4372d637a7230ce2a621c18965f3eeeabaed9f5d8d4dea14b48df697c3d25739a9f723eef1d19561a46840af139e3f2250bd3a40cc1691ea471dfd591aef4719466ac9b6ac4dd187089900ac22b88a3f994c29aaf454f5a929018da8ef4e09aff455715fd6cda81fcf75294f223c6eea1a954931630858b50e64cc20a8eb5a610b9093fb26a39048d0572b2256ae143ede70b3ec41390d5a6fd6f1a3ebc3e42192400650b712080a6b1e3fa2da01fa6d626574dd421e70801204bfc72d2532aaf59450a13b47e011b8b072bad7788751b1ec7294deb78549f0e95c2eb010eeb382e6dd17d5d332d04200180dffd5831f1edf46a10dee379f830d02c6ad7e189accf2d8ec79d5fc656384aae2d2c51c540202e9fc2a142f8caca9e013e716a2e1c54bcc148c099eca7c73fe5d0d155125c868b99436267c69bb90780a6e3c4027b1fc93fa880b4981f1a15a793f605ffa277d37b72f434bd100c989246d4278314077de2d10aa36d6e53767faefe7bdf804e1e79d0fa9426133865817990742bf9a11c68762d2b68909432b9d2f17e2bf914497363876268b8eb0fc3c94901b3077e12a29f1a72d1a44fd04f252b8b5806abf6c063cb3b5b263d0b121a7fdee019bce7cdcd035e91c8089eb5b9ac8dd6926563667b8abe65f7b8bdddaf21e746638e45e352c0170fadb25cb7ef8f3055b0e8b276aa179689346bbbb680f7f21a13621ff3ae40196664a03f0fc0d9d70dd46bd0366537946c4fd5d1853d702d9b1614f56e03b6e8c23956aeb5538205161ec76a3e05e9b4c9faefda78ea9ffed9f702f357664a700292e2ba256f15b618bd6c14683210f1088174717b6ef497aa36d0db4deea3c25f1f2c252ef185c2d331edfc56b7b0abeeb54ebdf2bdd472167ef28d0d96ea50af6d984256ba5d829937cc45282ae04cd0da6f6ac467c6621391a6afb337409fd2f149f5d1ef52ecfa48c918c2e8ee750561bd2a5e4306c68b9d5dc1f42d3e4c375379d2fd35e16e7f896d4ffefe528fae7714caa9436f529e8f9ba516d0b58f4c6a696be2479065d52e6ecc09f7e295bd0c1dcd9b742ed24a7ab04ebee8ca973d3a1865e9579f9dc9416aaff31596481a86b09cb2e2140487661a75e3ebe439aff757017ffdc5e548b9dd3e435a7c0b88d1ce189ab7626e3d458c99e89c3817b9eafb70ba7642d1f0c7ec6d04354ac36832630e25fd509f62e8ebfbdb0691d64841cc229fa8c0bad7ca656f9eef309b8c29bd2d649f5cb3df27edaf4416519c53b6f4338ec313e6ce9c098cd170fdb0ec687418e8397f60fdb8010beea9de786bebef17febb6dc6048a652121a76bfeb0df8adc3ca516d50002c5aceacd8c5ce359d83cd95dbfe546d9bbd691efc2645f6fb8fa4c8da90d6721a5d6c62b29bb1f43aacd9d9ac29a4cb2d90f099d321e48387a2d352b48436d5341116c236ab43a0ddd6cf3c60086d8f67171b1892326be7b452a80693580b78528387df7732710232565565f70ea96ecca80f16ea94a3068b434b0a0e50c49d7fec19003718bb93a2e860829e8b81e26f70344ff32c14c24a5b2f0b1695de452e6df1b444fb027097272cfffd55e74cdb82161139afd261e13515f10d65cd0ecc0d37354d7f3d5e3d77381e6a472d2a7922cb42eca1a9743906d1d2dc2ecded19061f31be00042ce239a87fef0981d6acc6a3efe9ae7fae05d6b86f35217fcd466b210c56aca1ddc04b8cec168e906eefe1b639b797a123116cbfaadcfd5633967c96c7b4071d1f7b20fb5a90f42443467ce01a678fa958fae6e3564fcd52cf2618d474a3d050f912e4b1c8718438b366c04f95b987016f7373bb0f98c8b2436b7669ef0d65b79374d425f62d7b50925d52636cf86229e25eecea9c5b20e7a3292e150a7fdf6"}, @iv={0xe8, 0x117, 0x2, 0xd3, "977b4006bb3bb7a408b873992e98d608c9fa36fc3333cf74b5eb0e9670fb648a8f098f4f339f4f02daf4b18d6937d8a52455e3035cc58f429c0c454c49f57d1f924f25f51e16ae2b032def605fc4a3fb722be354e2b85e417ac8ec45830592b34be460ffb2b3ca3e94963dde4932a6dd4898d89e52800865a870d0d5e329c602fc1446ad2ae2624404a14161f6f4db0a69582a744711f49d4332b437cd310765a58e0d949e716dc6383a6a2c2cda46109a4935090dfa463f5577e01fe3e684a6ad2aa22a016091148335b348ede49a6d6af133"}, @iv={0x60, 0x117, 0x2, 0x45, "51e357d185b77ccaee3410986fded364e00d4955615436cb32329acf086f3fd6affc9b525f8aa66649f28b696b60ffc153429b7e82c5462f2fc708c2c484730f7cc9102c23"}, @assoc={0x18, 0x117, 0x4, 0x6}, @iv={0x110, 0x117, 0x2, 0xfa, "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"}], 0x12b8, 0x4}, {0x0, 0x0, &(0x7f0000003100)=[{&(0x7f00000030c0)="aa7b81c26bc4933ecc73b0f3f41c85e1", 0x10}], 0x1, 0x0, 0x0, 0x20004001}, {0x0, 0x0, &(0x7f0000004240)=[{&(0x7f0000003140)="cff3192b8deebd4f588b78c37b2be7c236d447ccdb7060db08ac451685412d1139f06ef69a1d272fa1ce13efa2bc243a9847ce437c654d930f6ba9f6333a4e334c815d3308759e0c664f25def8ca6e904bc9fca262d5350c0853c37921ce68880209b92c42a663a7b9d9fad9d5", 0x6d}, {&(0x7f00000031c0)="a4df55a5301de93eb780d561c40d59e3d204ad3cae9765f632649d15d8467970378c4d2edd6f214e29f6f0e0c64004734da79c891acae667aa967241d452aa65a1a12e57a5879ffb2a1831d11386483c5206b6b0d204e4e5f1c2ac6c3e188b1c4cec46fbb392f5dd61ae40a4dbc2", 0x6e}, {&(0x7f0000003240)="67a11f07a6163c2da96c6f44c86c17ecf44c618dd3534823415d2c00834962d3efeac2192961406a4b36e0bed353f6dd0fcac92729411dd9fff1c1b50694532235969b0e76efe3a04edc75de8d04f195acffeac0ab494b57750a88339e4b1ff76d707384a3a55dc86356eb843e328d44523a25ba884707e505dd821cf44e345de5138cb196dfeb9d85056d2af1029dba41ffcf9bfeae0322d273ed04d9da8e0a18e80507b596e4ec492980a76809a8a1b60a48e608704be439b7432e858ee6a74aac8658a32b2b1c25f82df8294cef16cbbe3fbfd2235f9ce0703e915fa2a803e890d278f6f89ccbf929f34696599a36c476b97f8b58005061bdaa4ed6b1c5e973630dac31e608a57b72839407625f84413d67642cefb5ba947355c180f4c6344ffb90ced4c69e49edef3ee62f41b1a716fcb76c93eef7139079b322a516334292830747256b0c77f9340679ddf6fa94b028b97c975cab6b75263aefc21ddff8a5577b6c83170ede95417d39269267a4d878517e64b9bbc876ef906f72ac02815d7ec81377d7a0925dc858ad04b68509a5b1eefd1272e898e29c8aaf57023c8d28389aecc32d4fd135c216a9281372d5d95b656b5548a650963f5cbbf59c5629fee912bd8514d79b0a18af0d9d15d9b0a4ec0e5b8db0347fdf9e19fc61b14ff8d0f701e62379dc3996ba467c0cce4687588ec0ef6235b01ca05bee00a0792b9ee4012450e4828b64ee7695f0c746e85237a1417dcd8010fe965b39c3997baf0721ca58314a93994c2cd647a86ce6956763a7a0176dd0f1b77abf02c42e6b94b75ec6cfbc5079e0b9c0fdb8ccaec2631f888d379a3d02ccbbb79d10c85ba7106135cf2f5f92d38a55d7e56b025cd909d44407e44ebfcb3a4f3cc24201838966578f9a927ae0a52307fe57ad63c3698a124b27a5f15594b19f831e7e5f4157d9bba040bf65ecf5123774577a18b34898e88d13f945360e84c4dbbef5b4f5470adf464cdf0810b2110aa681c49bed83e0a86423a49b058cfadd788c35a35bd273bec3309ea53b794dba854dc90bfefe6c91f79f93ff94269cafad83be1f579ad95e705d9675864721f9462002570a481ae1a82ce72dc13067c51b31a51a7eaeee32febdf9e4a9f89c36f6c354621089917bc6608a2b55aa2f79bc6b67a74a14e97ef8351f9710099beae16e05981dc8a2582e17455b1551c941766a4b8e7d74acd6839639688145a8482e3b32182aba2c519f9c335b4e478e1ec92da7ebf7220e59cfd5d5b9155e14283f7ba8724334307c5346072569d7b8b480b279537af6ac1c95536ecb5c610caad48a985c553cec89e359bd57c29860885daf473d3693413d4008807c5d45ed1a0659f81c475dece35897cb43c1cb7a88f936f13747f0043e272c371b72a51f57a5d13a395ae0dc1870b22db0172411305610fc210e3a8c95ca928c562ce3f7d172c32ce633c970b2bad6c9ebbe2c97b738a2dbf7f4607219cbbbea6c4299cc71ddcb3e4230585e921e0d198795dd787bd410c0b61460816273c746ada532e3c63302e87375909c420cb92481ccc0263c45d06ea6124967865952682adda0b5b7b80c5a12d565c6e377c41306e991443fa467fecc93dac24d1cf8ce7eefe893bbf411d514d18d89710070ec438a06158fe74140d7ddd7ec8f432302589f4a9078b1387e2816dd1634aaccedabce291dc347e452f304659e215912b94f2b4cee386dc8b1a3164067864524573f4797952adc485a7ba5adb47c7eea12abe8e5d279dfa79ab4a0d2035065cd1d8cb02345a27624307b91349c7c5930181aa62a5b8688d128af69a62319a9c3d7c364b1a8d3906878222e3ea8b6ff99dfd99ed0363e39fd3ec97bd509d63d6f56f0f93c7645fe136e9a15a31722c3bcb25400e397fdc89e1bbfb480f2790206c6dbd341e29149f1213f0e4fef0da0a22fabc9edb96c5c472879ef2d2b10b34180295b4566d1e95e27d9c1c397c4a171a9bdff85c73b03f9ca0f55245588ada62324281f6150265cb91f28bb0b82a72008fd4d25f0f7feedda5da080301aa7897e17a9688b07e3fdc7fb9cc2b399cbe4356ef176724bff7afc7dae30b73dbd8d6e0797b96bb86515b4a8c52599375b1ade6d9d5cc0d4a584ba9db0d62a08c385107b83a19a532b59fb14aa4dee98a3d3987aeebcce192d0e8085b87dbe7fd51687dbb306b3b835cf0f5f43abe46322293f340852ccae2c8884c07f1b21014ecbdda1a5195830752a3486ba7f133003748bc99618941b16384dc97bf1bb87d5f06dca781213ee0ec5bf29f94116bd0b8e5cf3becb13545576d855087f01a9e3698eedd760a5f20f383f1cda6146f6cb9daec2c227b7449c28a057312056b6d1bbf93e9a78009c4bc3afde6fd687c94ff453c8560ce595520ecf2eb0c5fe173bcca2d4bd736236c76d93eca707068a6d0fb35cb85f2044143e0f9c6162a62b5edfeb1e0035b516b3fd468f57707dd4358c0b5df02b7460ca3a2986354f9799a7485e6873b3eca816e55b98759d656e2bc5ddafc5131a4b8caa8211f1c1819965917f66a40b8016fd800284eb569f17918e66b227a13f2181e773269faa3129887a6887cc9d7ca8f78603296e3397a0eb6077c686779238d80fded558bdcf79fd21013beddbbb0b3f46b4defd176d15b7ee0a13f5d4999bc0367529d01d5abf80e352c1a5679ea3bdcd980793b1360143c2432cbe0d9edff04d02baf1e3388366228ea7fe386cb5570bc2b6fa494319738410f9213276c93b6782635f615089cf15cf2709399d2f87744dde7da0d39eba6a776bc277e0bf7df0e6831ad218b9cbed380fa11e3009a23b17d160f927489d079ceaa4c871b90f7d0c9cb4adf82b7a59b0347c517b9bbc835a514141d23eb9b045ab8e64abea95f043fc19a5b80df7aadd8718511bfd4853a61ed4a55a4d7d9b0070dc16577f90fafdb0b4a3935ca5ff96fd6c935aa4363590394b38e18c4466e706e38d72212db224b3ff983c5a26fcdcfa6720cbbe91d32489224756734d959bf0f8bbf4e819bfcc6c5cbc96432c3fc9be1aa88ccf6bcf96b8d4b4817de8c0185a147115ca2b418e1823b4b284cc2063e845163e130924d3bd3a05133bf8f1eb24c0935483eea4d53da7b6d0180ae04e890c3521848ffa917ca5751e5b172c098ef21c8df3a560c9565d7f49b60748584ecb686af0f7bc0cc0e560c9e3577ab0fb365963cd32439249f1b7aff80396463763a564bd7cbe5c7c733b774820ce21074161e7cea98cb10a173f590d0a5b85031ef09b735729ddea031f2f251cab0696e638952f3c58ef07817ad0b82c68ba00a6922c0a7dd78955213277c9e9b05d8628e0f324de5fbbc689e2d289d5a2cf5bbad0358807894b99506507672004aba20e826c576813e5154aa4e0bc04cdfb40fc78d1f2681c44b8c2fbd328d192f1f15f59c90eb6def5356305de09f75147e5f890190d512e6afc4bba559ee443e7ea5fd84f1623e8fa2c7a0a7f115cfa2dd8ff7b9e94caa283d35514cb880715f3435da5d0e2bb04246199ff359f3f69eeaef591c04ac13e675c0793808d794b74165c6a475a3efa77fea31de42f06e521af33a30ebad8f4f98c9234d1227d14906869d96f9f24ff22bcdec3c4465ef0f62b40df906e42f66a2faaeade137882c6487bffaf18633dadf7bc1bd9fb1355baa8b51642376a54295001a8c36dc0c9535ec8174c3c878a743d031a5ef22299e5d9d8a37cafa738b1fd075b218c391b4d5ebf65bacb794a85643e0872fe11fe8bc4f32980b5ab0f32b9bba5f15e58053dd85653f862ec66cdf95b56587928688f5d84bafdff434618416e44922270df582b726ab246bf75e26a9587157b9ac13e4e0b2a96e0e947721c73d17dcda6f8ea2694f464b853960fe08feb58f8c7d0d30eecea743bb251bdf8161a7d1e6057c4021f0b5beb8c4f568b11ba174daedd33ba2d9a7e517e12b7b104b759dc21f10ae2428827fd5eae32a043634ddb02cc9d9c9d8b5dfe9ab67bc831fd1fdc73677fe848cdd236ce0c4cc8aff4a1e65bd1d192b1e5efa7d56ffe925885ff3075c350f10118e4747afd9d1b07b0a1c6040600b6032dd4c8fbe406e7797a637ec044a0263abf71253b5943c83d60692ce8bf1e6c4e5bd812f5573488836e2e8fa9189471fc8958bc0e9b17b3348b5e1ec61305e46b835e753a76bbee2bd320422a85eeb83e77dedc5eff0ca12441ce67c5403a12fca8f2bacf0a0f33d09cef367f46634cd07782fff4cf5dbcc1548d829aa238e69e66e7cdd4984fd2dc6314298ab9c23367b5f82b1aa88620fef4247470a83cbc933918ac1af74ba2456758fc9195c893927cb1a139793e32bb83c8b5d64fca0a5de11cf1a0e28187b50eec54f1f610fb416e6e1803be1715c7679d5f466116757a081893753669545b30811b31d0e82dfcf83f2ea14d6da2af3cb505169773849510d2bc69748a304fd8d31edb946e6a9073cdf9c71ea0e5ab3ec0c16fb66fe005cb2db41ca689eeb31b73e1aeaf07996bfe733b50a24ff1a45c6942e464c04a883fc1c31038eb185cf7f91ee71a71cefbb7bfe6ffafb4be098ac543db0f5ec75bba2785150ffc14fc45cd0882129efa77b6736c04556f4d3c429a01340b0a5775512d2d0e27881862b3b2e687d77b8f3a97c8d433a191ab2835dc3c921a1746ed65b43c7133e9f56590179554c8d4af274680d822fd62e02a5be2f3becfe3d3be285d9ae9ab96b20338506faec1755efec2997088afc210730d06b325c405fce5b6a9206ac0b62e304585fdb60a643580d5f3a5e2cbc17a0e737d30f8648b15c87a4abe4059fe725a0919d6f72079b50cbc0d316a9c14cd939cb3d6ea78300cf5ee7167af43e6d2e2cb1a3429ee9fb8aed801fcc1696e38e35501cfb27f41b87f5ba549aa4e34a876a48dde063456c2626cb43cc0ae53f2c8febefd25e8d175fcd080bbca06962d386c0986877c369986cde063df59d839746571b6c7a17eec5550c869c339def2bc6bd14419c97c07e1ce0d3bc825dabca4c1d179f98dbbe612980c034aee90bc7e497706c281d256becc41133b7ed40e3633f8dcd58edbd0571a0050e33130327d1991623a211bb44b4028526a4768570691bbea12e7a814c4e68f6e08d7819e738837916de7f86cb1dee1c4c9f1e0b52354baf5a5f3c7f76e99820e9c2e6e07e167700fc5c0f71e92791c83377f8bb9f523bff026c22bd79728adad13ec23cadc7ff1a4cdfa73727a64077425c758ae39802a61963f6319c0c76b77332abdca69647032a09aad3eb1bf89479618f1e4e52caaa47579b9ebd235291db04adea2ca9c1d9992945261e8c9ca48d96aeb426bf92e783df75c3b65b482fc0968478b54e8472065cf3beaebc98b180c132b824f25adb6a9da130546a2911d73b43d37b39ee0b9936b5cb79ed27e0bb2ffac9a47438c521520482e11e55257223793d153043b7bef73885387cb8605a5527f6d75181ac66d44799105786e3679f260cb0ab87743c28d76e2ab8dbac2109982aad34fc4c9ab852de5d2661a53f7b2e645463be90ebe79a3ee3def72a40bfe0f9863c45a2edfa994b546f014062fcd318ef246926db19b2029993199355dd6fc97d8e2331669d2f7592824847135dcf688f3bf7de16cfa74e4efb46c4e42f4a5cc3ee79568972bb076b9fb7dcaa0958b4beefe02a2c5ee2fc6a7e06794b9c517723f7e720711c3a148505a307a8bbf3cce0d862d5766dcaf0b1467b1436578a12ae056b7faa0a788ba469012366741bba227dd03b4", 0x1000}], 0x3, &(0x7f0000004280)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x9}], 0x30, 0x20000001}, {0x0, 0x0, &(0x7f0000005680)=[{&(0x7f00000042c0)="2de50650c914cf4bbacffcf14831b0fb710737c5ba031c6e60dda34f354a3f83453bd8475c3490ea4c5a6013b3375c54af058cdc3171d17e74897bb79105b0a15601f44a55864a7edb", 0x49}, {&(0x7f0000004340)="7956d2ccc11c793e17bf9c994afa083e3f55d53b", 0x14}, {&(0x7f0000004380)="f4279550fb5ddff66f427e4d9825371fae30a55459b0e510289fa10ddf756f1f0f74a1fd613ea8370ae84d62169119ddadb523d533f2e37e71c2097cb0fc8733aff65a298e4943f0d67fb5492b4f806eadef2964f0c6c6ee558e7b80dd90f3f230233f0285351bac57cf5642e36e764e38e7c396caf670d37fdee46d23430a8f518958954ee6397ad0d8a94f5825a0ced182792da4ea6fab9a198f9daa6971a2520b2e9af4c7c922536667b3fd8b99de34", 0xb1}, {&(0x7f0000004440)="2c8720837eee529af787c6f0", 0xc}, {&(0x7f0000004480)="d258584ba62e68415e6a06946086fd060ea3f093fdf23127eb998c63a36c96c5", 0x20}, {&(0x7f00000044c0)="125bfac343045d3b9d45809d6ba792acedd1046b9c8e659d1421b5b9073325edd1c68f43e4a854a9a6a4ccbb95dac98c635764a5bc", 0x35}, {&(0x7f0000004500)="2ff097f1f332cb3c5b73caebb03b908a48bfe4d920262b47110e525de000485bd754c7bc739d782230d3f016cd088b495f4b8eddd503bd44903305dcae837bba41c7011aa0c4851a5ff8878beb517c7568d626468d11fadf5e3f31c80433386c6135cc", 0x63}, {&(0x7f0000004580)="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", 0x1000}, {&(0x7f0000005580)="336f747f33fc95cdb32ce17f44f8d2ac26d0ca37410b07db6f3dad56bc62c11755d45ac2525f872f2aab3e1197d82dbbddebace9ffc73c34b77c6b4eb79cf934037cf23aa4e0a4f2c659ea7c7ac1eb2daec71480e155c8eb9dd54c1b232de454c5412fa22e2590db86d918cdd31e12159dd8ea5afa872c0d4492cec1b0a1c382607461f69c6d3921025e23cf105567f57573069a38eec7a681a1165fe85493e91fdf85e408cabb5ea8370ca8dd6002f3aab55a4b31065c880c1e651272ca349533d4935ca79157d4c8690d01e6d1115306357c55f9462cce0bee34cd76ba042ab46cbe08873af359bdcab94ab471e5da4d0c45d6699fbb", 0xf7}], 0x9, 0x0, 0x0, 0x20000080}], 0x6, 0x4) 23:31:14 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x1d030000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 618.912587][T12159] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 619.204477][T12152] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 23:31:15 executing program 0: stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x2, &(0x7f0000000240)=[{&(0x7f0000000100)="fa3f377b5fc4e231b1894fc73bb3f6545139061c2dfb6c4c7f48487c44ddcbba2ded044981215bd2960a57feaaee96b904d026f4f9b636ba09c645bba6e7d3e51a6314e4d80cf272e37a5c6e77e1496c82fa29edc7613749b82842c45fc08f646b4abe0b30e8ccbe815785511d36b5671540b7e2e1bb2e8e6b5af90cf5e29f76311af9ad0280df2bbfef558e299e99434b004f5dbe2970172d8889c32b07fc94aa70e81b6b4d50f694a75255b2cd4bb7406d0291a927d3fdac9d685a0c9f4a3ba11cacb0df6856256214235c3fe984fef62d1e554158b34959182b5e8af2800a0bf66651bf709e184222df67d51395f97498ed89016a", 0xf6, 0x7}, {&(0x7f0000000200)="0466494d68164f093a98e00610bbdf9d4c8d814516dc52152b3ec291bb5885b157c720323f8101b8e46d724633558cbeba5fde95d678e4", 0x37, 0xfb}], 0x402, &(0x7f00000004c0)={[{@filestreams='filestreams'}, {@grpquota='grpquota'}, {@logdev={'logdev', 0x3d, './file0'}}, {@noalign='noalign'}, {@noikeep='noikeep'}, {@noikeep='noikeep'}, {@swidth={'swidth', 0x3d, 0x3}}], [{@fowner_lt={'fowner<', r0}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_gt={'uid>', r1}}, {@fowner_gt={'fowner>', r2}}]}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) dup3(r3, r4, 0x0) 23:31:15 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000480)='/dev/video#\x00', 0x6, 0x0) nanosleep(&(0x7f0000000040), &(0x7f0000000080)) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205649, &(0x7f00000000c0)={0x0, 0x1, 0x0, [], &(0x7f0000000140)={0x980001, 0x0, [], @p_u32=0x0}}) setsockopt$ax25_int(r0, 0x101, 0x6, &(0x7f0000000000)=0x8000000000000000, 0x4) 23:31:15 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x30680100, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e21, @rand_addr=0x9}}}, &(0x7f0000000000)=0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000180)={r2, 0x5, 0x8d, 0x1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x6, 0x4, 0x100004a00, 0x5, r1, 0x0, [0x12]}, 0x2c) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='attr/fscreate\x00') connect$llc(r3, &(0x7f0000000200)={0x1a, 0x0, 0x7ff, 0x7f, 0xfffffffffffffffe, 0x6, @dev={[], 0x26}}, 0x10) 23:31:15 executing program 3: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0xb030000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:15 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='v\\at\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 619.654254][T12181] XFS (loop0): unknown mount option [fowner<00000000000000000000]. 23:31:15 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='personality\x00') r1 = geteuid() ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f00000000c0)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, r1}) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x40000fffffd, 0x200000000000042) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0105502, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff0bdbe}) 23:31:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket(0x10, 0x80002, 0x8000000000000) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000000)=0x100, 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=@newtaction={0x54, 0x30, 0x701, 0x0, 0x0, {}, [{0x40, 0x1, @m_connmark={0x3c, 0x0, {{0x10, 0x1, 'connmark\x00'}, {0x20, 0x2, @TCA_CONNMARK_PARMS={0x1c}}, {0x4}}}}]}, 0x54}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x4924924924924f0, 0x0) 23:31:15 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x600080, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, r0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x2000000000010d, 0x4000800000000a, &(0x7f0000000000)='\a\x00\x00\x00', 0x4) 23:31:15 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x31680100, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:15 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x10000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@empty}}, &(0x7f0000000080)=0xe8) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000300)={0xa0, 0xfffffffffffffffe, 0x5, {{0x1, 0x0, 0x2, 0x5, 0x3800000000000000, 0x100000000, {0x3, 0x9, 0xa05, 0x2, 0x1, 0x55db, 0x3f, 0x100000001, 0x6, 0x0, 0x5, r1, 0x0, 0x80000001}}, {0x0, 0x11}}}, 0xa0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) r3 = syz_open_pts(r2, 0x0) r4 = memfd_create(&(0x7f0000000140)='#em1#+\x00', 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000480)=0x1, 0x4) write(r4, &(0x7f00000000c0)='\x00', 0x1) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000100)={0x6, {0x5, 0x1a, 0xc8f, 0x8, 0x1, 0x3cf79ef7}}) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f00000003c0)=""/182) ioctl$KVM_DIRTY_TLB(r0, 0x4010aeaa, &(0x7f0000000040)={0x20, 0x1}) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x80000000004, 0x11, r4, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000280)) ioctl$TCSETSF(r3, 0x5412, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) 23:31:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000aab02906c110000000000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000300)={0x0, 0xb9, "dd0c3809991d137dd014ad426672491c9d41f6d1321c8d65e1e7e09111dd56e27dfa4377333f11293f5aa0c11f315c029776fc2412b315191e63519d94d0fbf600731b9e023eeac01156dedfc62f08fed98cd5291d433261a825234660c59e593142998d0f2a791e2e338e10efa82c04236535c64ef139004317258f4416e99119f026d3436ea01c95d0b4bf5debd0ab4747b15fd4a92ad218acd798ddab259b74a815546942f5025f764bd123697f54d8a8165252262a9f34"}, &(0x7f0000000400)=0xc1) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000440)={0x0, 0x4, 0x2}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={r1, 0x7, 0x0, 0x9, 0x5, 0xea, 0xcae7, 0x2, {r2, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x8001, 0x3, 0xbc5, 0x3, 0x7}}, &(0x7f0000000580)=0xb0) r3 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x0, 0x9464883c8f501be7) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r3, 0xc0505405, &(0x7f0000000240)={{0x1, 0x2, 0x5932, 0x0, 0x7}, 0x9, 0xff, 0x3}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x800, 0x0) accept$netrom(r4, &(0x7f0000000100)={{0x3, @null}, [@rose, @default, @default, @netrom, @default, @netrom, @rose]}, &(0x7f0000000080)=0x48) 23:31:16 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000001440)='/dev/vbi#\x00', 0x0, 0x2) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x5, 0x2, 0x401}) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000007c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f00000003c0)={0x68, r1, 0x0, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'sit0\x00'}}]}, @TIPC_NLA_NET={0x40, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x10000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffffb}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x20000001}, 0xc) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) accept(r0, &(0x7f0000000200)=@can={0x1d, 0x0}, &(0x7f0000000280)=0x80) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x11, 0x4, 0x101, 0x3, 0x4, r0, 0xffffffff, [], r2, r0, 0x0, 0x5}, 0x3c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) 23:31:16 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vf\\t\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:16 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x440000, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f0000000140)=""/34) r1 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x1ff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r1, 0xc4c85512, &(0x7f0000000200)={{0xb, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) r2 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x80, 0x40) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x4e24, @local}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, {0x2, 0x4e23, @broadcast}, 0x200, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x1, 0x40, 0x7fffffff}) 23:31:16 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = dup(r0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'bridge_slave_1\x00', 0x2000}) r3 = accept4(r1, 0x0, 0x0, 0x80800) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) ioctl$sock_inet_SIOCGARP(r3, 0x8954, &(0x7f00000000c0)={{0x2, 0x4e20, @loopback}, {0x307, @remote}, 0x2, {0x2, 0x4e20, @rand_addr=0xff}}) umount2(&(0x7f0000000180)='./file0\x00', 0xe) connect(r1, &(0x7f00000001c0)=@nfc={0x27, 0x1, 0x2, 0x3}, 0x80) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r4, 0x7002) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') ioctl$RTC_PIE_OFF(r5, 0x7006) ioctl$VIDIOC_S_AUDOUT(r5, 0x40345632, &(0x7f0000000040)={0x4c, "5e799acfa8d620ee59a7d5c1e4c0ed6f6b7b4348df5297dd488c72ee8d4860dc", 0x2}) sendfile(r1, r5, 0x0, 0xb125) r6 = getuid() mount$9p_unix(&(0x7f0000000240)='./file1\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x20803, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=upix,uname=,dfltuid=', @ANYRESHEX=r6, @ANYBLOB=',afid=0x000000007fffffff,smackfsroot=ppp0system$*!Pkeyringem1,mask=^MAY_READ,dont_measure,dont_measure,\x00']) socket$inet_udp(0x2, 0x2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r5, 0x40046207, 0x0) 23:31:16 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000000105000600200000000a000000000000000b4700e50000070000001f00000000e5002500000000000002000100000017bee5ffff010000627c05000500000000000a00000000731f6d000000ff170000000000f690b9a7008807a4cbadbed30200"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000080), 0x22ff539, 0xffffffffffffffff) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f0000000000)) 23:31:16 executing program 1: socket$bt_cmtp(0x1f, 0x3, 0x5) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000140)={0x1f, 0xfec3, 0x2f06, 0xd9d, 0xfff, 0x1f, 0x1, 0x309, 0x3, 0x2efe8082, 0x1}, 0xb) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="d1f7977be36243adce5a9b3a5352795df19e8c4e6ae5296aa3f043607b184ed65348cc03584ad2f60df945484179bb0eb893c53b86ff45dfb7a43deed5a2866742bf07d14fed5419556322d161e203b63ca6332607f98e46057d0f097d1c5b273515bf522319c242fdbb8c7b423bef955b96e8337185ba7560e25b4760a1c4363f3d35ba3f9f0ec26165dd729ee9a99788c15bfdb064bf2c807cac2613b799b811843f3cad1c5d32d25f350ae3558455fc36a91a4d4b2b52ed69", 0xba, 0xffffffffffffffff) add_key$user(&(0x7f0000000400)='user\x00', 0x0, &(0x7f0000000480)="0ae4d3db0547d1471076611887dfdad059884913d90261017b56aea58fe107e30afa9637eb29bcdfda86dfd49f570ddfad940e1537257600d392bdfa61c5420cbc33346e0c760d4511a4ae78abf66103f05001dbb6074a61e7f5bf7b89eac8d1fbd88306a6e95bc62e185b288da4", 0x6e, 0xfffffffffffffffb) add_key(&(0x7f0000000500)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)="eb3f77f3a7b1bb6865a45926", 0xc, 0xfffffffffffffffd) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000007c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) syz_open_dev$mouse(0x0, 0x8, 0x10000) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, &(0x7f0000000940)) ioctl$KVM_DEASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x4040ae72, 0x0) keyctl$unlink(0x9, r0, r0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r2, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r2, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x00\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 23:31:16 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x32680100, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:16 executing program 3: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) r1 = open(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r1, 0x0, 0xffffffffffffff22) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000d94000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl(0xffffffffffffffff, 0x1000008910, &(0x7f0000000040)="11dca5055e0bcfec7be070") sendto$inet(r1, 0x0, 0x0, 0x4000000, 0x0, 0xffffffffffffffe9) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x400000, 0x0, &(0x7f0000bff000/0x400000)=nil) ioctl$FICLONE(r0, 0x40049409, r1) ioctl$sock_x25_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={@remote={[], 0x0}, 0xd, 'ip_vti0\x00'}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r1, 0x40045730, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) mremap(&(0x7f00004d8000/0x3000)=nil, 0x3000, 0x4000, 0x3ffffffffffffff, &(0x7f000042f000/0x4000)=nil) 23:31:17 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000440)='/dev/loop#\x00', 0x1ff, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x2000, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be070") r3 = memfd_create(&(0x7f0000000140)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) r4 = add_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="58437023df", 0x5, 0xfffffffffffffff9) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000380)={r4, 0xd6, 0x1000}, &(0x7f00000003c0)={'enc=', 'pkcs1', ' hash=', {'sha1-ce\x00'}}, &(0x7f0000000500)="6983924754b415f04c9774c2b6e7a1adc5a871e83a0f06b27baace333a1ee43829d3ab5ac6e49c63bd52c376db59c6f7cdb2526d73c6ec2b001d5a48cfca6dd894b0c51bdc836864ce02d9173137ead9b2d9fc98159674bb27f4ff19494085b541fcaf909b64699e2e6749c9de60b39da06bae84018f0bd253ed97a46d53e089de568402230db42ea27c091b3af047541caa60797f5e8c0eec4efdf9bd1249fbb1c6667d84753632fb13055c7eb40badc5860437f86fe4eb5bfcf26e4cb2408dafdc42bdabf37b2efa32da4a92c8decb0f59e1df5913", &(0x7f0000000600)=""/4096) unshare(0x205ff) fcntl$setlease(r3, 0x40a, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000240)={0x4, 0x9, 0x6, 0x10000, 0x4, [{0x5, 0xfffffffffffffffe, 0x7ff, 0x0, 0x0, 0xc00}, {0xf9d0, 0x6, 0x4, 0x0, 0x0, 0x200}, {0xfffffffffffffff7, 0x400, 0x916d}, {0x1, 0x8, 0x4, 0x0, 0x0, 0x8}]}) 23:31:17 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfa%\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:17 executing program 5: r0 = socket$inet6(0xa, 0x8000000000000001, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@dev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@broadcast}}, &(0x7f00000000c0)=0xe8) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x0, &(0x7f0000000140)) getgroups(0x2, &(0x7f00000003c0)=[0xee00, 0xffffffffffffffff]) getgroups(0x6, &(0x7f0000000400)=[0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff]) r5 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x7, 0x400) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000340)=@nat={'nat\x00', 0x19, 0x1, 0x22e, [0x20000540, 0x0, 0x0, 0x20000570, 0x2000070e], 0x0, &(0x7f0000000140), &(0x7f0000000540)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0x0, 0x1, [{0x1b, 0x10, 0x16, 'bond0\x00', 'irlan0\x00', 'veth0_to_team\x00', 'bcsh0\x00', @link_local, [0x0, 0xff, 0x0, 0xff, 0x0, 0xff], @empty, [0x0, 0x0, 0xff, 0x0, 0xff, 0xff], 0xfe, 0x136, 0x16e, [@helper={'helper\x00', 0x28, {{0x1, 'Q.931\x00'}}}, @time={'time\x00', 0x18, {{0x1, 0x7, 0x13a1e, 0xb6e, 0x0, 0x80000000, 0x2}}}], [@snat={'snat\x00', 0x10, {{@random="2b2c3a1e6b42", 0xfffffffffffffffd}}}], @snat={'snat\x00', 0x10, {{@remote, 0xfffffffffffffffc}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x2a6) r6 = getegid() lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {0x1, 0x1}, [{0x2, 0x2, r1}, {0x2, 0x1, r2}], {0x4, 0x5}, [{}, {0x8, 0x5, r3}, {0x8, 0x2, r4}, {0x8, 0x5, r6}], {0x10, 0x4}, {0x20, 0x1}}, 0x54, 0x2) listen(r0, 0x6) syz_emit_ethernet(0x4a, &(0x7f00000004c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00140600fe8000000000000000000000000000aafe80d1b555342ddd5c2e558b31179eaa7600000000000000000000000000aa00004e20", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], 0x0) [ 621.531389][T12275] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 23:31:17 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x404000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000001c0)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x800, 0x0) ioctl$VIDIOC_S_FMT(r3, 0xc0d05605, &(0x7f0000000380)={0xc, @raw_data="00f6623e8504c25c37bdb73448318de2b0434a50df249180d1b28d7452b21d9b045a174f98f6bf2ee0be9a4fc61f68164c059eb44e0b567c1dec23324db8245f052b6e12a43f00b964ab50103a336a73edeafc89a1a6a9a079f8923068cdf16af884a4576a04fdba51b2fd9fa6ef8c4410c402d54b4a892aff3a24e6826f1d852def3030d2359e271e22d0bc16468bf0cadf58487d8ddcba8392620629777f3a923fd93a0cd81021cb0dc9dda34a069f5c775e1456ce591fd4948e76d235822ad1f88dcf9359a2ed"}) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000000)={@hyper}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 621.802569][T12275] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved [ 621.838543][T12265] bond0: (slave bond_slave_1): Releasing backup interface 23:31:17 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x15, 0xffffff9c}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2400, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000040)=0x0) fcntl$setown(r0, 0x8, r2) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x100000001}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r3, 0x8}, 0x8) 23:31:17 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x8000, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, &(0x7f0000000080)) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000140)={r1, 0x0, 0x6, 0x49a6, 0x1b81}) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="230000001e0081900000000000001a0000000000000000000300"/35, 0x23}], 0x1}, 0x0) 23:31:17 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x33030000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:18 executing program 5: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x32680100, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:18 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfa/\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:18 executing program 1: socket$bt_cmtp(0x1f, 0x3, 0x5) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000140)={0x1f, 0xfec3, 0x2f06, 0xd9d, 0xfff, 0x1f, 0x1, 0x309, 0x3, 0x2efe8082, 0x1}, 0xb) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="d1f7977be36243adce5a9b3a5352795df19e8c4e6ae5296aa3f043607b184ed65348cc03584ad2f60df945484179bb0eb893c53b86ff45dfb7a43deed5a2866742bf07d14fed5419556322d161e203b63ca6332607f98e46057d0f097d1c5b273515bf522319c242fdbb8c7b423bef955b96e8337185ba7560e25b4760a1c4363f3d35ba3f9f0ec26165dd729ee9a99788c15bfdb064bf2c807cac2613b799b811843f3cad1c5d32d25f350ae3558455fc36a91a4d4b2b52ed69", 0xba, 0xffffffffffffffff) add_key$user(&(0x7f0000000400)='user\x00', 0x0, &(0x7f0000000480)="0ae4d3db0547d1471076611887dfdad059884913d90261017b56aea58fe107e30afa9637eb29bcdfda86dfd49f570ddfad940e1537257600d392bdfa61c5420cbc33346e0c760d4511a4ae78abf66103f05001dbb6074a61e7f5bf7b89eac8d1fbd88306a6e95bc62e185b288da4", 0x6e, 0xfffffffffffffffb) add_key(&(0x7f0000000500)='asymmetric\x00', 0x0, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)="eb3f77f3a7b1bb6865a45926", 0xc, 0xfffffffffffffffd) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000007c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) syz_open_dev$mouse(0x0, 0x8, 0x10000) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, &(0x7f0000000940)) ioctl$KVM_DEASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x4040ae72, 0x0) keyctl$unlink(0x9, r0, r0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r2, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r2, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x00\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 23:31:18 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) fcntl$addseals(r0, 0x409, 0xe) r1 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x7, 0x402000) ioctl$RTC_UIE_ON(r1, 0x7003) setrlimit(0x40000000000008, &(0x7f0000000080)) capset(&(0x7f0000a31000)={0x19980330}, &(0x7f0000000000)) mlockall(0x6) r2 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0xd43, 0x101000) write$selinux_attr(r2, &(0x7f0000000100)='system_u:object_r:ipmi_device_t:s0\x00', 0x23) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000180)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r2, 0x40086425, &(0x7f00000001c0)={r3, 0x3}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x0, 0x0) 23:31:18 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000000140)=[@acquire], 0x0, 0x0, 0x0}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x400080, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000180)={{0x2c4, 0x11e5}, 'port0\x00', 0x10, 0x1, 0x6, 0x0, 0x7, 0x7456, 0x3, 0x0, 0x1, 0x7fffffff}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0xaf14113f02c18c41, 0x0, &(0x7f0000000680)}) dup(r1) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000100), 0x1) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000003c0)={0xc, 0x0, &(0x7f0000000300)=[@dead_binder_done], 0x0, 0x0, 0x0}) 23:31:18 executing program 5: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x32680100, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:18 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x33680100, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 623.171392][T12339] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 23:31:18 executing program 0: socket$netlink(0x10, 0x3, 0x2) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f0000000000)={'ex:'}, 0x0, 0xfffffffffffffffc) 23:31:18 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000018000)=0x1, 0x4) bind$inet(r0, &(0x7f0000003ff0)={0x2, 0x0, @multicast2}, 0x10) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000340)="7e5f8d1a119d1ce805a2c29c1fd61af7c1d03573448f8208bbe216d7dcb2779e13d257c21d5061d04b0065ed643e9eef35e05e38414078ccfa65aa915f7faa7d121c495171a747678b2aa0e4cbadd0b7244e4cb9935d665c8c2074d7e34f83a12c4d751f7ffbcbf7b1fd7f50ddccc437185d638866128b26c4f7d25e579c15c7d157bb289a5743c6fea35b3c48e349ce17c81f9b00789d7e835d123b8570ff4085590efb2922f9e5fb84ae93bcb549fe9b4f7d57faaeb0628430e4f2ac71dbf17bd9c70b7a4cde1251fb5a133b4b6016b48f1d2c59e6990788a2cd9178dccc9b53485d045da69f31c35aa71b") connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @initdev}, 0x10) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40, 0x0) ioctl$KVM_GET_SREGS(r1, 0x8138ae83, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000013000)=[@in={0x2, 0x0, @broadcast}], 0xfffffffffffffdf4) listen(r0, 0x200000c) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000040), &(0x7f0000000300)=0x4) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f00000000c0)={0x3eb600b7, 0x8, [0x6, 0xf63]}) accept4(r0, 0x0, 0x0, 0x0) 23:31:18 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfa\\\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:19 executing program 0: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYRES16=0x0], 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/tcp6\x00') getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 623.400714][T12329] bond0: (slave bond_slave_1): Releasing backup interface 23:31:19 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x100, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r1, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0xea03, 0x8a000) mlockall(0x3) connect$netrom(r2, &(0x7f0000000100)={{0x3, @default, 0x6}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) timer_create(0x7, 0x0, &(0x7f0000000080)) setsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, 0x0, 0x0) 23:31:19 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x02', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:19 executing program 5: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x32680100, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:19 executing program 1: r0 = socket$inet(0x2, 0x3, 0x400000000018) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @remote}, {0x0, @dev}, 0x0, {}, '\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00:\xd6\xe8=\x00'}) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000000)={{0xbb, @remote, 0x4e20, 0x3, 'lblc\x00\x1a~a,\n\xd1\xb0\xe0\x00', 0x8, 0x0, 0x76}, {@local, 0x4e21, 0x0, 0x8001, 0x9cde, 0x6}}, 0x44) 23:31:19 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x34680100, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 624.275825][T12392] IPVS: set_ctl: invalid protocol: 187 172.20.20.187:20000 23:31:20 executing program 3: ioctl$TCSETXF(0xffffffffffffffff, 0x5434, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000000c0)={@loopback, @multicast2, @loopback}, &(0x7f0000000100)=0xc) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000c00)={0x6, 0x118, 0xfa00, {{0x101, 0x424f, "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", 0x55, 0x3, 0x4, 0xff, 0x6, 0x0, 0x1000, 0x1}}}, 0x120) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vxcan1\x00'}) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) sendto$packet(r0, &(0x7f0000000140)="03c902cff0623acfaa3754d2789fa089208b6332a05d5306b7d8e9013a801b49c46213ba2abc67bea49bb0957cb3c43f1f4b2bed92ee7b023c", 0x39, 0x20000000, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"], 0x953) [ 624.347717][T12399] IPVS: set_ctl: invalid protocol: 187 172.20.20.187:20000 23:31:20 executing program 1: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000080)={'nat\x00'}, &(0x7f0000000100)=0x54) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xffffffffffffffa4, 0x4) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000007000)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 23:31:20 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x03', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:20 executing program 3: acct(&(0x7f0000000240)='./file0\x00') process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}], 0x2, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x2, 0x2) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f0000000180)={0x0, 0x0, {0x0, 0x7f, 0x700f, 0xf, 0x0, 0x2, 0x0, 0x2}}) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0xfffffffffffffffd, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x80}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$key(0xf, 0x3, 0x2) getsockopt$inet_dccp_buf(r0, 0x21, 0x0, &(0x7f00000000c0)=""/87, &(0x7f0000000480)=0x57) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020800010c000000000000200000000002000900400000f76f1a4e0000000000030006000000060002f18792566b2a120b1458186fe8b90002000100000000002000020200044a7b0300050000000000025f050000003f010700000000fca0d9edcc23d617c72a11954f5154ce8a589b0979fdf1a4521d37569b80b2079f3d092aaa77afcfbffd8e4a69c975758a46bf6cc0a86785f94cf35741dc66b9a78cf40a3a50f1e7a2923791b5c55498d823c1635350e3a06e4a0e3b6bd892f09dd9d3602ba643bdd91ab93e7c92144d18b6ff28cab23ffaf8b7ae54d040f5e286b61ea39c712a2a1c15ebe6e786fafb1d45061d217962913b8b0b061326062712af236337fdb679410df333977112127459585b607aec67f1e6d8340f0a33b51076275c2c88804ff9971234eb5455ee5c83258f4c72b52c906f83e0223d18c16abda169f8ff6d99"], 0x60}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x101200008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") request_key(0xfffffffffffffffe, 0x0, 0x0, 0x0) exit(0x10000000000007) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)=0xffffffffffffff6e) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x1f) r3 = syz_open_dev$media(0x0, 0xfffffffffffffffe, 0x40000) r4 = openat(r0, &(0x7f00000003c0)='./file0\x00', 0x400, 0x20) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f0000000400)=0x2faf) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r3, 0xc008551a, 0x0) sendmsg$TIPC_NL_BEARER_GET(r3, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x3000040}, 0xc, &(0x7f0000000280)={&(0x7f0000000440)=ANY=[@ANYBLOB="b4eb02cc9b84d7af7a5415d0300bc1ef246cf41a251b690300400008", @ANYRES16=0x0, @ANYBLOB="0000000000000000000004000000"]}, 0x1, 0x0, 0x0, 0xc054}, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000300), &(0x7f0000000340)=0xa3) 23:31:20 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000280), 0x4) syz_emit_ethernet(0x66, &(0x7f00000001c0)=ANY=[@ANYBLOB="ffffffffffff0180c289030086dd607660510030aefffe80034300050dff00000020000000ffff020000000000000000000000000001860090780007000060c5961e00000000ff010000000000001803000005000001ff0200000000000000000000000000017eefc64366d906a8168a203b996f7caa9bd683cff5673d303b4b37acff"], 0x0) uselib(&(0x7f0000000080)='./file0\x00') r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0xa0800, 0x0) ioctl$TIOCGRS485(r1, 0x542e, &(0x7f0000000040)) r2 = getpid() syz_open_procfs(r2, &(0x7f0000000000)='net/sco\x00') r3 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x8400) getpeername$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000180)={0x9}, 0x1) 23:31:20 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x35680100, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 624.819154][T12422] Unknown ioctl 21550 23:31:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = gettid() ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000469ffc), 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x6902, 0xffffffffffffffff) faccessat(r3, &(0x7f0000000140)='./file0\x00', 0x6, 0x0) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x801, 0x0) r5 = syz_open_dev$swradio(&(0x7f00000027c0)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet_sctp_SCTP_STATUS(r5, 0x84, 0xe, &(0x7f0000002800)={0x0, 0x3ff, 0x8, 0xfff, 0x400, 0x7, 0x2, 0xffffffffffff0001, {0x0, @in6={{0xa, 0x4e22, 0xa10, @ipv4={[], [], @empty}, 0x4}}, 0x3f, 0x6, 0x6, 0x8000, 0x8}}, &(0x7f0000002580)=0xb0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000028c0)={r6, @in={{0x2, 0x4e22, @multicast1}}}, 0x84) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002980)={'team0\x00'}) sendmmsg$sock(r2, 0x0, 0x0, 0x20040010) socket(0x10, 0x0, 0x0) r7 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_opts(r7, 0x0, 0x4, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, 0x0, 0xfffffffffffffca4) connect$inet(r7, 0x0, 0x0) tkill(r1, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca5055e0bcfec7be070") recvmsg(r0, &(0x7f0000001380)={&(0x7f0000000040)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000001240)=[{&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000140)=""/126, 0x7e}, {&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/67, 0x43}], 0x4, &(0x7f0000001280)=""/203, 0xcb}, 0x100) setsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f00000013c0)={@multicast2, @remote, r8}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x15, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x5, 0xffffffa6, 0x0, 0x0, 0x8c280000}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153}, 0x3e) [ 624.879222][T12437] Unknown ioctl 21550 23:31:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca500000000ec7be070") r1 = openat$cgroup_ro(r0, &(0x7f0000000240)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xedc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f00000007c0)='m\x99k\x88\xba\xc3\x9d\xe1\x10at\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x2) close(r1) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e23, @remote}, @in6={0xa, 0x4e24, 0x6, @remote, 0x758}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1b}}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e21, @local}, @in6={0xa, 0x4e24, 0x3, @remote, 0x7ff}, @in6={0xa, 0x4e22, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7}, @in6={0xa, 0x4e21, 0x1, @local, 0x1000}], 0xc0) 23:31:20 executing program 3: socketpair$unix(0x1, 0x20000000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={&(0x7f0000000280)={0x10, 0xf000, 0x9effffff00000000}, 0x59, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="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"/271, @ANYRES32=r2, @ANYBLOB="020000000a000200aaaaaaaaaaaa0000"], 0x42e}}, 0x0) 23:31:20 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x36680100, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:20 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$midi(&(0x7f0000001380)='/dev/midi#\x00', 0xffffffffffffffff, 0x309200) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001400)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r2, &(0x7f0000001700)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x2001000}, 0xc, &(0x7f00000016c0)={&(0x7f0000001440)={0x244, r3, 0x0, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}]}, @TIPC_NLA_MEDIA={0xe4, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5f07}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3b66}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_BEARER={0xa8, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @remote}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x2, @remote, 0xffffffff}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x1, @mcast1, 0xc0}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x5, @local, 0x2}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'gretap0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xc775}]}, @TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'vxcan1\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xa000000000000000}, @TIPC_NLA_BEARER_DOMAIN={0x8}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x14, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffffffd}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x800}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x40}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x22e4}]}]}, 0x244}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000100)={@initdev, @dev, 0x0}, &(0x7f0000000140)=0xc) sendmsg$nl_route_sched(r4, &(0x7f0000001340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2800}, 0xc, &(0x7f0000001300)={&(0x7f0000000180)=@newtfilter={0x116c, 0x2c, 0x704, 0x70bd28, 0x25dfdbfc, {0x0, r5, {0xc, 0xe}, {0xe, 0x5}, {0xf, 0xffff}}, [@TCA_RATE={0x8, 0x5, {0x3, 0x1000}}, @filter_kind_options=@f_fw={{0x8, 0x1, 'fw\x00'}, {0x1110, 0x2, [@TCA_FW_CLASSID={0x8, 0x1, {0xfff3, 0xe}}, @TCA_FW_POLICE={0xc, 0x2, @TCA_POLICE_AVRATE={0x8, 0x4, 0x40}}, @TCA_FW_ACT={0x1040, 0x4, @m_connmark={0x103c, 0xd, {{0x10, 0x1, 'connmark\x00'}, {0x20, 0x2, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x0, 0x40, 0x6, 0x3, 0x7ff}, 0x3d}}}, {0x1004, 0x6, "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"}}}}, @TCA_FW_CLASSID={0x8, 0x1, {0xa, 0xf}}, @TCA_FW_MASK={0x8, 0x5, 0xb4d6}, @TCA_FW_CLASSID={0x8, 0x1, {0xf, 0xffe9}}, @TCA_FW_MASK={0x8, 0x5, 0x8001}, @TCA_FW_ACT={0x90, 0x4, @m_ipt={0x8c, 0xe, {{0x8, 0x1, 'ipt\x00'}, {0x38, 0x2, [@TCA_IPT_HOOK={0x8, 0x2, 0x4}, @TCA_IPT_INDEX={0x8, 0x3, 0x2}, @TCA_IPT_INDEX={0x8}, @TCA_IPT_INDEX={0x8, 0x3, 0x6}, @TCA_IPT_TABLE={0x14, 0x1, 'filter\x00'}]}, {0x44, 0x6, "14243338d55baa8813926b0ed49f67d68a622076b07a658566f82464a12c18f33e68069ca5570df112fff103f1755404f151986a336b147b787e2f813b5a6669"}}}}, @TCA_FW_CLASSID={0x8, 0x1, {0xfffb, 0xf}}]}}, @TCA_CHAIN={0x8, 0xb, 0x3}, @TCA_CHAIN={0x8, 0xb, 0x1}, @TCA_RATE={0x8, 0x5, {0x1ff, 0x20}}, @TCA_CHAIN={0x8, 0xb, 0x6}, @TCA_RATE={0x8, 0x5, {0x5, 0x5}}]}, 0x116c}, 0x1, 0x0, 0x0, 0x40}, 0x90) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='uid_map\x00') dup2(r0, r6) 23:31:20 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x04', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:21 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) getsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f0000000380), &(0x7f0000002600)=0x4) 23:31:21 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0x6, 0xfff, 0x8000000001}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77ffff, 0x0, 0x10020000000, 0x0}, 0x2c) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x10, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000100)={r0, &(0x7f0000000000), 0x0}, 0x18) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0xd8, r2, 0x1, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3ff}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x100000000}]}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2e}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xb3}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xc0}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1641}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x6, 0x1}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x289}]}, 0xd8}, 0x1, 0x0, 0x0, 0xadcdea59b1c62f00}, 0x4) 23:31:21 executing program 5: ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x2, @remote, 'batadv0\x00'}}, 0x1e) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180), 0x1, 0x0, 0x0, 0x10}, 0x80) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x2000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in=@loopback}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000000400)=0xe8) setxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v1={0x1000000, [{0x7, 0x81}]}, 0xc, 0x1) accept4(r0, &(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x80, 0x800) ioctl$SIOCRSSL2CALL(0xffffffffffffffff, 0x89e2, 0x0) sendmmsg(r0, &(0x7f0000005b40), 0x40000000000014d, 0x0) 23:31:21 executing program 0: syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x200040) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x101080, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000140)=[0x4, 0x4], 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x8000e, 0x7d, 0x7, 0x3, 0x10, 0xffffffffffffffff, 0x80, [], 0x0, r0, 0x0, 0x3}, 0xffffffffffffff44) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xc, 0x4, 0x1, 0x8000000007, 0x0, r1}, 0x3c) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000200)=[0x3, 0x2], 0x2) ioctl$sock_ifreq(r0, 0x8915, &(0x7f00000000c0)={'veth1_to_team\x00', @ifru_flags=0x1000}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000001c0)={0x0, @aes128, 0xbdfe10843d303b4f, "c50fae01d36f2686"}) bpf$PROG_LOAD(0x5, &(0x7f0000002ac0)={0x7, 0x5, &(0x7f0000001440)=ANY=[@ANYBLOB="180000000000000000f9ffffff00000018100000", @ANYRES32=r2, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000001480)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000014c0)=""/4096}, 0x48) 23:31:21 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x37680100, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:21 executing program 3: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x36680100, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffffa, 0x20000802, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r2 = dup2(r1, r1) sendmsg$TIPC_NL_PUBL_GET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e22, 0x400, @remote, 0x8}}}, &(0x7f0000000000)=0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000340)={r3, 0x8a, "7039e90663e3d357a795b993d45a3fefc6d2d00e95e830ddde1598c28a827149fa9d9b40e450274359ccd7fb1236aee3c44caa31e55c5fd107ab539f16d451a3e098822c3479272287d19b2e8bf83ecd089aebcbfd63298ce7ca67a41cc866e6614818bc25520241e9e8aef44e60022eef2906ead0c7d4ee1d226696d1fab7e3489fa73fdc96c930f52a"}, &(0x7f0000000080)=0x92) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) close(r1) 23:31:21 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x05', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000000000000000000000000000000ff01000000000000000000000000000000000000000000ffffffff0000000000000000080000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aab66052603e9cf5696afadaef9e4728aaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e0000000000000000000000004000000000000000000000000000000000000000000000113e0000285f000180000000000000000000000000000000000000000000000000000000000002000000000000000000"]}, 0x220) 23:31:21 executing program 0: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) poll(&(0x7f0000000140)=[{}, {r0}, {}, {r0}], 0x4, 0x8000000000047) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x4e, 0x0, 0x0, 0x800e004de) readv(r1, &(0x7f0000000180)=[{&(0x7f0000000080)=""/185, 0xb9}, {0x0}], 0x2) r2 = dup(r1) recvfrom$inet(r1, 0x0, 0x1000001ab, 0x0, 0x0, 0x800e004e1) shutdown(r2, 0x0) 23:31:22 executing program 1: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) poll(&(0x7f0000000140)=[{}, {r0}, {}, {}], 0x4, 0x8000000000047) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x4e, 0x0, 0x0, 0x800e004de) readv(r1, &(0x7f0000000180)=[{&(0x7f0000000080)=""/185, 0xb9}, {0x0}], 0x2) r2 = dup(r1) recvfrom$inet(r1, 0x0, 0x1000001ab, 0x0, 0x0, 0x800e004e1) shutdown(r2, 0x0) 23:31:22 executing program 3: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x36680100, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:22 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, 0x0, 0x0) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) shutdown(0xffffffffffffffff, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f0000000140)) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/attr/current\x00', 0x2, 0x0) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r3, &(0x7f0000000040)={'#! ', './file0'}, 0x10094) write$binfmt_script(r3, &(0x7f0000000100)=ANY=[@ANYRES32], 0x4) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r2, 0xc004aea7, &(0x7f0000001300)=0x7fffffff) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r4 = request_key(&(0x7f00000001c0)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f00000002c0)='#! ', 0xfffffffffffffff9) keyctl$get_security(0x11, r4, &(0x7f0000000300)=""/4096, 0x1000) 23:31:22 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x38680100, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:22 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x06', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0xa) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000000c0), 0x12) r1 = socket(0x10, 0x2, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip6_flowlabel\x00') sendfile(r1, r2, 0x0, 0x2007ffffffe) 23:31:22 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 23:31:22 executing program 3: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x36680100, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:22 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x39680100, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000240)=""/159, 0x9f}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00515) shutdown(r1, 0x0) r3 = getpid() getpgid(r3) recvfrom$inet(r2, 0x0, 0x605ac169, 0x0, 0x0, 0x800e0051e) shutdown(r2, 0x0) 23:31:23 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\a', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(r0, &(0x7f0000000040)=""/175, 0xaf, 0x1, &(0x7f0000000200)={0xa, 0x4e22, 0x4, @ipv4={[], [], @multicast2}, 0x8}, 0x1c) r1 = perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x85b, 0x20003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x8000002}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000240)=0xde94, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='dctcp\x00', 0x6) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = open(&(0x7f00000004c0)='./file0\x00', 0x12d000, 0x19) write$P9_RXATTRWALK(r2, &(0x7f0000000500)={0xf, 0x1f, 0x1, 0x2}, 0xf) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='reno\x00', 0x5) openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x84000, 0x0) 23:31:23 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x3a010000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:23 executing program 3: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") write(r0, &(0x7f0000000080)="240000001a005f0214f9f407000904001100000000000000000000000800040003000000", 0x24) 23:31:23 executing program 5: r0 = gettid() ppoll(0x0, 0xffffff99, 0x0, 0x0, 0xffffffffffffffba) syz_open_procfs(0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) rename(0x0, 0x0) lsetxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) ioctl$TIOCGICOUNT(0xffffffffffffffff, 0x545d, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) removexattr(0x0, &(0x7f0000000040)=@random={'osx.', '/dev/full\x00'}) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r0, 0x16) 23:31:23 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000002) 23:31:23 executing program 0: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='ip_vti0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0xc0, 0x0, 0xffffffffffffff37) 23:31:23 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\b', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:24 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x3a680100, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) read(r1, &(0x7f0000000200)=""/50, 0x32) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = dup(r2) fcntl$getflags(r0, 0x3) recvfrom$inet(r3, 0x0, 0xcd44, 0x0, 0x0, 0x800e0053d) shutdown(r3, 0x0) 23:31:24 executing program 5: accept$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 23:31:24 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000002) 23:31:24 executing program 0: 23:31:24 executing program 3: 23:31:24 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x3b680100, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:24 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x0e', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:24 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000002) 23:31:24 executing program 0: 23:31:24 executing program 3: 23:31:24 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) getpeername(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x0) write$P9_RXATTRWALK(r0, 0x0, 0x0) 23:31:24 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000002) 23:31:24 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x1, 0x0, [{0x1}]}) 23:31:25 executing program 5: 23:31:25 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x10', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:25 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x3c000000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:25 executing program 3: 23:31:25 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000002) 23:31:25 executing program 5: 23:31:25 executing program 0: 23:31:25 executing program 3: 23:31:25 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000002) 23:31:25 executing program 5: 23:31:25 executing program 0: 23:31:25 executing program 3: 23:31:25 executing program 5: 23:31:25 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfato', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:25 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000002) 23:31:25 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x3c680100, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:25 executing program 0: 23:31:26 executing program 3: 23:31:26 executing program 5: 23:31:26 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000002) 23:31:26 executing program 0: 23:31:26 executing program 5: 23:31:26 executing program 3: 23:31:26 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000002) 23:31:26 executing program 0: 23:31:26 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\xf0', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:26 executing program 5: 23:31:26 executing program 3: 23:31:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000040)=""/41, 0x29}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f00000002c0)=""/161, 0xa1}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x2) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000080)=""/24, 0x18}, {0x0}, {0x0}], 0x3}, 0x0) shutdown(r4, 0x0) shutdown(r1, 0x0) 23:31:26 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x3d680100, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) readv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/230, 0xe6}, {0x0}, {0x0}], 0x3) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfffffef4, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000040)=""/20, 0x14}, {0x0}], 0x2}, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0x8164, 0x0, 0x0, 0x800e00547) shutdown(r4, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000340)=""/169, 0xa9}], 0x1}, 0x0) r7 = dup(r6) r8 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r8, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r7, 0x0) r9 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r9, &(0x7f0000000700)=[{&(0x7f0000000000)=""/35, 0x23}], 0x1) shutdown(r8, 0x0) shutdown(r5, 0x0) shutdown(r3, 0x0) 23:31:26 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000002) 23:31:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000000c0), 0x3) 23:31:27 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000002) 23:31:27 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:27 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) read(r0, &(0x7f0000000040)=""/30, 0x1e) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) sendto$inet6(r2, &(0x7f0000000200)="150300000600400000000200850cf7c21975e697080000026b2a2fcddad8897c6f11876d886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a0", 0x4c, 0x0, 0x0, 0x0) 23:31:27 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000002) 23:31:27 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x3e680100, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:27 executing program 3: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) r1 = socket$inet6_tcp(0x1c, 0x1, 0x0) poll(&(0x7f0000000080)=[{}, {r1}, {r0}], 0x3, 0x8000000000049) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x4e, 0x0, 0x0, 0x800e004de) r3 = dup(r2) poll(&(0x7f0000000040)=[{}, {r2}], 0x2, 0x7ff) shutdown(r3, 0x0) 23:31:27 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x0e', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:27 executing program 0: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x37680100, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:27 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:27 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000002) 23:31:27 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000002) 23:31:27 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x3f000000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:28 executing program 5: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x3e680100, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:28 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000002) 23:31:28 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:28 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000002) 23:31:28 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x3f680100, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:28 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) read$eventfd(r0, 0x0, 0xffffff6b) 23:31:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7fff, 0x1) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000240)=0xffff, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x0, 0x1}, 0x20) r3 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000100)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00', 0x21, 0x7f, 0xffffffffffffff17, 0xfffffffffffffffc, 0x2, 0x401, "64cdc60e4d648a893cf10503c3bf1f1991edf40625e6e6f7b9df98a9a1aec11e46"}, 0x139) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x200004) sendfile(r0, r4, 0x0, 0x80001d00c0d0) 23:31:28 executing program 5: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x3e680100, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:28 executing program 1: perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000002) 23:31:29 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:31:29 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:29 executing program 1: perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000002) [ 633.521204][ T26] audit: type=1800 audit(1561851089.214:68): pid=12926 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="sda1" ino=16739 res=0 23:31:29 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x40000000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:29 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000480)={0x0, 0x0, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') syz_open_dev$adsp(0x0, 0x0, 0x400200) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='rpc_pipefs\x00', 0x0, 0x0) semop(0x0, 0x0, 0x0) 23:31:29 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20\x00', 0x200042, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x58, r2, 0x121, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x44, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x41}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000001}]}]}, 0x58}}, 0x800) ioctl$SG_IO(r0, 0x2285, &(0x7f00000006c0)={0x53, 0x0, 0x6, 0x9, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000600)="9d2297ffe5f2", 0x0, 0x20, 0x0, 0x0, &(0x7f0000000680)}) 23:31:29 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) r0 = syz_open_procfs(0x0, &(0x7f0000001300)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 23:31:29 executing program 1: perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000002) 23:31:29 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000002) 23:31:29 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x8, 0x210002) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x45, 0x0, 0x0, 0x10}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0xfffffffffffffffd, 0xc3, &(0x7f0000000300)=""/195, 0xfffffffffffffffe, 0x0, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x72}, 0x70) 23:31:29 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x6) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x410141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") utime(&(0x7f0000000040)='./bus\x00', &(0x7f0000000100)={0x3, 0x8}) mmap(&(0x7f00002e4000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, &(0x7f0000000080)) name_to_handle_at(r0, &(0x7f00002e4000)='./file\xff\xff', &(0x7f0000000040)=ANY=[], &(0x7f0000001ffc), 0x1400) 23:31:29 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x40680100, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:30 executing program 5: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0xce1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x66, 0x0, 0x28000000000000, 0xbab, 0x2e1, 0x0, 0x0, 0x0, 0x6, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1025, 0x0, 0x0, 0x1, 0x757c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000f700000000000000000000000000000000000000000000000000000000a318e9409272288645a8e464029954b8bfa4b86ada9043841c47"], &(0x7f00000002c0)=""/245, 0x26, 0xf5, 0x1}, 0x20) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x80001, 0x0) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x1, &(0x7f0000000440), &(0x7f0000000280)=0x60) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f00000004c0)=""/220) r2 = socket$can_bcm(0x1d, 0x2, 0x2) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000240)={0x10, 0x30, 0xfa00, {&(0x7f0000000200)={0xffffffffffffffff}, 0x0, {0xa, 0x4e24, 0xfffffffffffffff7, @mcast1, 0x2}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r3, &(0x7f00000003c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r4}}, 0xfffffffffffffe5c) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000000)={0x1, 0x9}, 0x8) ioctl$KDDISABIO(r1, 0x4b37) 23:31:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x1) mkdirat(r1, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r2 = open(&(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 23:31:30 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000002) 23:31:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x7cc, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r1) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000), 0x4) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000340)='./file0\x00') r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001440)={0x8, "c0c814a55b6300d28afc61ac7dd1ffb869b761e8e53ee36e4be89e9fea175523e4468dec44bf8b5473c7a5062b4ede67dcb24cb9484ccfff2b3a70befc56e8ab2eee3483f5bf78c16beac035b700eb84e2216f268d02b717d2046c273814475b412437f7dc08a13a55d3c02132999dfd9fe80b750eff4d7c1da975b3835602728ae09e72527fcee19377e29c6c19e1ccce0f75e0e54001e3e83e473fa3d37eca8be1b3de565571e0e84f310c11fa8616068113b038aaa5c69967699fc2aa41c6f26fc22cf68e3577242c9b4ca20fab9de5885e0648fbd7af089b05f38f152d2f8144461608733c567b6dc5d2a07022c3764565c85abcfd99dd7a85e58939278235d50e8b321be7dbaa5141e097c28364fad2f713d666ca94f4e429687fcabb72aceeaf8abe5b506d98dc393b6e97492d785ead0ca2953f92c4d2b2c9f616e3d98b36be55a923fc5892413f7a3b615cec89b52e0ecdcee0aa5af72bcbb91b4bade7435dd8b529feaf13f8b48fcaca5952235d2e909f8831d8ca05a0daa3f6c581f388e0c1879b41fe63ef3d122bd0c5acd4fb07b96797918791075ae7383bb1bbdea574b31301ff37ecc45671ee2e7fc55bf6244025d1fd82dca56a42a23aa826a0b1e102bd87893ddc05649304eb1866c796e46e0d57f552bd572891ef892918bb2e7f2c6bcf68f388ea0c50f48c06de1b46b1434cdf25ca1288ebabe2a33d1c6effb77f91ef75471e93952caeda8ac2b2677e46d62b8366922d093832bccb949e177b4417864812d22972d81d89158288b5318d017329d4e8f66273abf74c434f318ebf32c7629342a85336387231b1e579d57cff0b125bef9dddf0fc33f71cb59d5a8972cda06ba6bba4a89cb8d3b465492c431698984998b2979ea61fed3d99b049724f2bdda5a0700ccb28825da1343f41290e569a6d38d4ae3968147cf39b097efd78e058fc71523c12e724bf93dc4ecc02b5cb18d13b59ec8f85368ac1ea93ed0149c60c53569dc69cdb3f37470eab26ef010b03a7e651b9e8e9065da347660836eddb3988c9a0f394aad055f727310f646d6cb35131d02aaf24735792bfce250798bebf0d1a4495fca568b9449e81afef2937b50faf873257d7efa07d31759474d50ca2a7922e79ab47dd59b11dfd1ec43fef3551aed81d01ee4ab997c6cecc39013dcaa442aec803e4cebbc288b4f9e87b30613f0ec88ddc6f60f56787f4040897e6e6bdac317d74b27f97f2efadb031f03c61954fd0232373582b7fa315d3eb9f67053126d2ed0636f04d669c47bdeb078fbda177533902e20b5ce9d8f395ea4c0aaf2cae774fe99bc40105a9ca184bcb598ab2f49c1df62d32d1a6d73a26812cb47a2ccaf0e9b759df89ad1e18238d897b9fd658f6786a92a0c12bd0ee6dad8a430a67962363e5b9afb3329e4f1f6fcd7e63cb8f24872bcf5b8c349d9ce423666ca39f16884219dea338b388e40f4ad996419cb3858637364d8e5af67f846d77b2749115131a3642ef56681315e4a2cbca5e60febabf693570f515e09c2a8994a8e2be3cba28118ef429d4de781118182607dd2c2d5aaba621ea29c140338bd8f1787fd2a3f43bb7fa22a8ce053adb331a4c78eab569af317e14360a6bf1c8b7394f34bfc1a941ac88dab334d5a2d45fc83bee28884698fd82339c972a06efb369220049ca89727513bd4262ad6f94f55f659ec98b684b1d92e1b6a303548a196cc5316e9845baaf01e737ef047d3d1ac4fe13de618e8fd6471c225e688b73b866213f4765c1a1ecf041f66a11177b0425b0423c455dccfa35a34f3b1c4c9850267bd41dcc366f4f8fef6982699e9aee7f3edff90217c84f6865234676e65911e5e99739792161766e959d061d6e86797b595ae3cffc043da0929dce1b4bd27e04532800f14f69398a681d46f00197f547fa138e676a4c84e586e9a2037faad7d7342221c229ff13606688ab70305dc28d01270604fbcb2b5777541e637a10e7d6c2dfa76461b18c8b303234282f31b7ed8afd0cdcc3978c6520a182000ea312296c7d9df08c2a67b944bc519113822014a831c8d6a7f8d26a7a443666b6077bdc1c11cf47001bcbb484d163543445c77a02140191bbb813da818b4dc3ef1ca420f624e5cb67c48024aeb8691b549202750899938067a3ad49da19e9fffc6486b3525fba8b2ff991fb3b4c1a536818f2dad96f713ac264a22136c6a3a9eacb4f69ab08cfe2b971a7d916833c6a0370d4b0bc428db2e4b4013899668b73caf9c983e2f07e46b4b5b4f0d231edee8b1951e1d0e34c881d1fc5c6be05b92b13680398e7109bd18048f0bd980fceb24e59411873e7a8a7f95f4da2ba5c082fdda710361e163a213a3dbb82c08a69020545da4636c09a67cd962182a011cf5eb1c3d999abc7b834ee518bb53afe19941927ca190699abf79c334c52e206fc851deb7398947ad5bd125ef3f51349497142e921c85506c739f6319ae0eb8e3c551ceb7e16afc2d6aad36841ed8eb560ef984ee5e00f1ead2c646546b3c145e3700b07fc257551641cf3dcb76a8b3cc75994f2c3eb521cea22d64c8b72b2de506fde8185b70b4707b7f571668a5925ca21e605904d7c896a5d7290b9c4fc75ecc7ddbbd7f6f003a74f53d1a5432e0377a3efce1e7ac61e36dc13aeea57400d4d3986db3fccb6edaf83f86daeb42f416f58c502e74178e013b399d0b155e0df86b40b5f3f2ab0ad61c90870cee340c07977b55622699101e5372677dd4e208fa6b5d4834a2d6f37b2ead107218aa0e702d1f6a60bd4ad3a2e22807237129fdc02993ef1fffe3c285bd4f7b093b2da8d772ce2df7874bf9b7fd0893eb66a4931acc38129bfe4a8fc6b28ea83bcca1220b66c86d4d90914bb9e9a425fce618f11b66f93aa78515eac0f3956cb1e8b6f12d7f6f22c1ca5563e280b15c64732aec2a37d6010cee0fd2263ea3ea2011043153284b4a5fc87cc0dd8c36f084ce715a6e9ba3e8b2586726255d122f2b5677d6590405ae031df8f83840ef3011a7f5d18037407758270d980aa65d5a4aa26a35a61b65178b6183b282771e89a8fe47bd3ea5a23146b924a47c3cc2540a9c8d91d4a8924e010fb6d3e60457e0aa86749cc3444707fda055a0f489aecda68af7f0d7d31cf25641a10bcc0d00996cddf9059121639fa3ff2e5490bae6b702fcf226d8e50f27f0973e5e4cf543445524d0fe3bd55d3f215978bfabcba0d44c076f5b333b2095c70f6a5426338bf0c065ddce27f6730606d84d1ccef8cebcd15085fa8a5d0975dc47eeb09a4ab6da21d01916c97f4e266c4b01f2bfb3b6a08bb5a7cf834e56782d824e7c55b591cd883ed9e806a4f7033bbab49a2b8ab2cb0f6da9d76968208236b35a51f8eba3769a676ad60d69c475706a630f3a078ebaa6ba5bc25719867cb61d48cc3a381b261165c04f3c93f37d72fc15f43df1de34e24e80a46f5d15fb362e71cb4a5365dde04a53dc5e42745fbd601ff148db416244dd76ac16f24138ef9a02491eb5b48d731a8bdcd46040d0ff11a07c040b83db84bfd21ffb1d818203cb7d3f8fca47f1dc510afa8219ab031aaba2147aed7c50228930e895a72abf55ca6997131e231ea92e0059b680735548adf2d572c3540e096a644deb3750e3b341bbeffee70ff22e0b4e56142e4c1965c01a646dd9b5b0055f88f08987ad45adb844b9ffc84792073048c28bcb60f2666802052ee45dcd9a2950d55ecf0234a3dcf67e83cfa0bfb1285eb54e6292d8075c9e1b459e48556f416898557c9c864fc5de459feb53e33dd1a6860a2d1a836ab5ff6efaee123b3715a7137787ee4345efbce38074e262f363a8ff400345c8539d44a7286c7291246810bce063f0877db6585842380b530a4aaef6e36779a95fed220cef6c1fff2fdd5031f83987dc3282d432f322852cc9dc6d00c59d5ed83b386ff97c521e528e59f2df932467ac02d17f8818c2de26d69725f42cecaf186fab7b6e10b1ebd9a9a12ed83cd382d9a6f9a9bed2736cb0ec0260057f5ec704d2e1a64caad59e02ff2022174b23564cb0942e6769b12e0ae4d65dc4c5e6b6ceaf2667e085909c93a9768b7bfdac612801c0bc3848bad51e2367f788cbd1c5091ce0e9c567528c72003712e91247d87f1ff60d3865fc687a35886822079392f8d151b89e09469bef98e59139c460a53805a93245148cbb9a6a010dadc87e9b1a0e0a89e87e433ff1c0ad4b125760858c8badff4d82cbd31cf88f3e2e16a4e960e1e0b5825fc0f2b21d660cf60069d43fb6a8a96c44fa922164f02c9cd5ebb6fad848871224d157777b5a70dc6deb988506bd03aa4ce2200e9ce23641221784250c22d2c8635a3512f45d433cf66e158eb261f48a23d54f5ef4358df3487da471eb5775bdba565ee170be126b2300d0dad050212606f2d77a63fa2ab430e62670e852b89944e611509415bee36bf0961c8918bd8b0eb8af45b1a9d0420c7101a9c5f4a63efb9cc8de7897b5e2b02cb5885ad8d0d8ac7754ba8d4e9d37175e614e3f3a6a7b122bbc6dd9ce78f1b9a4e940a1160bb85650d8932fe1a82d0525630ba017be5129625a45c3cae66c7cdaa33ee704791db81ef2e11a2f528974fa388cd929c934dbdb21425e6117839ab33b2926b036457db3a43083c3ec17231aed4ee5b607a45a5735c9470c03a424b43efcea953c078717344aeb1449c0dfa3a3ec224b542c16cf735466bdaf26b522aef1db547b14f07ebd4f5da34426a46007757be47ed3f643c47f2c4467762cd049d6f4cf8a78d04f8318bdedcee80871e91c0330499d88254555c456d9bde8a892394267eac15c230cf7e7ba19ebc01b1905c80476de3cea8258f6d0820d159f4aa8a37fb378b2685da4e0e89d253187219869f1157bbe4a8a43eabf65e86a6d9b21e25d91c43c3036914427833ed87073886719069148e2e47219bb5da5d9664d64dc5c4ff71c0e808dadbb53a23e41e3c02fd0c9e0704490f3283d1864d15d795882e6522f31445556cab6832f273dac0c7aef4e3f8c09a34d1624fdb087d852f2e827fb2c3105f1afda54b9dc12cfde3cf7747daa5ac70904e82636a13155303f9a1198d6e7f9dc7be394ebc5db9e8380e290e6cae5f320caa56aa94490789fce2e2540b3de8865396f58e14d61d3cb122f7bd1af5a27c6fe733eba3cc39106efc906ea967fb833e2480aa80bd56ccd9e5c25304e2b8135f1453af70059e599cb67bc8eaaa38c39768e74d3da8aba0135f0192d7ddf0149ce62f353b0360251f1f88b272c6e85b4ee4e0563a6de80de83749af6e6aa4d80cab7031aff3f7e8d0c9114940549f828a62be9fd6a16db001369728b4b93d4ecf91563ae03def3ca4e9900a97657c4ff1e41c5742fb3329ba882ed61645aedb22f2543b83cd4007e5d228697a48064acc32ece41f2d5ead3f31a9689249e8b4bb57ac0b136b6c60ec531708235b94db823344aafbb9b79e21959635664b2193c3add0b28767906b7ba4118e6548e9a23b49e9181dc6f7dc7857425c9ab1b1451bc4572fd060190d0b5a76b8368b68e72a212bd0f89d0778d293b1d32f155f30c9aafe7215d2e746ea8f2c73a30bcd8c093a489519b60616b15afe69074ee77fb65caf5faf0aad49106057a91fdcd622a07ac21eb5c221f2e65323228af41b3eb894517c34c4f60ba20fb6f6c4309a7357884c0eeeb0a4874550107f2d0ffdc412f86bdf712f96183b3932cfb4da3f179cde1a288df9af09c243fae8c67b0d208d9cdb7adde8d5e548e0624b19da4818ef656b88280a", 0x1000}, 0xfffffc41) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, 0x0, 0x0) ioctl$BLKGETSIZE64(r0, 0x80081272, &(0x7f0000000080)) r3 = getpgrp(0xffffffffffffffff) ioprio_get$pid(0x0, r3) fallocate(0xffffffffffffffff, 0x800000011, 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f0000000040)={'syzkaller0\x00', 0x5}) openat$cgroup(r2, 0x0, 0x200002, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f00000000c0)={0x80, 0x2, 0x9, 0xfff}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000100)={0x11, 0x200, 0x9, "884cdc9cf806bec8d9fee3e54df3a0cbf0"}) fadvise64(r2, 0x4004, 0x0, 0x4) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, 0x0) 23:31:30 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000002) 23:31:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$IMADDTIMER(0xffffffffffffffff, 0x80044940, &(0x7f0000000180)=0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x0, 0x1}, 0x20) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @mcast2, 0x1}, 0x1c) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 23:31:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="480000001400199009004b0101048c01010000ebbd2e2ab96a490000632379eb000000000000551f5f0028213ee20607000000000000003f666674a8ffff00c7e5ed5e00000000c8", 0x48}], 0x1) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400000, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000040)) 23:31:30 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x41680100, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:30 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000002) 23:31:30 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) close(0xffffffffffffffff) recvmmsg(r0, &(0x7f0000008d80)=[{{&(0x7f0000004b80)=@nl, 0xfe64, &(0x7f00000003c0)=[{&(0x7f00000002c0)=""/212, 0xac014d68bf4f0daa}], 0x0, &(0x7f0000006140)=""/105, 0x69}}], 0x8000000000003bf, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) ioctl$SG_GET_VERSION_NUM(r1, 0x2282, &(0x7f0000000000)) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f0000000080)={0x889, 0xf848, 0x4, {0xf, @pix={0x274dcf43, 0x6, 0x4b77357b, 0x0, 0x6, 0x1ff, 0x4, 0x3, 0x0, 0x8, 0x1, 0x7}}}) 23:31:31 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000002) 23:31:31 executing program 3: perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x2000, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) connect$bt_l2cap(r0, &(0x7f0000000240)={0x1f, 0x0, {0x0, 0x0, 0x5, 0x0, 0x6}}, 0xe) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) 23:31:31 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x42680100, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:31 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000002) 23:31:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x7cc, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r1) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000), 0x4) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000340)='./file0\x00') r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001440)={0x8, "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", 0x1000}, 0xfffffc41) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, 0x0, 0x0) ioctl$BLKGETSIZE64(r0, 0x80081272, &(0x7f0000000080)) r3 = getpgrp(0xffffffffffffffff) ioprio_get$pid(0x0, r3) fallocate(0xffffffffffffffff, 0x800000011, 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f0000000040)={'syzkaller0\x00', 0x5}) openat$cgroup(r2, 0x0, 0x200002, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f00000000c0)={0x80, 0x2, 0x9, 0xfff}, 0x10) connect(0xffffffffffffffff, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000100)={0x11, 0x200, 0x9, "884cdc9cf806bec8d9fee3e54df3a0cbf0"}) fadvise64(r2, 0x4004, 0x0, 0x4) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, 0x0) 23:31:31 executing program 5: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x41680100, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:31 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x4, 0x0) fallocate(r0, 0x0, 0x2, 0x400) 23:31:31 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000002) 23:31:31 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000000100)=0x6) r2 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r2, 0x10d, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) 23:31:31 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000002) 23:31:31 executing program 5: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x41680100, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:32 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x43680100, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:32 executing program 3: bind$alg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x4603000000000000]}}}}, 0x108) ioctl$EVIOCGPHYS(r1, 0x80404507, &(0x7f0000000140)=""/143) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r3, &(0x7f0000000100), 0x135, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x84, 0xa, &(0x7f0000000000), 0x0) 23:31:32 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:32 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000002) 23:31:32 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x20000000000000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0xa, 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], 0x0, 0x4, 0x2, 0x2}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'bridge_slave_1\x00'}, 0x18) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) socket$xdp(0x2c, 0x3, 0x0) tee(r1, r1, 0x8, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x8000000048083, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x6, 0x0, 0x9, 0x0, 0x0, 0xffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000300)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000200), r4, 0x0, 0x2, 0x4}}, 0x20) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x10000000002) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) 23:31:32 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000002) 23:31:32 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x46000000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:32 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) mlockall(0x2) ioctl$sock_proto_private(r0, 0x89e2, &(0x7f0000000000)="ca65c90d6db2541125") 23:31:32 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) prlimit64(0x0, 0x9, &(0x7f0000000300), 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x40, 0x80) ioctl$UFFDIO_WAKE(r2, 0x8010aa02, &(0x7f0000000080)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 23:31:32 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\xff', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:33 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffff9) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000001c0)={&(0x7f00006ff000/0x1000)=nil, &(0x7f00006ff000/0x4000)=nil, &(0x7f0000702000/0x3000)=nil, &(0x7f00006fd000/0x2000)=nil, &(0x7f0000702000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000003000/0x1000)=nil, &(0x7f00006fd000/0x3000)=nil, &(0x7f00006fe000/0x3000)=nil, &(0x7f0000704000/0x4000)=nil, &(0x7f0000700000/0x4000)=nil, &(0x7f0000000100)="3342d31f8871898e39696d50145e588c35314b2a57a5577093b1c774c8c3cbce182209456a149aa8bb6d0cee445c8fb5e4fc7d7a73b95802064b5326147fa630b8e8e223fa01ca3bf34fad79c858c12f6dcb8006fedc896f461dd301b805bf1cdef4ca0285c6d4548913a1a21a8651101fa355a96802629f1fb234776584d4cad2976eab28c4528e2ba0463f9bea727a509fab6c47d27513a17472705f1048ce3a209877f037cdd599d3", 0xaa, r0}, 0x68) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='-)wlan0\x00') r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x101000, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f0000000080)={0x1, 0x6}) mmap(&(0x7f00006fc000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x100, 0x2) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000240)) 23:31:33 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x84040, 0x0) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000180)=0x56cf1f12, &(0x7f00000002c0)=0x2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000000)={0x0, 0x0, 0x3007, 0x0, 0x0, {0xfffffffffffffc01, 0x80}}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102], 0x1f004}) ioctl$KVM_RUN(r4, 0xae80, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x400, 0x0) 23:31:33 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000002) 23:31:33 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x2, 0x101000) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000140)=""/50) mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r3 = open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, &(0x7f0000000440)=""/4096, &(0x7f0000000180)=0x1000) fchdir(r3) r4 = memfd_create(&(0x7f00000001c0)='\xb3', 0x0) write(r1, &(0x7f0000000200)="d375d3a2ab7189305d26015d02f6", 0xe) write$FUSE_DIRENT(r4, &(0x7f0000000080)=ANY=[], 0x29) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x81, 0x11, r4, 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pread64(r5, 0x0, 0x0, 0x0) 23:31:33 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000002) 23:31:33 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xfffffffffffffffe, 0x800) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) futimesat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={{r1, r2/1000+10000}, {0x77359400}}) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r3, 0xfffffffffffffffc, 0x4) 23:31:33 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:33 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x48000000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 637.903298][T13190] IPVS: length: 4096 != 8 23:31:33 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000002) 23:31:33 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x1, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0xffffffb5}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153}, 0x3e) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x800) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000080)={0x0, @ctrl={0x0, 0x0, @value64}}) 23:31:33 executing program 3: r0 = socket$kcm(0x10, 0x5, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="2e0000001e000507edcc0345f675c3931f32e55c84131e210080647e6394f20531d2000500fc3711404b480f0001", 0x2e}], 0x1}, 0x0) 23:31:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000040)='./file0\x00', 0x408040, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f00000000c0)={{0x100, 0x7}, {0x9, 0x6}, 0xfffffffffffffffa, 0x4, 0xffffffffffffffe0}) r2 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_S_FMT(r2, 0xc0d05605, &(0x7f00000001c0)={0x9, @vbi={0x0, 0x0, 0x34343459}}) connect$caif(r1, &(0x7f0000000000)=@rfm={0x25, 0x4, "f1391a3095f05860b894d4c044c409bd"}, 0x18) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") ioctl$DRM_IOCTL_GET_STATS(r1, 0x80f86406, &(0x7f0000000180)=""/222) shmget$private(0x0, 0x1000, 0x54000400, &(0x7f0000ffc000/0x1000)=nil) socket$inet(0x2, 0x803, 0x1) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f00000002c0)) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x0, 0x0) 23:31:34 executing program 0: r0 = socket$kcm(0x10, 0x5, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/4\x00') setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000040)=0x1000, 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0000002b008163e45ae08700000000080f0000000000bc4cc91b4dd66d1c958c00"/46, 0x2e}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000015680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 23:31:34 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\xf0', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:34 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000002) 23:31:34 executing program 5: r0 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x2, 0x3}}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r0, r1, 0x80000) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") bind$tipc(r0, &(0x7f0000000100)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}}}, 0x10) setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f00000000c0)=0x1ec, 0x4) sendmsg$tipc(r0, &(0x7f0000000700)={&(0x7f0000000040)=@id={0x1e, 0x3, 0x0, {0x4e20, 0x2}}, 0x10, 0x0}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r3, 0x11, 0x1, &(0x7f0000000140)=""/32, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000240)=@assoc_value={0x0}, &(0x7f0000000280)=0x78) timer_create(0x0, &(0x7f00000002c0)={0x0, 0x2c, 0x4}, &(0x7f0000000300)=0x0) timer_delete(r5) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000200)={0x28c3aeb3, 0x0, 0xffffffff, 0x4, 0x3, 0x0, 0x5, 0x6, 0x1, 0xffff, 0x4, 0x2}) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000180)={r4, 0x8000}, 0x8) 23:31:34 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x4c000000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:34 executing program 3: futex(0x0, 0x80000c00000084, 0x800000000, 0x0, 0x0, 0x0) io_setup(0xad8, &(0x7f0000000000)=0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x3a1102, 0x0) io_cancel(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x8, 0x5, r1, &(0x7f0000000040)="31d9f73ae60df8548aadb4007c257a2a6956e816df14e56bdec79b458253f7bfe1b16425245cfbc0122218bd338bfae8bbe038db41765bba4d3fafb1b7a551f7be6b607c26789794240582727d753a14e045ea092203eecd3f76f6d6830ccf740d95ae697529fad331b289e24ff73356138b3164799d5c8ff55ea8566d69b63be00af5a9d0e35c12165106ee191f26e6f64293693b3bff60aba4bdc2831a36decf26bd55ac02efe88b5d4015d052e39a030d7816bb938faf26214a32ef8bd4cbca0d170ffb97751e340c1de761e6df900e7ac6b11eb5c896482d1b8467bed73a8426458881bb118212d60fde91e3a16ad516c6", 0xf3, 0x1, 0x0, 0x0, r2}, &(0x7f00000001c0)) 23:31:34 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x10000, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x5) ioctl$TIOCSSOFTCAR(r0, 0x8910, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80000, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100), &(0x7f0000000140)=0x14) 23:31:34 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000002) 23:31:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") readlink(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)=""/4, 0x4) mkdir(&(0x7f0000000500)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) llistxattr(&(0x7f0000008800)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0) 23:31:34 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x440, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$KDGETMODE(r0, 0x800454d2, 0x0) 23:31:34 executing program 5: keyctl$join(0x1e, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x1) syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x800) munlockall() socket$inet6_sctp(0xa, 0x1, 0x84) 23:31:34 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000002) 23:31:34 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\b', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:34 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x61010000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:34 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@rand_addr="a685c08f8926636293ed0a6b481f2124", @in6=@remote, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x2}}, {{@in6=@empty, 0x0, 0x33}}}, 0xe8) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000000)='lazytime\x00', 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000080)=ANY=[@ANYBLOB="7525820aedb800001400000018004500001c00007cc5fa0f0000001190785f9c53c685b31fa1f25700000000e00000010000a721087f78c464cdedccf90aa3def91f38254e4c0d1f2204882914305dade356c6c3e71403c55257b9abb001375ee3db7343c569edc047fb4a2b951ce302c4f7bc1a5475ec3b1e6d1b46de76e5237b2e8bba02bbadbf9829b030bdc5"], 0x0) 23:31:35 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00'}, 0x45c) r1 = dup3(r0, r0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x4}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000005c0)=@assoc_value={r2, 0x6}, &(0x7f0000000600)=0x8) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = fcntl$getown(r3, 0x9) migrate_pages(r4, 0x4, &(0x7f0000000080), &(0x7f0000000100)=0xb3) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x0) write$uinput_user_dev(r0, &(0x7f0000000140)={'syz0\x00', {0x80, 0x5d7, 0x7, 0xe7f}, 0x2a, [0x6, 0x5, 0x7d2, 0xbcae, 0xc5, 0xfffffffffffffffc, 0x3, 0xb5f5, 0x6, 0x0, 0x7fff, 0x6, 0x0, 0x10001, 0x9, 0x2, 0x400, 0xfffffffffffffffe, 0x40, 0x1, 0xf4, 0x1, 0x100, 0x2ebf, 0x7f, 0x4, 0x4, 0x8, 0x7eb7, 0x80000000000, 0x9, 0x78, 0x7000000000000000, 0x100, 0x8ee4, 0x7, 0x9, 0x3, 0xfff, 0x7fffffff, 0xc0de, 0x4, 0x8, 0x7, 0x9, 0x292, 0x4, 0x6, 0x7, 0x7ff, 0x8, 0x7, 0x100000000, 0xa1, 0x6, 0x6, 0xfffffffffffffff7, 0x8000, 0x6, 0x55, 0x8, 0x8, 0x2, 0x2], [0x4, 0x9, 0x7, 0x7f, 0xae, 0x2, 0x2d, 0xe0f9, 0x8, 0x8, 0x1ff, 0x7, 0x0, 0x1, 0xfffffffffffffff7, 0x7fff, 0x7, 0xf348, 0xfffffffffffffffe, 0xb08e, 0x2, 0x8, 0x1000, 0x2, 0xa9, 0x3, 0x5, 0x8001, 0x9, 0x4, 0x2, 0xfa6, 0x7fffffff, 0x7f, 0xffffffff, 0x8670, 0x7, 0xffffffffffffff9e, 0x59, 0x2, 0x1, 0x800, 0x6, 0xffffffff, 0x2, 0x1, 0x800, 0xffffffffffffff03, 0x0, 0x7, 0x3d, 0x4, 0x5, 0x20, 0x800, 0x1, 0x4, 0xfffffffffffffa5a, 0x2, 0x7, 0x1, 0x6, 0x4, 0x40], [0x20, 0x3, 0x6, 0xdbb, 0x6, 0x3, 0x7, 0x0, 0x0, 0x0, 0x4, 0x4, 0x1000, 0x80, 0x1000, 0x2, 0x1ff, 0x9, 0x200, 0x7, 0x0, 0xfbf, 0x8, 0x0, 0xd1, 0x800, 0x9, 0xe4db, 0x6, 0x8e3, 0x5, 0x1c, 0x3, 0x8, 0x9, 0xfffffffffffffff9, 0x2e5, 0x7, 0x88f, 0x4, 0x5, 0xff, 0x6233, 0x401, 0x401, 0x8, 0x15c8, 0x0, 0x200, 0x9, 0xffff, 0xffffffff, 0xb220, 0x5, 0x1000, 0x1, 0x5, 0x6, 0xffff, 0x10000, 0x6, 0x4, 0x1, 0xf4], [0x81, 0x8, 0xffffffff80000000, 0x4, 0x3, 0x5, 0x5, 0x43, 0x44f, 0xff, 0x4769, 0x6, 0x7, 0x4a, 0x3, 0x100000001, 0x0, 0x1f, 0x0, 0x4, 0x8, 0x1, 0x9, 0x7, 0x8, 0x2, 0x1000, 0x89d, 0x80000001, 0x40, 0x6, 0x7fff, 0x4, 0x7, 0x4, 0xffffffffffffffff, 0x2, 0x5, 0x401, 0x8, 0x7, 0x10001, 0x7, 0x100000000000000, 0x2, 0x8, 0x5, 0x1, 0x10000, 0xfff, 0x40, 0x39, 0x7, 0x3, 0x2, 0x2, 0x1, 0x11b, 0x2, 0x42b, 0x3, 0x0, 0x7f, 0x100000000]}, 0x45c) 23:31:35 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000002) 23:31:35 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0x1, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r0, 0x1000, 0x10}, 0xc) r1 = socket(0x848000000015, 0x805, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) 23:31:35 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffeaf, 0x0, 0x0, 0xffffffae) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000000)={0x0, 0x102000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r4, 0x6430) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:31:35 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) io_setup(0x0, &(0x7f0000000000)=0x0) r3 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x6, 0x80080) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ubi_ctrl\x00', 0x400000, 0x0) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm_plock\x00', 0x80000, 0x0) r6 = syz_open_dev$swradio(&(0x7f0000000940)='/dev/swradio#\x00', 0x0, 0x2) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ubi_ctrl\x00', 0x8000, 0x0) io_submit(r2, 0x9, &(0x7f0000000b00)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x7, 0x7, r1, &(0x7f0000000040)="af906056234632bd16a95b2c6292d4fcd7d89d27a1bd9cbe8dacea684becbe4e347c9e4c98e0477598058954b407666001f6ac0e05a8bdc63cfdba16c3d2ffe54ba6ed026143f2a77d942bfe45bde20f3155c9ad05eea638f982563f9faf032485a58a7d79532d566a1655de7dbde56780b236f0749ac6819af353066594ebe3ca51e83434eefda90afc2fe1e3dbe2a10dc45c7caa8760d38ee2c96e59514f00e369c64f0ef9420000a8ef2243fdac13784163cbde4e1dec856ee62aefa713fa1838", 0xc2, 0xffff, 0x0, 0x3, r3}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2, 0x2, r0, &(0x7f00000001c0)="ccb3f56fa5f33d86d7d2588c3af1a9afdb1351410f0f0bdf32ed11c3860b0f3bb7da78481225f068bea27ceed2bc0c711a8b4a299278136480ea9e8eea3fc4c8656081fdfe77ecab93d3a81c355ad1d985ccb675ce25ee5413fb142f3b42b740a8a96b2c45fee6a46a047f4c435bde1f3044c2b0cd1e0324c2c8cda345bb2a15d136ad06b67387ba42cd7f29b6a4ebb69254bb82a8f2da4d8a0a2a060e163bbc8b4a563ca70ff2ff98ff5a707a9a1cf232a3514c95815309c87cbc1f3f7ad2", 0xbf, 0xf1e, 0x0, 0x2, r4}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x6, 0x6, r0, &(0x7f0000000300)="18f5137a3515642b28d911c9a280ec54ff8e47eda9fcbd46f43b5ff84877fb06d3d890ee3bd4c30898d775a2c71dfe9b3602e399bd799e2c20ffe5afe7e5c655380e958c258c2059e8c7b2256c53167be51fa2148e5111c2bd73cb9d7d306903d0bf9699aa699386d009bb18ee09fb7e6d9ef9bd9d6e41c7cc65178b705bc73b6c6c5f8d19bda39dd293b3e70466d008ff8f7278bbfc4ec631e2df1857b6f7ce6c646e69dd91d1ac30198f040a5e92708345e6fde91fc0cb2133311c05edac3e62c12a65b8174a4521eed90efb8763784cb8809ab66f93c4fe9f2d5caa4d47fc51573a3bba4c8b1ebb5ccf", 0xeb, 0x913d, 0x0, 0x0, r5}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x2, r0, &(0x7f0000000480)="10234011940d0bb4f46ab04449d0aa15a8c137de86b54e8caef92ce0c155e1d1d2ee3c7cb22adcd522b6405f61661451008542e884560fa7f8a9ff1d21b07e3d0a2584ba1a9b6fae78c2e96123c3d69851fbfb0f83d64d745f8e91093baf26d9fc2777519bf9c73419d7babdf0ee1291374475409a540756c03a4b6e187d7c7b6b6c4caab461599fc222bc41495112b463e17a9fcbb5049eec89724142f7ffdc82ce5d7b703b1b5854cc70bf136d81bdd3a97df369e8578d02f68aba63b330e719bacb135f755c31914fa331cea492b6663e2174131141fb0c7cda920aac1f753d607c", 0xe3, 0x9, 0x0, 0x1}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x6, 0xffffffff, r1, &(0x7f00000005c0)="0b1eb2eede59b802a68b3a5845cf51ee09915dc75cd510bc406b0487a6d0e69c549696652c68b189b4", 0x29, 0x7ff, 0x0, 0x3}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0xe, 0x1ff, r0, &(0x7f0000000640)="732089afe3f3ad3851f8ae3d61b20bc3414db84203be3646bdd78a97dc14401514d0ea7fea736f6afb37d655f3f3d1ab4eb1e2a1609939b63da600a1a7271208a1f88da5927c137f0b1638372668f32742b4f23d5d3e80a11c1cf37511018d9987ec61e44c79f634465ec7ee2cb2673f5b41eb44c0ce00e3fd5ebdc626cf13bd00d65d69e5f3294436f720ac315d170b72638ce8a6f5f05952c273a9ff6f1b8952cf3129457252052258eae0111dac187df5b77d34449374b2d339686edfdd5497700347c77a13674056b467564add611345a4803e0b32e4501e2e98a5eed0a0e6b53ca870f7753667b85ced77a809a069f2e10aa00feaf0", 0xf8, 0x4, 0x0, 0x0, 0xffffffffffffff9c}, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x1, 0x6c3e1225, r1, &(0x7f0000000780)="311dbcefa8a2a3023cf70d0bc7b385792c3ff7524be440eab84becbee61304504c9caac64891213b9637bc0844d131919967f7704032603dc4225125651d2e25b3a741022b8b41f5775cfbfd0145223ec47513aab3df30ad252e2538db8ac0fe3dfddd14ae100c011bb8dc3e439e84d0828599c725c11d49ccd644a34b7f2a4d8112ca3f92ec66f23969fe44117beced03579daa94dce3c503b6a0fe4b9e57b04aa16461cba6d29217fe4d93da7fc2fbe921668c", 0xb4, 0x8}, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x7, 0x101, r1, &(0x7f0000000880)="927f063e602bb13945c5640e0062ca956b71106e8ed74633b2923ddf971b05f36bf7bcd07dcdcf5392cba21e2f839558d32926e5e5e263af5fd3e0cfe5d8f49d22449579884056d38d723730640f2ec8e5eb1aab186efe400750b89361d550538cc6d35465d2d26d7ec712973d96184ceaf700db144228fa38151ed83db7d5969bef3a7d83f032d80f07c14392db80c83449f071b7ba450243654df05aaa7e28704d7ea947e2570fabadea914f6671e21ed37e63671eeb", 0xb7, 0xfffffffffffff510, 0x0, 0x3, r6}, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0xe, 0xffff, r1, &(0x7f00000009c0)="971b5b951105998143b0b5d236c1ad40a9f0666fd0f42804b46c305cc7cd6bcc6957e668e29cd691b9e023f473a72c1d60ac82d95900d4d4b0a8614eb7dd328b1007bd7732c779b758515eaabbd44e993a38ff6b6ea4b6363e33701f398e33ca5cd2e790673c9a49b9f93d34f315895932a95429e598b7d9fcc15e131de6a1b89ec05b218263745b75e810f0228643dff06276b7", 0x94, 0x81, 0x0, 0x2, r7}]) dup2(r0, r1) 23:31:35 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000002) 23:31:35 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:35 executing program 3: clock_adjtime(0x0, &(0x7f0000000000)={0x20000000000027ff, 0x0, 0x3f00, 0x0, 0x7, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x42200, 0x0) write$uinput_user_dev(r0, &(0x7f0000000140)={'syz1\x00', {0x1f, 0x1ff, 0x0, 0x5}, 0x16, [0x6, 0x6, 0x401, 0x4, 0xaa8, 0x7, 0x7fffffff, 0x6, 0x9, 0x8001, 0xb6, 0xffff, 0x6000000000000000, 0x0, 0x100, 0x3, 0x1, 0x3d, 0x2, 0x4, 0x0, 0x200, 0x6a6, 0x40, 0xcb, 0xb6b4, 0x8, 0x29, 0x101, 0x1, 0x7, 0x6, 0x3f, 0x80000000, 0x7fffffff, 0x10001, 0x7fffffff, 0x2, 0x100000001, 0xfffffffffffffffe, 0x81, 0x5, 0x20, 0xb3, 0x4, 0x1, 0x6, 0x10001, 0x3b, 0x100, 0x0, 0x40, 0x7, 0x4, 0x0, 0x20, 0x40000, 0x7, 0x8001, 0x7b01, 0xdc6e, 0x6eb, 0x1, 0x2], [0x80000001, 0x62ed, 0x0, 0xd7f, 0x8000, 0x8, 0xd896, 0x7f, 0x4, 0x1, 0x3df, 0xc0000000000000, 0x40000000, 0x4, 0xb92, 0x800, 0x4679df52, 0x8, 0x7, 0xd7, 0x7ff, 0x68, 0x7fff, 0x1f, 0x3f, 0x6ec, 0x1, 0x7, 0x2, 0xbc, 0x7, 0xfff, 0x6, 0x3ff, 0xffffffff, 0xff, 0x81, 0x1, 0x3791304a, 0x720a, 0x18, 0x100000000, 0x7c, 0x8, 0x7, 0x2, 0xfffffffffffffffe, 0x2, 0x4, 0x5, 0x100, 0x6, 0x10001, 0x4, 0x7fffffff, 0x1dd, 0x0, 0x9, 0x80000001, 0xff, 0x9, 0x7fff, 0x4, 0x6], [0x5, 0x6, 0x5517, 0x7fffffff, 0x8000, 0x3ff, 0x9, 0x3, 0x100, 0x80, 0x2, 0x6, 0x100000001, 0x1, 0xd8c9, 0x7, 0x6, 0x7, 0x6, 0x6, 0xfffffffffffffffb, 0xfffffffffffffe01, 0x2, 0x6fb9, 0x1, 0x20, 0x9, 0x8, 0x3ff, 0x5, 0x4, 0x1f, 0x2, 0x3, 0x8, 0xfffffffffffffffe, 0x9, 0x5, 0x20, 0x3, 0x3, 0x0, 0x7, 0x9, 0x1ff, 0x9, 0x7fff, 0x4, 0x9, 0x8, 0x2, 0x8000, 0x249ba9d2, 0x7, 0x7, 0x6b, 0x9, 0xd2680000000000, 0x101, 0xfffffffff406ef2e, 0x1, 0x8, 0x80, 0x9ac9], [0x401, 0x1, 0x400, 0x4, 0xdb, 0x2, 0x1, 0x8, 0x1f, 0x10000, 0xa27, 0x4, 0xffffffffffff1754, 0x8, 0x0, 0x4, 0x4, 0x4, 0xff, 0x4, 0x1c000, 0x85, 0x7fff, 0x9, 0x7, 0x0, 0x5, 0x81, 0x81, 0xfffffffffffffffc, 0x1, 0x9251, 0x0, 0x40, 0x200, 0x7ff, 0x80000000, 0x7, 0x9, 0xfffffffffffff801, 0xfffffffffffffffc, 0x4, 0x7, 0x4, 0xffff, 0x10001, 0x1ff, 0x3, 0x2, 0x7, 0x1, 0x8, 0x3d029f2a, 0x90c3, 0xffff, 0x1, 0x5, 0x1ff, 0x2, 0x9, 0x2, 0x6, 0xe57, 0x1000]}, 0x45c) 23:31:35 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x0) 23:31:35 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x68000000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:35 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x7) getsockopt$netlink(r0, 0x10e, 0x1, 0x0, 0x0) 23:31:35 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x400100) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000200), 0x4) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x40, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f00000000c0)={0x1, 0x3, 0x9, 0x0, 0x3f8, 0x1, 0x100, 0x3c, 0x55d5, 0x1, 0x10001, 0x8, 0x0, 0x9, 0x1, 0x3, 0x7, 0x8, 0x8}) r2 = syz_init_net_socket$ax25(0x3, 0x3, 0x200000000000) getpeername(r2, 0x0, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$VIDIOC_G_TUNER(r3, 0xc054561d, &(0x7f0000000180)={0x8, "0caf6c9750a6cc0f1b99611abfd32e5978e6ea886688172461833b59fc29dc87", 0x4, 0x1029, 0xfb, 0x4, 0x1, 0x1, 0x316f, 0x200}) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000040)={0x32, @remote, 0x4e24, 0x3, 'lblcr\x00', 0x39, 0x3, 0x26}, 0x2c) 23:31:36 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f0000000000)={0x9, 0x5, 0x9}) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000180)=""/214, &(0x7f0000000280)=0xd6) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000080)={0xeaa, 0xea8, 0x2, 0x20}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f00000000c0)=[@in={0x2, 0x4e22, @local}, @in6={0xa, 0x4e23, 0x401, @rand_addr="a8e9d2cfd4d53f8ffdf29ee160ab83ba", 0x7f7}, @in={0x2, 0x4e24, @broadcast}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x25}}, @in={0x2, 0x4e20, @multicast2}, @in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x28}, 0x9}, @in={0x2, 0x4e21, @multicast2}, @in={0x2, 0x1ff, @multicast2}, @in={0x2, 0x4e20, @multicast2}], 0xa8) 23:31:36 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x0) 23:31:36 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:36 executing program 0: r0 = creat(&(0x7f0000000040)='./file1\x00', 0x0) getsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f0000000100), &(0x7f0000000140)=0x4) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x80002) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r0}) ioctl$NBD_SET_TIMEOUT(r1, 0xab09, 0xb6) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0x195, 0x10001, 0x1ff, 0x401, 0x11, 0x4, 0xfffffffffffff90e, 0x6, 0x80000001, 0x9}) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000080)={0x3, 0x8, 0x4080000000000, 0x3, 0xa0a, 0x1}) 23:31:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x3c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r1, 0x58, 0x0}, 0x358022876ab810dc) 23:31:36 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x68030000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:36 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x0) 23:31:36 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80) recvmmsg(r0, &(0x7f0000001c00), 0x40001fe, 0x10000, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000001600)='/dev/mixer\x00', 0xa1c0, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000001640)={{0x2, 0x4e23, @remote}, {0x1, @remote}, 0x24, {0x2, 0x4e21, @empty}, 'lo\x00'}) r2 = dup3(r0, r0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r2, 0x5411, &(0x7f00000000c0)) [ 641.031777][T13395] EXT4-fs warning (device sda1): verify_group_input:104: Cannot add at group 3 (only 16 groups) 23:31:36 executing program 1 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000002) 23:31:36 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 641.089731][T13400] EXT4-fs warning (device sda1): verify_group_input:104: Cannot add at group 3 (only 16 groups) 23:31:36 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000001e40)={0x14, 0x69, 0x109}, 0x14}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e24, @remote}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v1={0x1000000, [{0x2000000000000000, 0x8}]}, 0xc, 0x1) 23:31:36 executing program 5: write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000000)={0xfffffffffffffeed, 0x47, 0x1}, 0x7) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x17f) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_MODULATOR(r3, 0xc0445636, &(0x7f00000001c0)={0x2, "911e054bd268ae86664a4ed2c90e1c6c80577388a964fc87f1a4ad7289439dac", 0x100c, 0x8, 0x8, 0x4, 0x7}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r3, 0xc4c85513, &(0x7f0000000380)={{0x9, 0x7, 0x1, 0x1}, 0x0, [0x0, 0x8, 0x7ff, 0x3, 0xffffffffffffffff, 0x1, 0x401, 0x8c, 0x7, 0x55, 0xdc1d, 0x7, 0x1, 0x4, 0xfffffffffffffef1, 0x5, 0x8, 0xac, 0x0, 0x8, 0xb5cf, 0x9b, 0x8b2, 0x6, 0x1, 0x3, 0x6, 0x8, 0x20, 0x7, 0x1, 0x40000000, 0x4386, 0x7, 0x9, 0x1, 0x2, 0x10000, 0xbcf, 0x2b0, 0x3, 0x9, 0x1f, 0x7, 0x6, 0x20, 0x2, 0x1ff, 0x9, 0x401, 0x22, 0x3, 0x100000000, 0xf142, 0x9, 0x5, 0x2, 0x0, 0x1, 0x2, 0x9, 0x200020000000000, 0x80, 0x80000000, 0x6, 0x304, 0x0, 0x2, 0x613, 0x9, 0x0, 0x3, 0x7, 0xffff, 0xffffffffffffffce, 0x7, 0x5, 0x8001, 0x2b4, 0x275d5194, 0x1, 0x7, 0x1f, 0x1, 0x1, 0x955, 0x8, 0xffffffff000, 0x6, 0x3f, 0x40, 0x7fc, 0x0, 0x0, 0x80, 0x5525, 0x9, 0x9, 0x6, 0x10000, 0x6, 0x4, 0x40, 0x1, 0x3, 0x4, 0xffffffffffffffff, 0x83, 0x3dedb359, 0x80000000, 0x3, 0x80000000, 0x7, 0x6, 0x6, 0x7f, 0x9, 0x1ff, 0x100, 0x61, 0x8, 0x8000, 0x54, 0x9, 0x989, 0xfff, 0x2], {0x0, 0x989680}}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x2008000040000408, 0xfffffffffffffffd, 0x0, 0x0, 0x4c9]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) bind$netrom(r1, &(0x7f0000000100)={{0x3, @default, 0x8}, [@null, @default, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mmap$IORING_OFF_SQ_RING(&(0x7f000000d000/0x2000)=nil, 0x2000, 0x2000000, 0x110, r3, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 641.235869][T13404] FAULT_INJECTION: forcing a failure. [ 641.235869][T13404] name failslab, interval 1, probability 0, space 0, times 0 [ 641.289823][T13404] CPU: 0 PID: 13404 Comm: syz-executor.1 Not tainted 5.2.0-rc6-next-20190628 #25 [ 641.299004][T13404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 641.299014][T13404] Call Trace: [ 641.299050][T13404] dump_stack+0x172/0x1f0 [ 641.299073][T13404] should_fail.cold+0xa/0x15 [ 641.299093][T13404] ? fault_create_debugfs_attr+0x180/0x180 [ 641.299119][T13404] ? ___might_sleep+0x163/0x280 [ 641.299145][T13404] __should_failslab+0x121/0x190 [ 641.299166][T13404] should_failslab+0x9/0x14 [ 641.299193][T13404] __kmalloc+0x2e0/0x770 [ 641.332260][T13404] ? tomoyo_realpath_from_path+0xc0/0x7a0 [ 641.332281][T13404] ? rcu_read_lock_sched_held+0x110/0x130 [ 641.332295][T13404] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 641.332315][T13404] tomoyo_realpath_from_path+0xcd/0x7a0 [ 641.332329][T13404] ? tomoyo_path_number_perm+0x193/0x520 [ 641.332352][T13404] tomoyo_path_number_perm+0x1dd/0x520 [ 641.332364][T13404] ? tomoyo_path_number_perm+0x193/0x520 23:31:37 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x6c000000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 641.332381][T13404] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 641.332394][T13404] ? __f_unlock_pos+0x19/0x20 [ 641.332441][T13404] ? __fget+0x384/0x560 [ 641.332471][T13404] ? ksys_dup3+0x3e0/0x3e0 [ 641.363437][T13404] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 641.374660][T13404] ? fput_many+0x12c/0x1a0 [ 641.374684][T13404] tomoyo_file_ioctl+0x23/0x30 [ 641.374700][T13404] security_file_ioctl+0x77/0xc0 [ 641.374717][T13404] ksys_ioctl+0x57/0xd0 [ 641.374732][T13404] __x64_sys_ioctl+0x73/0xb0 [ 641.374750][T13404] do_syscall_64+0xfd/0x6a0 [ 641.374773][T13404] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 641.374794][T13404] RIP: 0033:0x459519 [ 641.416081][T13404] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 641.416092][T13404] RSP: 002b:00007f0dd64fcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 641.416108][T13404] RAX: ffffffffffffffda RBX: 00007f0dd64fcc90 RCX: 0000000000459519 [ 641.416117][T13404] RDX: 0000000020000002 RSI: 00000000c0185879 RDI: 0000000000000004 [ 641.416126][T13404] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 641.416136][T13404] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0dd64fd6d4 [ 641.416144][T13404] R13: 00000000004ccc68 R14: 00000000004d6188 R15: 0000000000000005 23:31:37 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x100000000, 0x0) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000080)={0x7ff, 0x0, "3ea72cca130cd6b76fc5d614d2c9f5ad3a0a0da7b41aae3c", {}, 0xfffffffffffffff8}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x101000, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r1, 0x80046402, &(0x7f0000000140)=0x6) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000000)={0x9f, 0x8}) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f00000000c0)=0x7) [ 641.628268][T13404] ERROR: Out of memory at tomoyo_realpath_from_path. 23:31:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000040)=0x8) r3 = gettid() perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x0, 0x0, 0x2, 0xffffffff, 0x0, 0x0, 0x0, 0x8, 0x0, 0xc3, 0x7fffffff, 0x8, 0xfe, 0x7, 0x0, 0x3, 0x3, 0x0, 0x0, 0x1f, 0x0, 0x0, 0xfffffffffffffb01, 0x0, 0x800, 0x0, 0x0, 0x8172, 0x0, 0x21, 0x1, 0x3, 0x0, 0x5, 0x0, 0x5, 0x0, 0x6, 0x4, @perf_config_ext={0x3f, 0x9}, 0x0, 0xf7, 0x8001, 0x3, 0x0, 0x9, 0xfff}, r3, 0xc, r0, 0x9) bind$unix(r2, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r2, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f0000000080)=""/53) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r4, r1, 0x0, 0x4) 23:31:37 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:37 executing program 1 (fault-call:3 fault-nth:1): perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000002) 23:31:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rfkill\x00', 0x10100d, 0x0) r2 = memfd_create(&(0x7f0000000180)=')\\\x00', 0x0) write$binfmt_aout(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="00bf18020003"], 0x6) r3 = syz_open_dev$sndpcmp(0x0, 0x8, 0x141) setsockopt$sock_void(r3, 0x1, 0x24, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffffffffffb1) sendfile(r1, r2, &(0x7f0000000000), 0x7fffffffffffffff) fremovexattr(r3, &(0x7f00000002c0)=@known='trusted.overlay.metacopy\x00') ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f00000001c0)={{0xffffffff, 0xffffffff, 0x1, 0xf53}, 'syz1\x00', 0x49}) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000080)=0x3, 0x4) getsockname$llc(r3, &(0x7f0000000100), &(0x7f0000000140)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000240), &(0x7f00000000c0)=0x68) 23:31:37 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0xffffffffffffff5d, &(0x7f0000000140)={&(0x7f00000001c0)={0x14, 0x2f, 0x829, 0x0, 0x0, {0x10}}, 0x14}}, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r1, 0x304, 0x70bd2b, 0x25dfdbff, {{}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x4000) 23:31:37 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x72030000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 642.032045][T13440] FAULT_INJECTION: forcing a failure. [ 642.032045][T13440] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 642.045797][T13440] CPU: 0 PID: 13440 Comm: syz-executor.1 Not tainted 5.2.0-rc6-next-20190628 #25 [ 642.055085][T13440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 642.065296][T13440] Call Trace: [ 642.068723][T13440] dump_stack+0x172/0x1f0 [ 642.073107][T13440] should_fail.cold+0xa/0x15 [ 642.077749][T13440] ? fault_create_debugfs_attr+0x180/0x180 [ 642.083615][T13440] ? lock_downgrade+0x920/0x920 [ 642.088598][T13440] should_fail_alloc_page+0x50/0x60 [ 642.093837][T13440] __alloc_pages_nodemask+0x1a1/0x8f0 [ 642.099244][T13440] ? kasan_check_read+0x11/0x20 [ 642.104306][T13440] ? mark_lock+0xc0/0x11e0 [ 642.108758][T13440] ? __alloc_pages_slowpath+0x2520/0x2520 [ 642.114509][T13440] ? kasan_check_read+0x11/0x20 [ 642.119403][T13440] ? fault_create_debugfs_attr+0x180/0x180 [ 642.125346][T13440] cache_grow_begin+0x90/0xd20 [ 642.130163][T13440] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 642.135917][T13440] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 642.142204][T13440] __kmalloc+0x6af/0x770 [ 642.146802][T13440] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 642.152575][T13440] tomoyo_realpath_from_path+0xcd/0x7a0 [ 642.158176][T13440] ? tomoyo_path_number_perm+0x193/0x520 [ 642.163945][T13440] tomoyo_path_number_perm+0x1dd/0x520 [ 642.169445][T13440] ? tomoyo_path_number_perm+0x193/0x520 [ 642.175158][T13440] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 642.181003][T13440] ? __f_unlock_pos+0x19/0x20 [ 642.185750][T13440] ? __fget+0x384/0x560 [ 642.189946][T13440] ? ksys_dup3+0x3e0/0x3e0 [ 642.194423][T13440] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 642.200701][T13440] ? fput_many+0x12c/0x1a0 [ 642.205159][T13440] tomoyo_file_ioctl+0x23/0x30 [ 642.209960][T13440] security_file_ioctl+0x77/0xc0 [ 642.214950][T13440] ksys_ioctl+0x57/0xd0 [ 642.219148][T13440] __x64_sys_ioctl+0x73/0xb0 [ 642.223780][T13440] do_syscall_64+0xfd/0x6a0 [ 642.228334][T13440] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 642.234251][T13440] RIP: 0033:0x459519 [ 642.238196][T13440] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 642.257930][T13440] RSP: 002b:00007f0dd64fcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 642.257949][T13440] RAX: ffffffffffffffda RBX: 00007f0dd64fcc90 RCX: 0000000000459519 [ 642.257956][T13440] RDX: 0000000020000002 RSI: 00000000c0185879 RDI: 0000000000000004 23:31:38 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="4420309a1db245c157aac0169d0187d928a15faecc8f8a08124d05be609f967eb2b0342503157c57e5791a18783966a3ef547380aecf68000e0ec3443ff80d665b2296efdcea17432d4295fc02713a60db920b6a28f0044273b351b7df2e10984b7da1e82ff814ef4948fd84629fd949d02b8b7d4a54c6040bb09caaab73a7039a18d3d12bff873e780c11e337a9c5ae2aab1f65053179a5d2d7c448a4187ca3600f34b466cd087bb78b314274a3a36c7dc37ea55b116c43a92f52d549867f658ca2167ef2c5ddff1b0d969618f447c728"], 0x200600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) [ 642.257964][T13440] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 642.257977][T13440] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0dd64fd6d4 [ 642.257984][T13440] R13: 00000000004ccc68 R14: 00000000004d6188 R15: 0000000000000005 23:31:38 executing program 0: socket$inet6(0xa, 0x5, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000025c0)=0x204, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) readlinkat(r2, 0x0, 0x0, 0xfffffffffffffd96) connect$inet(r2, 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000000c0)=0x0) sched_getaffinity(r3, 0x8, &(0x7f0000000140)) connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) r4 = getpgrp(0x0) getpgid(r4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x1000000}, 0x100) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmmsg(r0, &(0x7f0000002080)=[{{0x0, 0x0, &(0x7f0000000880)}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) ioctl$TIOCGICOUNT(r2, 0x545d, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 23:31:38 executing program 1 (fault-call:3 fault-nth:2): perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000002) [ 642.613105][ T26] audit: type=1804 audit(1561851098.306:69): pid=13470 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="memory.events" dev="sda1" ino=16825 res=1 23:31:38 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 642.660154][T13473] FAULT_INJECTION: forcing a failure. [ 642.660154][T13473] name failslab, interval 1, probability 0, space 0, times 0 23:31:38 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6e9f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2000000000000805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x8, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept4(r1, 0x0, 0x0, 0x0) flistxattr(r1, 0x0, 0x0) [ 642.761195][ T26] audit: type=1804 audit(1561851098.406:70): pid=13470 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="memory.events" dev="sda1" ino=16825 res=1 [ 642.782504][T13473] CPU: 0 PID: 13473 Comm: syz-executor.1 Not tainted 5.2.0-rc6-next-20190628 #25 [ 642.782518][T13473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 642.782525][T13473] Call Trace: [ 642.782551][T13473] dump_stack+0x172/0x1f0 23:31:38 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$inet6(0xa, 0x400000000001, 0x0) socketpair$unix(0x1, 0x7, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x205) r1 = dup(r0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x208, 0xa5) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x0, 0x4, @mcast1}}, 0x0, 0x0, 0x0, "9fc72b543b28dd4728c3988b7adea76fa59f716c731782304d2a8b2baf8c1724fb01b86d7c1d88f3c7322926d8f0fcdb51b5df3ba8b696320eb85ae1bd8e6af048c54f27e0dad819d7cb50aaa2bc300f"}, 0xd8) semget$private(0x0, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) setns(r1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) clock_nanosleep(0x4, 0xfffffffffffffffc, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$int_in(r2, 0x26, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback, 0xffffffffffffffff}, 0x1c) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x4}, 0x1c) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = epoll_create(0x20) fgetxattr(r4, &(0x7f0000000000)=@known='trusted.overlay.origin\x00', &(0x7f0000000080)=""/116, 0x74) ftruncate(r3, 0x7fff) sendfile(r1, r3, 0x0, 0x8000ffffbffe) 23:31:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r2 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0xa82, 0x20000) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f0000000180)=0x6) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'hsr0\x00t\x00\x00L\x00\x00\x00\x00\x00\bl', 0x1001}) fsetxattr$security_capability(r0, &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000100)=@v2={0x2000000, [{0x3, 0x1}, {0xf5, 0x10000}]}, 0x14, 0x3) [ 642.782576][T13473] should_fail.cold+0xa/0x15 [ 642.813998][T13473] ? fault_create_debugfs_attr+0x180/0x180 [ 642.814020][T13473] ? ___might_sleep+0x163/0x280 [ 642.814042][T13473] __should_failslab+0x121/0x190 [ 642.814059][T13473] should_failslab+0x9/0x14 [ 642.814071][T13473] __kmalloc+0x2e0/0x770 [ 642.814087][T13473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 642.814102][T13473] ? d_absolute_path+0x11b/0x170 [ 642.814116][T13473] ? __d_path+0x140/0x140 [ 642.814133][T13473] ? tomoyo_encode2.part.0+0xf5/0x400 [ 642.814153][T13473] tomoyo_encode2.part.0+0xf5/0x400 [ 642.814172][T13473] tomoyo_encode+0x2b/0x50 [ 642.814190][T13473] tomoyo_realpath_from_path+0x1d3/0x7a0 [ 642.814215][T13473] tomoyo_path_number_perm+0x1dd/0x520 [ 642.814230][T13473] ? tomoyo_path_number_perm+0x193/0x520 [ 642.814250][T13473] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 642.814264][T13473] ? __f_unlock_pos+0x19/0x20 [ 642.814314][T13473] ? __fget+0x384/0x560 [ 642.814335][T13473] ? ksys_dup3+0x3e0/0x3e0 [ 642.814351][T13473] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 642.814367][T13473] ? fput_many+0x12c/0x1a0 [ 642.814390][T13473] tomoyo_file_ioctl+0x23/0x30 [ 642.814408][T13473] security_file_ioctl+0x77/0xc0 [ 642.814427][T13473] ksys_ioctl+0x57/0xd0 [ 642.814446][T13473] __x64_sys_ioctl+0x73/0xb0 [ 642.814466][T13473] do_syscall_64+0xfd/0x6a0 [ 642.814497][T13473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 642.834702][T13473] RIP: 0033:0x459519 [ 642.834720][T13473] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 642.834726][T13473] RSP: 002b:00007f0dd64fcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 642.834740][T13473] RAX: ffffffffffffffda RBX: 00007f0dd64fcc90 RCX: 0000000000459519 [ 642.834748][T13473] RDX: 0000000020000002 RSI: 00000000c0185879 RDI: 0000000000000004 [ 642.834756][T13473] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 642.834765][T13473] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0dd64fd6d4 [ 642.834774][T13473] R13: 00000000004ccc68 R14: 00000000004d6188 R15: 0000000000000005 [ 642.852674][T13473] ERROR: Out of memory at tomoyo_realpath_from_path. 23:31:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001540)="c0dca5055e0bcfec7be070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) userfaultfd(0x80800) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) [ 643.145960][T13488] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 23:31:38 executing program 1 (fault-call:3 fault-nth:3): perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000002) [ 643.365089][ T26] audit: type=1800 audit(1561851099.056:71): pid=13488 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="sda1" ino=16741 res=0 [ 643.370645][T13503] FAULT_INJECTION: forcing a failure. [ 643.370645][T13503] name failslab, interval 1, probability 0, space 0, times 0 [ 643.470604][T13503] CPU: 0 PID: 13503 Comm: syz-executor.1 Not tainted 5.2.0-rc6-next-20190628 #25 [ 643.479900][T13503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 643.489997][T13503] Call Trace: [ 643.493324][T13503] dump_stack+0x172/0x1f0 [ 643.497692][T13503] should_fail.cold+0xa/0x15 [ 643.502348][T13503] ? fault_create_debugfs_attr+0x180/0x180 [ 643.508187][T13503] ? kasan_check_read+0x11/0x20 [ 643.513073][T13503] ? mark_lock+0xc0/0x11e0 [ 643.517529][T13503] ? mark_lock+0xc0/0x11e0 [ 643.521977][T13503] ? kasan_check_read+0x11/0x20 [ 643.526861][T13503] __should_failslab+0x121/0x190 [ 643.531831][T13503] should_failslab+0x9/0x14 [ 643.536377][T13503] kmem_cache_alloc+0x47/0x710 [ 643.541167][T13503] ? ___might_sleep+0x163/0x280 [ 643.546054][T13503] ? mempool_alloc+0x380/0x380 [ 643.550840][T13503] mempool_alloc_slab+0x47/0x60 [ 643.555753][T13503] mempool_alloc+0x169/0x380 [ 643.560384][T13503] ? mempool_destroy+0x40/0x40 [ 643.565182][T13503] ? finish_task_switch+0x147/0x720 [ 643.570411][T13503] ? find_held_lock+0x35/0x130 [ 643.575208][T13503] ? finish_task_switch+0x147/0x720 [ 643.580454][T13503] bio_alloc_bioset+0x3b9/0x680 [ 643.585346][T13503] ? finish_task_switch+0x147/0x720 [ 643.590610][T13503] ? _raw_spin_unlock_irq+0x28/0x90 [ 643.595853][T13503] ? bvec_alloc+0x2f0/0x2f0 [ 643.600384][T13503] ? trace_hardirqs_on+0x67/0x240 [ 643.605433][T13503] ? kasan_check_read+0x11/0x20 [ 643.610328][T13503] blk_next_bio+0x2a/0x60 [ 643.614689][T13503] __blkdev_issue_discard+0x2e1/0x610 [ 643.620103][T13503] blkdev_issue_discard+0xc3/0x180 [ 643.625255][T13503] ? __blkdev_issue_discard+0x610/0x610 [ 643.630830][T13503] ? preempt_schedule_common+0x63/0xe0 [ 643.636328][T13503] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 643.642627][T13503] ext4_trim_fs+0xcac/0x1e30 [ 643.647257][T13503] ? kasan_check_read+0x11/0x20 [ 643.652243][T13503] ? ext4_group_add_blocks+0xb70/0xb70 [ 643.657834][T13503] ? lock_downgrade+0x920/0x920 [ 643.662778][T13503] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 643.669053][T13503] ? _copy_from_user+0x12c/0x1a0 [ 643.674028][T13503] ext4_ioctl+0x5f5/0x4530 [ 643.678475][T13503] ? tomoyo_path_number_perm+0x214/0x520 [ 643.684146][T13503] ? ext4_ioc_getfsmap+0x9d0/0x9d0 [ 643.689292][T13503] ? tomoyo_path_number_perm+0x459/0x520 [ 643.694962][T13503] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 643.701232][T13503] ? tomoyo_path_number_perm+0x263/0x520 [ 643.706907][T13503] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 643.712740][T13503] ? __f_unlock_pos+0x19/0x20 [ 643.717497][T13503] ? ext4_ioc_getfsmap+0x9d0/0x9d0 [ 643.722640][T13503] do_vfs_ioctl+0xdb6/0x13e0 [ 643.727268][T13503] ? ioctl_preallocate+0x210/0x210 [ 643.732409][T13503] ? __fget+0x384/0x560 [ 643.736617][T13503] ? ksys_dup3+0x3e0/0x3e0 [ 643.741058][T13503] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 643.747333][T13503] ? fput_many+0x12c/0x1a0 [ 643.751778][T13503] ? tomoyo_file_ioctl+0x23/0x30 [ 643.756751][T13503] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 643.763223][T13503] ? security_file_ioctl+0x8d/0xc0 [ 643.768454][T13503] ksys_ioctl+0xab/0xd0 [ 643.772641][T13503] __x64_sys_ioctl+0x73/0xb0 [ 643.777358][T13503] do_syscall_64+0xfd/0x6a0 [ 643.781893][T13503] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 643.787893][T13503] RIP: 0033:0x459519 [ 643.791900][T13503] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 643.811627][T13503] RSP: 002b:00007f0dd64fcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 23:31:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") rt_sigaction(0x0, 0x0, 0x0, 0x8, &(0x7f0000000040)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x900, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @broadcast}]}) [ 643.820150][T13503] RAX: ffffffffffffffda RBX: 00007f0dd64fcc90 RCX: 0000000000459519 [ 643.828230][T13503] RDX: 0000000020000002 RSI: 00000000c0185879 RDI: 0000000000000004 [ 643.836221][T13503] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 643.844229][T13503] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0dd64fd6d4 [ 643.852218][T13503] R13: 00000000004ccc68 R14: 00000000004d6188 R15: 0000000000000005 [ 643.982380][T13493] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 23:31:39 executing program 1 (fault-call:3 fault-nth:4): perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000002) 23:31:39 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x74000000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:39 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 644.218995][T13526] FAULT_INJECTION: forcing a failure. [ 644.218995][T13526] name failslab, interval 1, probability 0, space 0, times 0 [ 644.300722][T13526] CPU: 0 PID: 13526 Comm: syz-executor.1 Not tainted 5.2.0-rc6-next-20190628 #25 [ 644.309897][T13526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 644.319990][T13526] Call Trace: [ 644.323329][T13526] dump_stack+0x172/0x1f0 [ 644.327728][T13526] should_fail.cold+0xa/0x15 [ 644.332347][T13526] ? bio_alloc_bioset+0x3b9/0x680 [ 644.337441][T13526] ? fault_create_debugfs_attr+0x180/0x180 [ 644.343537][T13526] ? ksys_ioctl+0xab/0xd0 [ 644.347895][T13526] ? __x64_sys_ioctl+0x73/0xb0 [ 644.352695][T13526] ? generic_make_request_checks+0x77c/0x21a0 [ 644.358805][T13526] __should_failslab+0x121/0x190 [ 644.363782][T13526] should_failslab+0x9/0x14 [ 644.368322][T13526] kmem_cache_alloc_node+0x56/0x740 [ 644.373921][T13526] ? lock_downgrade+0x920/0x920 [ 644.378810][T13526] create_task_io_context+0x33/0x450 [ 644.384157][T13526] generic_make_request_checks+0x1b2f/0x21a0 [ 644.390291][T13526] ? trace_event_raw_event_block_rq_requeue+0x640/0x640 [ 644.397262][T13526] ? kasan_check_read+0x11/0x20 [ 644.402148][T13526] ? __lock_acquire+0x8a2/0x4c20 [ 644.407113][T13526] ? ___might_sleep+0x163/0x280 [ 644.412015][T13526] generic_make_request+0x8f/0xb50 [ 644.417191][T13526] ? find_held_lock+0x35/0x130 [ 644.422000][T13526] ? blk_queue_enter+0xe60/0xe60 [ 644.427020][T13526] ? lock_downgrade+0x920/0x920 [ 644.431910][T13526] submit_bio+0xba/0x480 [ 644.436182][T13526] ? submit_bio+0xba/0x480 [ 644.440632][T13526] ? generic_make_request+0xb50/0xb50 [ 644.446045][T13526] ? lockdep_init_map+0x1be/0x6d0 [ 644.451109][T13526] ? lockdep_init_map+0x1be/0x6d0 [ 644.456175][T13526] submit_bio_wait+0x115/0x1c0 [ 644.460997][T13526] ? submit_bio_wait_endio+0x40/0x40 [ 644.461018][T13526] ? ___might_sleep+0x163/0x280 [ 644.461052][T13526] blkdev_issue_discard+0xf0/0x180 [ 644.461068][T13526] ? __blkdev_issue_discard+0x610/0x610 [ 644.461086][T13526] ? lock_downgrade+0x920/0x920 [ 644.461108][T13526] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 644.461134][T13526] ext4_trim_fs+0xcac/0x1e30 [ 644.461151][T13526] ? kasan_check_read+0x11/0x20 [ 644.461181][T13526] ? ext4_group_add_blocks+0xb70/0xb70 [ 644.461197][T13526] ? lock_downgrade+0x920/0x920 [ 644.461229][T13526] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 644.461247][T13526] ? _copy_from_user+0x12c/0x1a0 [ 644.461265][T13526] ext4_ioctl+0x5f5/0x4530 [ 644.461281][T13526] ? tomoyo_path_number_perm+0x214/0x520 [ 644.461303][T13526] ? ext4_ioc_getfsmap+0x9d0/0x9d0 [ 644.461324][T13526] ? tomoyo_path_number_perm+0x459/0x520 [ 644.461345][T13526] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 644.461360][T13526] ? tomoyo_path_number_perm+0x263/0x520 [ 644.461378][T13526] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 644.461392][T13526] ? __f_unlock_pos+0x19/0x20 [ 644.461426][T13526] ? ext4_ioc_getfsmap+0x9d0/0x9d0 [ 644.461443][T13526] do_vfs_ioctl+0xdb6/0x13e0 [ 644.461463][T13526] ? ioctl_preallocate+0x210/0x210 [ 644.461477][T13526] ? __fget+0x384/0x560 [ 644.461499][T13526] ? ksys_dup3+0x3e0/0x3e0 [ 644.461515][T13526] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 644.461531][T13526] ? fput_many+0x12c/0x1a0 [ 644.461554][T13526] ? tomoyo_file_ioctl+0x23/0x30 [ 644.461570][T13526] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 644.461585][T13526] ? security_file_ioctl+0x8d/0xc0 [ 644.461603][T13526] ksys_ioctl+0xab/0xd0 [ 644.461622][T13526] __x64_sys_ioctl+0x73/0xb0 [ 644.461642][T13526] do_syscall_64+0xfd/0x6a0 [ 644.461668][T13526] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 644.461681][T13526] RIP: 0033:0x459519 [ 644.461699][T13526] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 644.461708][T13526] RSP: 002b:00007f0dd64dbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 644.461725][T13526] RAX: ffffffffffffffda RBX: 00007f0dd64dbc90 RCX: 0000000000459519 [ 644.461734][T13526] RDX: 0000000020000002 RSI: 00000000c0185879 RDI: 0000000000000004 [ 644.461742][T13526] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 644.461751][T13526] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0dd64dc6d4 [ 644.461759][T13526] R13: 00000000004ccc68 R14: 00000000004d6188 R15: 0000000000000005 23:31:40 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) sendmsg(r0, &(0x7f0000001640)={&(0x7f0000000180)=@in6={0xa, 0x4e21, 0x80, @ipv4={[], [], @remote}, 0x3}, 0x80, &(0x7f00000015c0)=[{&(0x7f0000000200)="cd865dc31dc98849b425e4417783feb4d37813a1fe189b469f6352de170506136094c152b6963b9508d35044ea18579b013cc4914758f0e32700382b84c2ab35551885233c7ee7459903c7370c3e44063161219a1247c27ba993b256e3504dcea9fecd624b88db73f3665af511645a4974bff8e07107a7d2fd1dd11c2877c7ce408c71408ff9e758218ecd58a851f906ab39033ede9c8e30674a65e188bcdd80aa18346dbad2e84448b97ba12f4240ce8d1e686360df050bab839423d783d60774dd07c8c40baf9b96d70239769482d42e01a2094d37fb8cebb8bfcfd6ef748d79be347c28eb1f465e0809a9774f2b3afb28", 0xf2}, {&(0x7f0000000380)="233b72643b5ab71c5ec7", 0xa}, {&(0x7f00000003c0)="66dd34f16a1051f61b6444879296d6d623d98d0de6f743341e7d8396ddfe92b99c892b5e2ec379d3d241c24eeb3f6d41339ae5d6be1914b9014d333f246bdc35470dcc3d07a3f2b8c90ad90dade5c23fbfc1e790e810309d011874ea8ea519af88f97d24e7c9600dbaa0e428dc5e8ec0869554b9fac4698ec2f19868f17c11d3f40a008cbf06f4397b47a7c74a987dd54f10fd9a76ac51557eeed4058023bd4d99d31751", 0xa4}, {&(0x7f0000000480)="c6565220dc7f42f4a7fedfbf1c258b88a94f9e20be190795d47749d522a3bed3eeeefeefcdf40e254bf070d69f1f70fd0e3015aba71691f237279f3a619316e6ca3ecfa050505d6395170a9320a4977446e363e28c1e371e707d987c4a5ceabc2eb8ae750e7def1836c784aa94", 0x6d}, {&(0x7f0000000500)="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", 0x1000}, {&(0x7f0000001500)="92d24d56906900fb9916c2067f5e30db77ad28d5b3040260bb3dbbb15e38cfea702bc1d0380bf9b3dab3cb3364e44840c633e70d52bbcc94ef9112551e2b4c6effc6afe7eebf32075aa7e3d4dcdae3d703fea5764c2b3998db5ff8976d4851f9cdbda07ace2f0f2e554076a5004388d82c96ca70bacfe38e82fda714b85f1a7b1a8a81eaed3176938ed47fc853d9167a2a39a646c48e58b034d8173cfbf04294280c808ef834be9fb55d998704b8", 0xae}], 0x6}, 0x20008005) syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='uid=', @ANYRESHEX]) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x210000, 0x0) getpeername$unix(r1, &(0x7f0000000040)=@abs, &(0x7f0000000140)=0x6e) 23:31:40 executing program 1 (fault-call:3 fault-nth:5): perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000002) [ 644.953686][T13513] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 23:31:40 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000002) 23:31:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x41, 0x0, &(0x7f0000000100)=0x91) 23:31:40 executing program 3: r0 = open(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@local, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, 0x0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./bus\x00', 0xc1, 0x6, &(0x7f0000000880)=[{&(0x7f0000000200)="84fc51de64646463d22112570b69de094735282121aa87b9c08dea5e92f367b6c795797936000b2a24559dd49ef048925482dc4d41d3994cc83a4bd1d2fe6078dcbd8cea1295ba41cd2969a1e329932d7da51bf355489d299ca47ad8e9cb2f8923be36796ac30355ceff64c80366e98bf1a98c7873f07ae2c975716ca6090294ea569af1a2bd4482037835b612d7d700cee0d586adc9004b5434653b58bd679b2d9babf1e4bb4c027993ba0755bbfa3a9014c6508227758725f9e409f226980d40d17619fceab8c90150443d4db2069829ef32c961e6", 0xd6, 0x5}, {&(0x7f0000000080)="0fe275775eea313235c322b2a7527e480a7acef414801eed7a199ae4de2af5bd6dc992", 0x23, 0xfffffffffffff95d}, {&(0x7f0000000300)="ab447995e59ce85d17149889d6378faef1e2da7791c0afd564c59f329e8f8d4de766e86437d82c8405690c393218e21396feafee7619cc658401dce2c53dbd0c33daf38347e67def5509528d4bca999af819dc757b297e932e926e552722c42db0d03a39c069e2ed11c79e6da1d090c88ba561987b369f99995da6fe2407d8d7c8cb35aa72fe8d73ac992f2036b147218df5db55b894273e8cf8110c53dfc67340c3d5caa0ad8f298e80fb2d25b3200d8735a00d67d90ff59aa319e7342e996fc02e13c4cb02", 0xc6, 0x9}, {&(0x7f0000000400)="ceea985e1f494259410812e8666eac23791237d738232bef0b0e77df79fa5d314b8cdfc403c02af935ee58c997dd29992c43465dac5a19814e86d334f31cd7ba87d8da8007b0ffd397dbfac54f4b4bb0acd101dd16a90c83895ca7f56ac7e08a0d22c5f79654789e6db6f9ce85e63ed29bb7f5c149f39d0a55842a204bb0a49383d6b4800a5fefd4264be153b9db749fa2d602780160129d9c4a291ae853fc4085b5b7946697cfb3399fe3f93cebf30b756f81111ef9e474c9777333e526e14af5dad63740", 0xc5, 0x9}, {&(0x7f00000000c0)="ed66588ad89571b5ba738171ace96fdbb694b5872bc991a2c9e793011a17532ce34efa92eeb786f613264a99df", 0x2d, 0x7f}, {&(0x7f0000000680)="a3715418695fbca475d123909d7c7be0c1705eed2918dfeed11233baa2125fd1d09f7365bfd7e1efc9c3e2f38d1839a148daff93d5f04ab715ce50bcd60ea21f69de6bec2b8f9a4b708cfef56c1bf7d48be019319f329df8c103e5d0aedff4be2c24ecf81e84e2748eda2a2ee9923260a00e0110236cb2eed4e7489e8123b0c5adb22f13868dad0e18293ac12cfccf4981f9f99f448cbc8462f5ec42b1ab2f51c7e55278f1d24d71afefba1af18bced39d1d7dcbcfa8dfbda54d05761d0cee89057fc00c70fd402efc740fc7eb1e07020eb12ac3f0", 0xd5, 0x2}], 0xc, &(0x7f0000000940)={[{@nodots='nodots'}, {@nodots='nodots'}, {@dots='dots'}, {@dots='dots'}, {@dots='dots'}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}], [{@obj_role={'obj_role', 0x3d, 'posix_acl_access'}}, {@obj_type={'obj_type', 0x3d, '{md5sumuser{!$,'}}, {@hash='hash'}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@permit_directio='permit_directio'}]}) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000100)={0x0, 0xffffffffffffffff}) getcwd(0x0, 0x193) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) unlink(0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 23:31:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xffffffffffffffb4, 0x20, 0x4}, {0x0, [0x5f, 0x5f]}}, 0x0, 0xffffffffffffff46}, 0xfffffffffffffdd7) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYBLOB="0e0000000cf982a4e30cb6a6f3f9e9853d7ffbfaef4c879cacae0a0db25ead5756c6f113fe4d0198c034b8f62ba1bef40a7422b230cc93a182f95125a0a3bedd89fb9942c6c6b075eeffe5940385f18efac60fe916d69a550cfb9839a22a801338caa7c7972d8f171d39d94bb24ed4e1aa1bf8ff743703d5362109f0d1c70e558a5e07bb786b1f5bd0b1a909db40ed6db1a163a103ed72e676"], &(0x7f00000001c0)=0x16) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000200)={r1, 0x80}, 0x8) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x400, 0x0) r3 = getpid() perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0x4fb9, 0x1, 0x6, 0x8, 0x0, 0x4000000000, 0x10, 0x2, 0x4, 0x4, 0x400, 0x5, 0x200, 0x3, 0x0, 0x54, 0x5, 0x6, 0x400, 0xee, 0x5, 0x0, 0x1, 0x8, 0x3d, 0x7, 0x7f, 0x8c1, 0x8, 0x9, 0x5, 0x7, 0x1ff, 0x0, 0x5, 0x9, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000080)}, 0x650, 0x5, 0x2, 0x9, 0x1, 0x1, 0x7}, r3, 0xd, r2, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r2, 0x80045700, &(0x7f0000000340)) timerfd_create(0x3, 0x80800) syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7, 0xa2000) 23:31:40 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x7a000000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:40 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:41 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x2, 0x0) readlinkat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=""/95, 0x5f) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0f34"], 0x2}}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @cond=[{}, {0x0, 0x0, 0x0, 0x40}]}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000180)={'lo\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="37477e43a23b007f684841f6497d3bae49"]}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 23:31:41 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x2, 0x20000002) 23:31:41 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x5, 0x1) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f00000000c0)={0x73622a85, 0x1000}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='gid_map\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) 23:31:41 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x80, 0x0) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f0000000080)={{0xd000, 0x1, 0xf, 0x4dc, 0x5, 0xfffffffffffffff8, 0x0, 0x1, 0x8, 0x2eb20cbf, 0x899, 0x3}, {0x3001, 0x0, 0xf, 0x7ff, 0x10000, 0xfff, 0xff, 0x3, 0xffc, 0x2, 0x1, 0x2}, {0x6000, 0x0, 0x8, 0x200, 0x7fffffff, 0xffffffffffff7fff, 0xa4, 0x6, 0xbfc, 0x100000000, 0x7}, {0x10000, 0xf000, 0xb, 0x2, 0x5, 0x8001, 0xaa, 0x40, 0x10001, 0x100000001, 0x53, 0x9}, {0xd000, 0x0, 0x10, 0xd0, 0x101, 0x8, 0x1, 0x9, 0x0, 0xd02d, 0x7dab6b9d, 0x5}, {0x0, 0x1, 0x0, 0x8, 0x2, 0x5, 0x7fff, 0x20, 0x1000, 0x200, 0x0, 0xffffffff00000000}, {0xf000, 0x4, 0xf, 0x101, 0x100000001, 0x100000000, 0xffffffff, 0x1, 0x100000000, 0x1, 0x0, 0x8}, {0xf000, 0xd000, 0xd, 0x4, 0x1, 0x1, 0x9, 0x1, 0xb30e, 0x1, 0x4, 0x8}, {0x100002, 0x106000}, {0x0, 0xf000}, 0x40000000, 0x0, 0x4001, 0x100000, 0x0, 0x6000, 0x0, [0xfffffffffffffffb, 0xffffffffffffff01, 0xbf1, 0x3f]}) r2 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f00000002c0)=ANY=[@ANYBLOB="1f0000000000000000000040050000a90000e7fc4b83bbb6a23b4b6942b7871001000000000000002560b700ff"]) setsockopt$inet6_dccp_buf(r1, 0x21, 0x0, &(0x7f0000000300)="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", 0x1000) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0xf8, 0x2, [{0x48e}]}) [ 645.556628][T13560] FAT-fs (loop3): Unrecognized mount option "obj_role=posix_acl_access" or missing value 23:31:41 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x87800000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:41 executing program 3: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x7a000000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:41 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2000000004, 0x400031, 0xffffffffffffffff, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000000)) 23:31:41 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:41 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x10, 0x20000002) 23:31:41 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, 0x0, &(0x7f0000000040)) r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x40) setsockopt$inet6_dccp_buf(r1, 0x21, 0xf, &(0x7f0000000140)="44c483bdc5893b9c6b37b2cca1eb993f0a7c1978d44e3d68d45ef4e5b34f632ebe85e9a3d42570fbac2285b2e1ef65301ac5cccf86da0df9b5794ba30b0027237bdf013d6f436744c8e5968d20bc89bbb17b", 0x52) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x10000, 0x3, &(0x7f0000ff0000/0x10000)=nil) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0xc6040, 0x0) write$apparmor_current(r2, &(0x7f0000000080)=ANY=[@ANYBLOB='permhat 0x0000000000000004^{[vmnet0eth1user\x00GPLem1{keyring\x00cgroDup/vmnet0systemnodev'], 0x54) fsync(r2) 23:31:41 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r1 = dup(r0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000040)={0xffffffffffffffff, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x1008000000000002) dup3(r2, r0, 0x0) 23:31:42 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x2402, 0x20000002) 23:31:42 executing program 5: syslog(0x3, 0xfffffffffffffffd, 0x9f97) r0 = socket$netlink(0x10, 0x3, 0x13) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x40040, 0x0) getdents(r1, &(0x7f0000000180)=""/82, 0x52) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r2, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x8}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x10000}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40880}, 0x8000) ioctl$UI_BEGIN_FF_UPLOAD(r1, 0xc06855c8, &(0x7f0000000200)={0xc, 0x3, {0x56, 0x9, 0x401, {0x8, 0x8fb0000000000}, {0x3, 0x3f}, @const={0x3ff, {0x953, 0x1, 0x3f, 0x9d98}}}, {0x51, 0x1, 0x400, {0xf4, 0x274}, {0xffffffffffff8e85, 0x5}, @ramp={0x4, 0x1e, {0x2, 0x1, 0x33e1, 0x6}}}}) 23:31:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)='\x00'/11) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x20800, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r3, 0x2, 0x70bd28, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x3, 0x40, 0xffffffff, 0x5}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x810}, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 23:31:42 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x4b45, 0x20000002) 23:31:42 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0xa2010000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:42 executing program 3: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x7a000000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:42 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x3) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001380)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x3, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) truncate(&(0x7f0000000080)='./file0\x00', 0x0) 23:31:42 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:42 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x4b67, 0x20000002) 23:31:42 executing program 0: r0 = socket$bt_bnep(0x1f, 0x3, 0x4) fstatfs(r0, &(0x7f0000000180)=""/214) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008910, &(0x7f0000000080)="11dca5855e0bcfec7be070a9fb52b3826a00a299") syz_mount_image$hfsplus(&(0x7f00000003c0)='hfsplus\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x54, 0x0, 0x204011, 0x0) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000000)={'veth1\x00', 0x10001}) 23:31:42 executing program 3: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x7a000000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_emit_ethernet(0x6e, &(0x7f0000000080)={@dev={[], 0x2b}, @empty, [{[{0x9100, 0x100, 0x5, 0x1}], {0x8100, 0x400e, 0x7, 0x1}}], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x0, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 23:31:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) shutdown(r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000040)={0x1fffffff}) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'L+', 0x3ff}, 0x28, 0x2) 23:31:42 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0xc0000000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:42 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x4b69, 0x20000002) 23:31:43 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1, 0x2080) write$P9_RREADDIR(r1, &(0x7f0000000100)={0xa6, 0x29, 0x2, {0x6, [{{0x2, 0x4, 0x2}, 0xffffffff, 0x1000, 0x7, './file0'}, {{0xf1, 0x2, 0x6}, 0x1, 0x5, 0x7, './file0'}, {{0x1, 0x1, 0x6}, 0x8, 0x4, 0x7, './file0'}, {{0x10, 0x3, 0x7}, 0x7fff, 0x0, 0x7, './file0'}, {{0xe, 0x3}, 0xfffffffffffffffe, 0xa72f, 0x7, './file0'}]}}, 0xa6) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x9, 0x5, 0x7, 0x200}, 0x3c) 23:31:43 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x15, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x4}]}, &(0x7f0000f6bffb)='W*\x00\x00', 0x0, 0xabf543b4162708cd, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x7b7, 0x10, 0x0, 0xfffffe09}, 0x14) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_percpu\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e23, 0x401, @dev={0xfe, 0x80, [], 0x1b}, 0x8}}, 0x10000000, 0x5}, &(0x7f0000000180)=0x90) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000001c0)={r1, 0xffff, 0x101}, 0x8) 23:31:43 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:43 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x4c01, 0x20000002) 23:31:43 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0xde030000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="010000000000000000000000e5feffff00000000020000000f00000000000008050000000027e829ce2c09585b0bb76cc47138ad67f722590c4895d51381420c46117cb4d4a9c989aafc7b2ef4671ab79ba5ffae94ca3372f56a3c5fd88c2a334448b9c3e44a4f735d16c6826b4e4825b35a6ef4bc8218101a981625959f1f06f31a54f826eb8feaa4cd8af4195a0055464d428d03ede0f9acb7e19cc7016605bd5c653aa4c860263d206cf9acaccc84f8c5867108afde179b36e7790e5d3e7558cea0e53551282a"], &(0x7f0000000000)=""/251, 0x362e1e0e6bc8b795, 0xffffffffffffff2f, 0x4}, 0x20) 23:31:43 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x113}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x4, r1, 0x10, 0x1, @in6={0xa, 0x4e20, 0x36, @remote, 0x41b}}}, 0xa0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000f76f1a4e000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x2000000) r3 = syz_open_dev$media(0x0, 0x0, 0x40000) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r0, 0x0, 0x4004848) setsockopt$RDS_CANCEL_SENT_TO(r3, 0x114, 0x1, 0x0, 0x0) 23:31:43 executing program 5: mkdir(&(0x7f000002b000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x4040, 0x0) creat(&(0x7f0000002500)='./file0/bus\x00', 0xcebb6074bb566d03) r0 = open$dir(&(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000180)={[{@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@redirect_dir={'redirect_dir', 0x3d, './file0/bus'}}], [{@dont_hash='dont_hash'}]}) fcntl$lock(r0, 0x26, &(0x7f0000000040)) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x1000011, r0, 0x0) 23:31:43 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x540f, 0x20000002) 23:31:43 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r1, r0, r0}, &(0x7f0000000140)=""/243, 0xf3, &(0x7f0000000080)={&(0x7f0000000300)={'poly1305-generic\x00'}, 0x0, 0x2}) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000280)=0x6) r3 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x7, 0x8400) ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000340)=0x5) ioctl$RTC_VL_READ(r3, 0x80047013, &(0x7f0000000240)) [ 648.137873][ T26] audit: type=1804 audit(1561851103.826:72): pid=13751 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir681974846/syzkaller.6xipfb/483/file0/bus" dev="sda1" ino=16837 res=1 [ 648.163494][T13745] overlayfs: unrecognized mount option "dont_hash" or missing value 23:31:43 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 648.225586][T13758] overlayfs: unrecognized mount option "dont_hash" or missing value [ 648.229609][ T26] audit: type=1804 audit(1561851103.916:73): pid=13751 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir681974846/syzkaller.6xipfb/483/file0/bus" dev="ramfs" ino=82666 res=1 23:31:44 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="ca99"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, 0x0}], 0xaaaaafe, 0x0, 0x0, 0xffffffffffffffdd) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f00000004c0)={0x4e, "a2cc4395621c2a33c0d4c9b568f97e70967963f9eac4d49b94890a52b029b876b67cb855a6559a888b8b62b89f49a5c00c3e07dc761afca408151a47d11b152a216aabc855969f411406dc23c94b"}) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000800)=[@textreal={0x8, &(0x7f0000000780)="0f0fbf00001c0fc76b78ba2100b0f2eebaf80c66b8184fd28d66efbafc0cedf0193c0f20d86635200000000f22d8ba2000b80080ef66b9bb08000066b8a3d3000066ba000000000f300f01d10f20e06635010000000f22e0", 0x58}], 0x1, 0x1, &(0x7f0000000840)=[@cstype3={0x5, 0x3}], 0x1) pipe(&(0x7f0000000580)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000740)={0xc, 0x8, 0xfa00, {&(0x7f00000005c0)}}, 0x10) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, 0x0) r4 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x80000001, 0x200) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, &(0x7f0000000540)={0x85, 0x1000}) recvmsg$kcm(r4, &(0x7f0000000480)={0xfffffffffffffffd, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/64, 0x40}, {&(0x7f00000000c0)=""/45, 0x2d}, {&(0x7f0000000180)=""/95, 0x5f}, {&(0x7f0000000200)=""/187, 0xbb}, {&(0x7f0000000100)=""/17, 0x11}, {&(0x7f0000000300)=""/186, 0xba}], 0x6, &(0x7f0000000440)=""/23, 0x17}, 0x20) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:31:44 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0xe4ffffff, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:44 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x541b, 0x20000002) 23:31:44 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x113}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x4, r1, 0x10, 0x1, @in6={0xa, 0x4e20, 0x36, @remote, 0x41b}}}, 0xa0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000f76f1a4e000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x2000000) r3 = syz_open_dev$media(0x0, 0x0, 0x40000) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r0, 0x0, 0x4004848) setsockopt$RDS_CANCEL_SENT_TO(r3, 0x114, 0x1, 0x0, 0x0) 23:31:44 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:44 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0xec000000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x60, 0x0) setsockopt$inet6_buf(r2, 0x29, 0xef, &(0x7f0000000080)="0263cff0a1caa3c2f8cefe4617a7db9b870684d3820060752c310d0ce33accc354161b79d39e9a9d0457a50f63bebfb0c0467fafdf5e93601605b46f2b6c484b24dc8d2f398f", 0x46) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1f000018}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="20042900000000050041000000100013756470010100000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x84}, 0x4) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae89, &(0x7f0000000280)={0x7a, 0x0, [0x40000108], [0xc1]}) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r2, 0xc0305602, &(0x7f0000000100)={0x0, 0x100000000, 0x201e}) ioctl$VIDIOC_G_STD(r2, 0x80085617, &(0x7f0000000140)=0x0) ioctl$VIDIOC_S_STD(r2, 0x40085618, &(0x7f0000000180)=r5) 23:31:44 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x5421, 0x20000002) 23:31:44 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) sendfile(r0, r0, &(0x7f0000000000), 0xffffffffffffffff) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(0x0, &(0x7f00000004c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000140), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) getpgrp(0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x580b6feac4af796a) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x0, 0x10000, 0x26}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2003, 0xd, 0xd00, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x51000, 0x0, 0x0, 0x200, 0x0, 0x0, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x0, 0x0, 0x0, 0x8880}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000200)=ANY=[@ANYBLOB="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"]) rt_tgsigqueueinfo(r1, r1, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) 23:31:44 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:44 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create(0x9) mount$9p_fd(0x0, &(0x7f0000000040)='.\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',\x00']) connect$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x8, {0xfff, 0x8, 0x6, 0x2, 0xb7, 0x3}, 0x1f, 0x3}, 0xe) write$FUSE_LSEEK(r1, &(0x7f00000000c0)={0x18}, 0x18) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000100)=0x60, 0x2) 23:31:44 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x5432, 0x20000002) [ 649.395395][T13837] 9pnet: Insufficient options for proto=fd 23:31:45 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000053c0)='/dev/bus/usb/00#/00#\x00', 0x81, 0x400) getsockname$packet(0xffffffffffffffff, &(0x7f0000005400)={0x11, 0x0, 0x0}, &(0x7f0000005440)=0x14) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000005480)={r1, 0x9, 0x1, 0x7, 0x0, 0x3, 0x6}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) userfaultfd(0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x40, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x3) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000380)={&(0x7f00000004c0)=ANY=[@ANYBLOB="7c0d974f02fb79051ec0e45847d7f801d19f6d6390f69fd9644cbee4a9926180dc143e3025fef5d871ef6ffc22feb1b34c50a4e5ef30f20e8b4a3d199da72011a54510010d659977", @ANYRES16=r3, @ANYBLOB="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"], 0x1ec}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) getpgid(0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000400)) r4 = fcntl$getown(r2, 0x9) syz_open_procfs(r4, &(0x7f0000000480)='net/snmp\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000180)={0x7, 0x0, 0x1, 0x1, 'syz1\x00', 0x7}) unshare(0x20600) pselect6(0x40, &(0x7f00000000c0)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) [ 649.525305][T13839] 9pnet: Insufficient options for proto=fd 23:31:45 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x5433, 0x20000002) 23:31:45 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:45 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000200)=ANY=[@ANYBLOB="672fc13e941755bd000000000c0000000c0000000400000002000000000000080000c5a789806100075df224062cf7d55892303ba9a9fe6bf40e9ac2efccd186473134351451ca81b4c7d6372397aabb8e4c49c663a85ae76e27c5b2f9e08a7ffc1f110679534607ac8f6f0510e715106aa8f01e1d7c2a9d063c8c9dce977aadbb561492d6a26d7e3e9495d2e3f02025af9c6c0cc3e70a45daa2d8d04215f6e25370a5673104ef4fe60280964bde7a7dcea2680d607e74cde5b235bcbc6d742a81e050c51cb2f00ef7d565cde9ca800eb245944a318eddda76990598e03e20867cd9f3181a725c2e71"], 0x0, 0x28}, 0x20) r1 = fcntl$getown(r0, 0x9) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8, 0x40) ioctl$SIOCRSSCAUSE(r2, 0x89e1, &(0x7f00000000c0)=0x101) r3 = getpgrp(r1) migrate_pages(r3, 0xfffffffffffffffd, &(0x7f0000000040)=0x101, &(0x7f0000000080)=0xe36) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r0, 0x10, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r4, 0x4) getpgrp(r1) 23:31:45 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0xf2030000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:45 executing program 0: r0 = userfaultfd(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x40}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000240)={{&(0x7f00002d3000/0x1000)=nil, 0x1000}, 0x1}) read(r0, &(0x7f00000000c0)=""/128, 0x80) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x4, 0x8031, 0xffffffffffffffff, 0x0) r2 = dup3(r1, r0, 0x0) setsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, 0x0, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000000, 0x48010, r2, 0x0) 23:31:45 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x5450, 0x20000002) 23:31:45 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00\xc30\xd6\xc0$\b\xdfV\xe1;', 0x4) fcntl$addseals(r0, 0x40a, 0x8) [ 650.098019][T13881] [ 650.100414][T13881] ===================================================== [ 650.107358][T13881] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 650.114903][T13881] 5.2.0-rc6-next-20190628 #25 Not tainted [ 650.120646][T13881] ----------------------------------------------------- [ 650.127679][T13881] syz-executor.0/13881 [HC0[0]:SC0[0]:HE0:SE1] is trying to acquire: [ 650.135746][T13881] 00000000c44526b3 (&ctx->fault_pending_wqh){+.+.}, at: userfaultfd_read+0x54d/0x1940 [ 650.145399][T13881] [ 650.145399][T13881] and this task is already holding: [ 650.152774][T13881] 0000000003c98e34 (&ctx->fd_wqh){....}, at: userfaultfd_read+0x27a/0x1940 [ 650.161486][T13881] which would create a new lock dependency: [ 650.167493][T13881] (&ctx->fd_wqh){....} -> (&ctx->fault_pending_wqh){+.+.} [ 650.174802][T13881] [ 650.174802][T13881] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 650.184248][T13881] (&(&ctx->ctx_lock)->rlock){..-.} [ 650.184262][T13881] [ 650.184262][T13881] ... which became SOFTIRQ-irq-safe at: [ 650.197199][T13881] lock_acquire+0x190/0x410 [ 650.201800][T13881] _raw_spin_lock_irq+0x60/0x80 [ 650.206742][T13881] free_ioctx_users+0x2d/0x490 [ 650.211604][T13881] percpu_ref_switch_to_atomic_rcu+0x4c0/0x570 [ 650.218048][T13881] rcu_core+0x67f/0x1580 [ 650.222385][T13881] rcu_core_si+0x9/0x10 [ 650.226632][T13881] __do_softirq+0x262/0x98c [ 650.231388][T13881] irq_exit+0x19b/0x1e0 [ 650.235646][T13881] smp_apic_timer_interrupt+0x1a3/0x610 [ 650.241284][T13881] apic_timer_interrupt+0xf/0x20 [ 650.246360][T13881] __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 650.252675][T13881] copy_page_range+0xacb/0x2000 [ 650.257676][T13881] dup_mm+0xa67/0x1430 [ 650.261847][T13881] copy_process+0x28b7/0x6a90 [ 650.266816][T13881] _do_fork+0x146/0xfa0 [ 650.271063][T13881] __x64_sys_clone+0x186/0x250 [ 650.275947][T13881] do_syscall_64+0xfd/0x6a0 [ 650.280549][T13881] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 650.286546][T13881] [ 650.286546][T13881] to a SOFTIRQ-irq-unsafe lock: [ 650.293658][T13881] (&ctx->fault_pending_wqh){+.+.} [ 650.293674][T13881] [ 650.293674][T13881] ... which became SOFTIRQ-irq-unsafe at: [ 650.306744][T13881] ... [ 650.306773][T13881] lock_acquire+0x190/0x410 [ 650.314115][T13881] _raw_spin_lock+0x2f/0x40 [ 650.318707][T13881] userfaultfd_release+0x4ca/0x710 [ 650.323906][T13881] __fput+0x2ff/0x890 [ 650.327999][T13881] ____fput+0x16/0x20 [ 650.332125][T13881] task_work_run+0x145/0x1c0 [ 650.336824][T13881] exit_to_usermode_loop+0x280/0x2d0 [ 650.342205][T13881] do_syscall_64+0x5a9/0x6a0 [ 650.347005][T13881] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 650.353051][T13881] [ 650.353051][T13881] other info that might help us debug this: [ 650.353051][T13881] [ 650.363280][T13881] Chain exists of: [ 650.363280][T13881] &(&ctx->ctx_lock)->rlock --> &ctx->fd_wqh --> &ctx->fault_pending_wqh [ 650.363280][T13881] [ 650.377526][T13881] Possible interrupt unsafe locking scenario: [ 650.377526][T13881] [ 650.385853][T13881] CPU0 CPU1 [ 650.391221][T13881] ---- ---- [ 650.396588][T13881] lock(&ctx->fault_pending_wqh); [ 650.401702][T13881] local_irq_disable(); [ 650.408457][T13881] lock(&(&ctx->ctx_lock)->rlock); [ 650.416451][T13881] lock(&ctx->fd_wqh); [ 650.423133][T13881] [ 650.426760][T13881] lock(&(&ctx->ctx_lock)->rlock); [ 650.432147][T13881] [ 650.432147][T13881] *** DEADLOCK *** [ 650.432147][T13881] [ 650.440305][T13881] 1 lock held by syz-executor.0/13881: [ 650.445772][T13881] #0: 0000000003c98e34 (&ctx->fd_wqh){....}, at: userfaultfd_read+0x27a/0x1940 [ 650.454873][T13881] [ 650.454873][T13881] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 650.465298][T13881] -> (&(&ctx->ctx_lock)->rlock){..-.} { [ 650.470944][T13881] IN-SOFTIRQ-W at: [ 650.475127][T13881] lock_acquire+0x190/0x410 [ 650.481469][T13881] _raw_spin_lock_irq+0x60/0x80 [ 650.488203][T13881] free_ioctx_users+0x2d/0x490 [ 650.494814][T13881] percpu_ref_switch_to_atomic_rcu+0x4c0/0x570 [ 650.502937][T13881] rcu_core+0x67f/0x1580 [ 650.509021][T13881] rcu_core_si+0x9/0x10 [ 650.515019][T13881] __do_softirq+0x262/0x98c [ 650.521357][T13881] irq_exit+0x19b/0x1e0 [ 650.527376][T13881] smp_apic_timer_interrupt+0x1a3/0x610 [ 650.534762][T13881] apic_timer_interrupt+0xf/0x20 [ 650.541545][T13881] __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 650.549546][T13881] copy_page_range+0xacb/0x2000 [ 650.556241][T13881] dup_mm+0xa67/0x1430 [ 650.562151][T13881] copy_process+0x28b7/0x6a90 [ 650.568666][T13881] _do_fork+0x146/0xfa0 [ 650.574692][T13881] __x64_sys_clone+0x186/0x250 [ 650.581298][T13881] do_syscall_64+0xfd/0x6a0 [ 650.587759][T13881] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 650.595474][T13881] INITIAL USE at: [ 650.599476][T13881] lock_acquire+0x190/0x410 [ 650.605824][T13881] _raw_spin_lock_irq+0x60/0x80 [ 650.612425][T13881] io_submit_one+0xeb5/0x2ef0 [ 650.618878][T13881] __x64_sys_io_submit+0x1bd/0x570 [ 650.625748][T13881] do_syscall_64+0xfd/0x6a0 [ 650.632012][T13881] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 650.639649][T13881] } [ 650.642348][T13881] ... key at: [] __key.53845+0x0/0x40 [ 650.649896][T13881] ... acquired at: [ 650.653897][T13881] _raw_spin_lock+0x2f/0x40 [ 650.658585][T13881] io_submit_one+0xefa/0x2ef0 [ 650.663626][T13881] __x64_sys_io_submit+0x1bd/0x570 [ 650.668937][T13881] do_syscall_64+0xfd/0x6a0 [ 650.673632][T13881] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 650.679692][T13881] [ 650.682020][T13881] -> (&ctx->fd_wqh){....} { [ 650.686543][T13881] INITIAL USE at: [ 650.690640][T13881] lock_acquire+0x190/0x410 [ 650.696878][T13881] _raw_spin_lock_irqsave+0x95/0xcd [ 650.703730][T13881] __wake_up_common_lock+0xc8/0x150 [ 650.710511][T13881] __wake_up+0xe/0x10 [ 650.716082][T13881] userfaultfd_release+0x528/0x710 [ 650.722777][T13881] __fput+0x2ff/0x890 [ 650.728334][T13881] ____fput+0x16/0x20 [ 650.733893][T13881] task_work_run+0x145/0x1c0 [ 650.740191][T13881] exit_to_usermode_loop+0x280/0x2d0 [ 650.747068][T13881] do_syscall_64+0x5a9/0x6a0 [ 650.753341][T13881] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 650.760883][T13881] } [ 650.763409][T13881] ... key at: [] __key.46560+0x0/0x40 [ 650.770861][T13881] ... acquired at: [ 650.774771][T13881] lock_acquire+0x190/0x410 [ 650.779459][T13881] _raw_spin_lock+0x2f/0x40 [ 650.784177][T13881] userfaultfd_read+0x54d/0x1940 [ 650.789307][T13881] __vfs_read+0x8a/0x110 [ 650.793823][T13881] vfs_read+0x1f0/0x440 [ 650.798250][T13881] ksys_read+0x14f/0x290 [ 650.802679][T13881] __x64_sys_read+0x73/0xb0 [ 650.807554][T13881] do_syscall_64+0xfd/0x6a0 [ 650.812247][T13881] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 650.818312][T13881] [ 650.820699][T13881] [ 650.820699][T13881] the dependencies between the lock to be acquired [ 650.820705][T13881] and SOFTIRQ-irq-unsafe lock: [ 650.834317][T13881] -> (&ctx->fault_pending_wqh){+.+.} { [ 650.839791][T13881] HARDIRQ-ON-W at: [ 650.843885][T13881] lock_acquire+0x190/0x410 [ 650.850054][T13881] _raw_spin_lock+0x2f/0x40 [ 650.856246][T13881] userfaultfd_release+0x4ca/0x710 [ 650.863025][T13881] __fput+0x2ff/0x890 [ 650.868677][T13881] ____fput+0x16/0x20 [ 650.874350][T13881] task_work_run+0x145/0x1c0 [ 650.880615][T13881] exit_to_usermode_loop+0x280/0x2d0 [ 650.887740][T13881] do_syscall_64+0x5a9/0x6a0 [ 650.894006][T13881] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 650.901543][T13881] SOFTIRQ-ON-W at: [ 650.905546][T13881] lock_acquire+0x190/0x410 [ 650.916308][T13881] _raw_spin_lock+0x2f/0x40 [ 650.922475][T13881] userfaultfd_release+0x4ca/0x710 [ 650.929251][T13881] __fput+0x2ff/0x890 [ 650.934899][T13881] ____fput+0x16/0x20 [ 650.940544][T13881] task_work_run+0x145/0x1c0 [ 650.946890][T13881] exit_to_usermode_loop+0x280/0x2d0 [ 650.953839][T13881] do_syscall_64+0x5a9/0x6a0 [ 650.960121][T13881] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 650.967750][T13881] INITIAL USE at: [ 650.971662][T13881] lock_acquire+0x190/0x410 [ 650.977847][T13881] _raw_spin_lock+0x2f/0x40 [ 650.983925][T13881] userfaultfd_release+0x4ca/0x710 [ 650.990612][T13881] __fput+0x2ff/0x890 [ 650.996167][T13881] ____fput+0x16/0x20 [ 651.001720][T13881] task_work_run+0x145/0x1c0 [ 651.007887][T13881] exit_to_usermode_loop+0x280/0x2d0 [ 651.014838][T13881] do_syscall_64+0x5a9/0x6a0 [ 651.021011][T13881] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 651.028681][T13881] } [ 651.031204][T13881] ... key at: [] __key.46557+0x0/0x40 [ 651.038939][T13881] ... acquired at: [ 651.042763][T13881] lock_acquire+0x190/0x410 [ 651.047618][T13881] _raw_spin_lock+0x2f/0x40 [ 651.052295][T13881] userfaultfd_read+0x54d/0x1940 [ 651.057429][T13881] __vfs_read+0x8a/0x110 [ 651.061846][T13881] vfs_read+0x1f0/0x440 [ 651.066381][T13881] ksys_read+0x14f/0x290 [ 651.070886][T13881] __x64_sys_read+0x73/0xb0 [ 651.075569][T13881] do_syscall_64+0xfd/0x6a0 [ 651.080341][T13881] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 651.086397][T13881] [ 651.088716][T13881] [ 651.088716][T13881] stack backtrace: [ 651.094625][T13881] CPU: 0 PID: 13881 Comm: syz-executor.0 Not tainted 5.2.0-rc6-next-20190628 #25 [ 651.103728][T13881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 651.113875][T13881] Call Trace: [ 651.117180][T13881] dump_stack+0x172/0x1f0 [ 651.121571][T13881] check_irq_usage.cold+0x5b4/0x72e [ 651.126789][T13881] ? check_usage_forwards+0x330/0x330 [ 651.132169][T13881] ? __schedule+0x75d/0x1580 [ 651.136769][T13881] ? check_path+0x26/0x40 [ 651.141105][T13881] ? kasan_check_read+0x11/0x20 [ 651.145975][T13881] ? check_noncircular+0x16a/0x3e0 [ 651.151097][T13881] ? print_circular_bug+0x200/0x200 [ 651.156306][T13881] ? __lockdep_reset_lock+0x450/0x450 [ 651.161706][T13881] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 651.167993][T13881] __lock_acquire+0x25bd/0x4c20 [ 651.172859][T13881] ? __lock_acquire+0x25bd/0x4c20 [ 651.177902][T13881] ? refcount_sub_and_test_checked+0x154/0x200 [ 651.184096][T13881] ? mark_held_locks+0xf0/0xf0 [ 651.188874][T13881] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 651.194783][T13881] lock_acquire+0x190/0x410 [ 651.199296][T13881] ? userfaultfd_read+0x54d/0x1940 [ 651.204416][T13881] _raw_spin_lock+0x2f/0x40 [ 651.208942][T13881] ? userfaultfd_read+0x54d/0x1940 [ 651.214067][T13881] userfaultfd_read+0x54d/0x1940 [ 651.219041][T13881] ? userfaultfd_release+0x710/0x710 [ 651.224343][T13881] ? fsnotify_first_mark+0x210/0x210 [ 651.229636][T13881] ? __fget+0x384/0x560 [ 651.233791][T13881] ? wake_up_q+0xf0/0xf0 [ 651.238043][T13881] ? security_file_permission+0x8f/0x380 [ 651.243775][T13881] __vfs_read+0x8a/0x110 [ 651.248038][T13881] ? userfaultfd_release+0x710/0x710 [ 651.253329][T13881] vfs_read+0x1f0/0x440 [ 651.257513][T13881] ksys_read+0x14f/0x290 [ 651.261939][T13881] ? kernel_write+0x130/0x130 [ 651.266623][T13881] ? do_syscall_64+0x26/0x6a0 [ 651.271306][T13881] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 651.277461][T13881] ? do_syscall_64+0x26/0x6a0 [ 651.282147][T13881] __x64_sys_read+0x73/0xb0 [ 651.286674][T13881] do_syscall_64+0xfd/0x6a0 [ 651.291188][T13881] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 651.297091][T13881] RIP: 0033:0x459519 [ 651.300998][T13881] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 651.320605][T13881] RSP: 002b:00007f5c53892c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 651.329026][T13881] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459519 [ 651.337007][T13881] RDX: 0000000000000080 RSI: 00000000200000c0 RDI: 0000000000000003 23:31:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xf, 0x72, 0xa, 0xff00}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x6, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0xdf, 0x101000) ioctl$KVM_IRQ_LINE_STATUS(r0, 0xc008ae67, &(0x7f0000000140)={0x80000001, 0x7}) [ 651.344994][T13881] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 651.361137][T13881] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5c538936d4 [ 651.369220][T13881] R13: 00000000004c55fd R14: 00000000004db678 R15: 00000000ffffffff [ 651.383229][T13872] kobject: 'þ€' (00000000cabed3d1): kobject_uevent_env [ 651.388363][ T3879] kobject: 'loop5' (0000000071821e81): kobject_uevent_env [ 651.408023][T13872] kobject: 'þ€' (00000000cabed3d1): fill_kobj_path: path = '/devices/virtual/net/þ€' [ 651.411244][ T3879] kobject: 'loop5' (0000000071821e81): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 651.424322][T13872] kobject: 'queues' (00000000680b1460): kobject_add_internal: parent: 'þ€', set: '' [ 651.450627][T13861] kobject: 'loop2' (000000006a2e5baa): kobject_uevent_env 23:31:47 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00\xc30\xd6\xc0$\b\xdfV\xe1;', 0x4) fcntl$addseals(r0, 0x40a, 0x8) [ 651.464994][T13861] kobject: 'loop2' (000000006a2e5baa): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 651.476063][T13872] kobject: 'queues' (00000000680b1460): kobject_uevent_env 23:31:47 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 651.543371][T13872] kobject: 'queues' (00000000680b1460): kobject_uevent_env: filter function caused the event to drop! [ 651.576537][T13872] kobject: 'rx-0' (000000005aa5c6f5): kobject_add_internal: parent: 'queues', set: 'queues' 23:31:47 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00\xc30\xd6\xc0$\b\xdfV\xe1;', 0x4) fcntl$addseals(r0, 0x40a, 0x8) 23:31:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xf, 0x72, 0xa, 0xff00}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x6, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0xdf, 0x101000) ioctl$KVM_IRQ_LINE_STATUS(r0, 0xc008ae67, &(0x7f0000000140)={0x80000001, 0x7}) [ 651.591701][ T3879] kobject: 'loop2' (000000006a2e5baa): kobject_uevent_env [ 651.604127][ T3879] kobject: 'loop2' (000000006a2e5baa): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 651.623138][T13872] kobject: 'rx-0' (000000005aa5c6f5): kobject_uevent_env 23:31:47 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x5451, 0x20000002) [ 651.664079][T13872] kobject: 'rx-0' (000000005aa5c6f5): fill_kobj_path: path = '/devices/virtual/net/þ€/queues/rx-0' [ 651.686861][ T3879] kobject: 'loop1' (000000005ba54b96): kobject_uevent_env 23:31:47 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00\xc30\xd6\xc0$\b\xdfV\xe1;', 0x4) fcntl$addseals(r0, 0x40a, 0x8) [ 651.706742][ T3879] kobject: 'loop1' (000000005ba54b96): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 651.724887][T13905] kobject: 'loop2' (000000006a2e5baa): kobject_uevent_env [ 651.733537][T13872] kobject: 'tx-0' (0000000040c861ae): kobject_add_internal: parent: 'queues', set: 'queues' [ 651.740911][T13905] kobject: 'loop2' (000000006a2e5baa): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 651.765500][ T3879] kobject: 'loop5' (0000000071821e81): kobject_uevent_env [ 651.798049][T13872] kobject: 'tx-0' (0000000040c861ae): kobject_uevent_env [ 651.810202][ T3879] kobject: 'loop5' (0000000071821e81): fill_kobj_path: path = '/devices/virtual/block/loop5' 23:31:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xf, 0x72, 0xa, 0xff00}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x6, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0xdf, 0x101000) ioctl$KVM_IRQ_LINE_STATUS(r0, 0xc008ae67, &(0x7f0000000140)={0x80000001, 0x7}) [ 651.838457][T13872] kobject: 'tx-0' (0000000040c861ae): fill_kobj_path: path = '/devices/virtual/net/þ€/queues/tx-0' [ 651.900321][T13872] kobject: 'brif' (00000000d2eaadef): kobject_add_internal: parent: 'þ€', set: '' [ 651.938636][ T3879] kobject: 'loop2' (000000006a2e5baa): kobject_uevent_env 23:31:47 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0xfc020000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 651.950356][ T3879] kobject: 'loop2' (000000006a2e5baa): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 651.979399][T13872] kobject: 'batman_adv' (00000000d061adc5): kobject_add_internal: parent: 'þ€', set: '' [ 651.990758][T13915] kobject: 'loop2' (000000006a2e5baa): kobject_uevent_env 23:31:47 executing program 0: r0 = userfaultfd(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x40}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000240)={{&(0x7f00002d3000/0x1000)=nil, 0x1000}, 0x1}) read(r0, &(0x7f00000000c0)=""/128, 0x80) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x4, 0x8031, 0xffffffffffffffff, 0x0) r2 = dup3(r1, r0, 0x0) setsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, 0x0, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000000, 0x48010, r2, 0x0) 23:31:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xf, 0x72, 0xa, 0xff00}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x6, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0xdf, 0x101000) ioctl$KVM_IRQ_LINE_STATUS(r0, 0xc008ae67, &(0x7f0000000140)={0x80000001, 0x7}) 23:31:47 executing program 3: memfd_create(&(0x7f0000000080)='\x00\xc30\xd6\xc0$\b\xdfV\xe1;', 0x4) 23:31:47 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x5452, 0x20000002) [ 652.028564][T13915] kobject: 'loop2' (000000006a2e5baa): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 652.058491][ T3879] kobject: 'loop1' (000000005ba54b96): kobject_uevent_env 23:31:47 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\xff', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:47 executing program 3: memfd_create(0x0, 0x4) [ 652.098748][ T3879] kobject: 'loop1' (000000005ba54b96): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 652.134327][T13937] kobject: 'brif' (00000000d2eaadef): kobject_cleanup, parent 00000000cabed3d1 [ 652.151082][T13937] kobject: 'brif' (00000000d2eaadef): auto cleanup kobject_del [ 652.181783][ T3879] kobject: 'loop5' (0000000071821e81): kobject_uevent_env [ 652.188975][ T3879] kobject: 'loop5' (0000000071821e81): fill_kobj_path: path = '/devices/virtual/block/loop5' 23:31:47 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x5460, 0x20000002) 23:31:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xf, 0x72, 0xa, 0xff00}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x6, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0xdf, 0x101000) [ 652.191911][T13937] kobject: 'brif' (00000000d2eaadef): calling ktype release 23:31:47 executing program 3: memfd_create(0x0, 0x4) [ 652.259956][T13949] kobject: 'loop2' (000000006a2e5baa): kobject_uevent_env [ 652.273574][T13937] kobject: (00000000d2eaadef): dynamic_kobj_release [ 652.285885][ T3879] kobject: 'loop4' (0000000048b0d411): kobject_uevent_env [ 652.296207][T13949] kobject: 'loop2' (000000006a2e5baa): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 652.308794][ T3879] kobject: 'loop4' (0000000048b0d411): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 652.309475][T13937] kobject: 'brif': free name [ 652.324700][ T3879] kobject: 'loop0' (000000003f61b277): kobject_uevent_env 23:31:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xf, 0x72, 0xa, 0xff00}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x6, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) [ 652.364716][ T3879] kobject: 'loop0' (000000003f61b277): fill_kobj_path: path = '/devices/virtual/block/loop0' 23:31:48 executing program 3: memfd_create(0x0, 0x4) [ 652.421990][T13937] kobject: 'batman_adv' (00000000d061adc5): kobject_uevent_env [ 652.426757][ T3879] kobject: 'loop1' (000000005ba54b96): kobject_uevent_env [ 652.454538][T13937] kobject: 'batman_adv' (00000000d061adc5): kobject_uevent_env: filter function caused the event to drop! [ 652.485624][ T3879] kobject: 'loop1' (000000005ba54b96): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 652.517041][T13937] kobject: 'batman_adv' (00000000d061adc5): kobject_cleanup, parent 0000000053895139 [ 652.544369][ T3879] kobject: 'loop2' (000000006a2e5baa): kobject_uevent_env [ 652.560282][T13937] kobject: 'batman_adv' (00000000d061adc5): calling ktype release [ 652.562911][ T3879] kobject: 'loop2' (000000006a2e5baa): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 652.579984][T13937] kobject: (00000000d061adc5): dynamic_kobj_release [ 652.590275][ T3879] kobject: 'loop5' (0000000071821e81): kobject_uevent_env [ 652.593060][T13937] kobject: 'batman_adv': free name [ 652.602990][ T3879] kobject: 'loop5' (0000000071821e81): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 652.614636][T13961] kobject: 'loop2' (000000006a2e5baa): kobject_uevent_env [ 652.633338][T13961] kobject: 'loop2' (000000006a2e5baa): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 652.700986][T13937] kobject: 'rx-0' (000000005aa5c6f5): kobject_cleanup, parent 00000000680b1460 [ 652.722024][ T3879] kobject: 'loop2' (000000006a2e5baa): kobject_uevent_env [ 652.729217][ T3879] kobject: 'loop2' (000000006a2e5baa): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 652.763025][T13937] kobject: 'rx-0' (000000005aa5c6f5): auto cleanup 'remove' event [ 652.779717][T13937] kobject: 'rx-0' (000000005aa5c6f5): kobject_uevent_env [ 652.796122][ T3879] kobject: 'loop0' (000000003f61b277): kobject_uevent_env [ 652.806654][T13937] kobject: 'rx-0' (000000005aa5c6f5): fill_kobj_path: path = '/devices/virtual/net/þ€/queues/rx-0' [ 652.818329][ T3879] kobject: 'loop0' (000000003f61b277): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 652.830786][T13937] kobject: 'rx-0' (000000005aa5c6f5): auto cleanup kobject_del [ 652.839320][T13937] kobject: 'rx-0' (000000005aa5c6f5): calling ktype release [ 652.847254][T13937] kobject: 'rx-0': free name [ 652.852877][T13937] kobject: 'tx-0' (0000000040c861ae): kobject_cleanup, parent 00000000680b1460 [ 652.863065][T13937] kobject: 'tx-0' (0000000040c861ae): auto cleanup 'remove' event [ 652.871457][T13937] kobject: 'tx-0' (0000000040c861ae): kobject_uevent_env [ 652.878702][T13937] kobject: 'tx-0' (0000000040c861ae): fill_kobj_path: path = '/devices/virtual/net/þ€/queues/tx-0' [ 652.889670][T13937] kobject: 'tx-0' (0000000040c861ae): auto cleanup kobject_del [ 652.897416][T13937] kobject: 'tx-0' (0000000040c861ae): calling ktype release [ 652.904909][T13937] kobject: 'tx-0': free name [ 652.909536][T13937] kobject: 'queues' (00000000680b1460): kobject_cleanup, parent 0000000053895139 [ 652.923308][T13937] kobject: 'queues' (00000000680b1460): calling ktype release [ 652.930832][T13937] kobject: 'queues' (00000000680b1460): kset_release [ 652.937628][T13937] kobject: 'queues': free name [ 652.942875][T13937] kobject: 'þ€' (00000000cabed3d1): kobject_uevent_env [ 652.950135][T13937] kobject: 'þ€' (00000000cabed3d1): fill_kobj_path: path = '/devices/virtual/net/þ€' 23:31:48 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0xfd000000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:48 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xf, 0x72, 0xa, 0xff00}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x6, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) 23:31:48 executing program 3: memfd_create(&(0x7f0000000080)='\x00\xc30\xd6\xc0$\b\xdfV\xe1;', 0x0) 23:31:48 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x5609, 0x20000002) 23:31:48 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\xff', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:48 executing program 0: r0 = userfaultfd(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x40}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000240)={{&(0x7f00002d3000/0x1000)=nil, 0x1000}, 0x1}) read(r0, &(0x7f00000000c0)=""/128, 0x80) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x4, 0x8031, 0xffffffffffffffff, 0x0) r2 = dup3(r1, r0, 0x0) setsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, 0x0, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000000, 0x48010, r2, 0x0) [ 652.990849][T13937] kobject: 'þ€' (00000000cabed3d1): kobject_cleanup, parent 0000000053895139 [ 653.000163][T13937] kobject: 'þ€' (00000000cabed3d1): calling ktype release [ 653.007810][T13937] kobject: 'þ€': free name 23:31:48 executing program 3: memfd_create(&(0x7f0000000080)='\x00\xc30\xd6\xc0$\b\xdfV\xe1;', 0x0) 23:31:48 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 653.059642][ T3879] kobject: 'loop4' (0000000048b0d411): kobject_uevent_env [ 653.068415][T13985] kobject: 'loop2' (000000006a2e5baa): kobject_uevent_env [ 653.075788][ T3879] kobject: 'loop4' (0000000048b0d411): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 653.098342][T13985] kobject: 'loop2' (000000006a2e5baa): fill_kobj_path: path = '/devices/virtual/block/loop2' 23:31:48 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x6364, 0x20000002) [ 653.183121][ T3879] kobject: 'loop5' (0000000071821e81): kobject_uevent_env [ 653.201829][ T3879] kobject: 'loop5' (0000000071821e81): fill_kobj_path: path = '/devices/virtual/block/loop5' 23:31:48 executing program 3: memfd_create(&(0x7f0000000080)='\x00\xc30\xd6\xc0$\b\xdfV\xe1;', 0x0) [ 653.244350][ T3879] kobject: 'loop1' (000000005ba54b96): kobject_uevent_env [ 653.282986][ T3879] kobject: 'loop1' (000000005ba54b96): fill_kobj_path: path = '/devices/virtual/block/loop1' 23:31:49 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 653.308249][T13999] kobject: 'þ€' (00000000e80f347c): kobject_add_internal: parent: 'net', set: 'devices' [ 653.334952][ T3879] kobject: 'loop2' (000000006a2e5baa): kobject_uevent_env [ 653.350763][T14001] kobject: 'loop2' (000000006a2e5baa): kobject_uevent_env [ 653.353954][ T3879] kobject: 'loop2' (000000006a2e5baa): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 653.365373][T14001] kobject: 'loop2' (000000006a2e5baa): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 653.384433][T13999] kobject: 'þ€' (00000000e80f347c): kobject_uevent_env 23:31:49 executing program 3: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0xfc020000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) [ 653.408509][T13999] kobject: 'þ€' (00000000e80f347c): fill_kobj_path: path = '/devices/virtual/net/þ€' [ 653.424705][ T3879] kobject: 'loop5' (0000000071821e81): kobject_uevent_env [ 653.436787][T13999] kobject: 'queues' (0000000090218731): kobject_add_internal: parent: 'þ€', set: '' [ 653.447887][ T3879] kobject: 'loop5' (0000000071821e81): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 653.470883][T13999] kobject: 'queues' (0000000090218731): kobject_uevent_env [ 653.485420][ T3879] kobject: 'loop5' (0000000071821e81): kobject_uevent_env [ 653.493395][ T3879] kobject: 'loop5' (0000000071821e81): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 653.515392][T13999] kobject: 'queues' (0000000090218731): kobject_uevent_env: filter function caused the event to drop! [ 653.534657][T13999] kobject: 'rx-0' (00000000a5c353b1): kobject_add_internal: parent: 'queues', set: 'queues' [ 653.577702][T13999] kobject: 'rx-0' (00000000a5c353b1): kobject_uevent_env [ 653.593428][T13999] kobject: 'rx-0' (00000000a5c353b1): fill_kobj_path: path = '/devices/virtual/net/þ€/queues/rx-0' [ 653.618427][T13999] kobject: 'tx-0' (000000008f247e25): kobject_add_internal: parent: 'queues', set: 'queues' [ 653.632390][T13999] kobject: 'tx-0' (000000008f247e25): kobject_uevent_env [ 653.640157][T13999] kobject: 'tx-0' (000000008f247e25): fill_kobj_path: path = '/devices/virtual/net/þ€/queues/tx-0' [ 653.661083][ T3879] kobject: 'loop1' (000000005ba54b96): kobject_uevent_env [ 653.668280][ T3879] kobject: 'loop1' (000000005ba54b96): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 653.694763][T13999] kobject: 'brif' (00000000e9ad6a83): kobject_add_internal: parent: 'þ€', set: '' [ 653.716731][T13999] kobject: 'batman_adv' (0000000039977783): kobject_add_internal: parent: 'þ€', set: '' 23:31:49 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0xfe000000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:49 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\xff', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:49 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) 23:31:49 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x6609, 0x20000002) 23:31:49 executing program 0: r0 = userfaultfd(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x40}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000240)={{&(0x7f00002d3000/0x1000)=nil, 0x1000}, 0x1}) read(r0, &(0x7f00000000c0)=""/128, 0x80) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x4, 0x8031, 0xffffffffffffffff, 0x0) r2 = dup3(r1, r0, 0x0) setsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, 0x0, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000000, 0x48010, r2, 0x0) 23:31:49 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\xff', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 653.759734][ T3879] kobject: 'loop0' (000000003f61b277): kobject_uevent_env [ 653.768383][ T3879] kobject: 'loop0' (000000003f61b277): fill_kobj_path: path = '/devices/virtual/block/loop0' 23:31:49 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xf, 0x72, 0xa, 0xff00}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x6, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) [ 653.844068][T14034] kobject: 'loop3' (000000002104f498): kobject_uevent_env [ 653.844518][ T3879] kobject: 'loop4' (0000000048b0d411): kobject_uevent_env [ 653.852316][T14034] kobject: 'loop3' (000000002104f498): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 653.885158][ T3879] kobject: 'loop4' (0000000048b0d411): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 653.917856][T14040] kobject: 'brif' (00000000e9ad6a83): kobject_cleanup, parent 00000000e80f347c [ 653.932254][T14040] kobject: 'brif' (00000000e9ad6a83): auto cleanup kobject_del [ 653.941836][ T3879] kobject: 'loop5' (0000000071821e81): kobject_uevent_env [ 653.948196][T14036] kobject: 'loop2' (000000006a2e5baa): kobject_uevent_env [ 653.949010][ T3879] kobject: 'loop5' (0000000071821e81): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 653.957275][T14036] kobject: 'loop2' (000000006a2e5baa): fill_kobj_path: path = '/devices/virtual/block/loop2' 23:31:49 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x20000002) [ 653.979876][T14040] kobject: 'brif' (00000000e9ad6a83): calling ktype release [ 653.995348][T14040] kobject: (00000000e9ad6a83): dynamic_kobj_release [ 654.035003][T14040] kobject: 'brif': free name 23:31:49 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xf, 0x72, 0xa, 0xff00}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x6, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) [ 654.113386][ T3879] kobject: 'loop1' (000000005ba54b96): kobject_uevent_env [ 654.127287][T14040] kobject: 'batman_adv' (0000000039977783): kobject_uevent_env [ 654.147137][ T3879] kobject: 'loop1' (000000005ba54b96): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 654.166731][T14040] kobject: 'batman_adv' (0000000039977783): kobject_uevent_env: filter function caused the event to drop! [ 654.188506][ T3879] kobject: 'loop5' (0000000071821e81): kobject_uevent_env [ 654.205236][ T3879] kobject: 'loop5' (0000000071821e81): fill_kobj_path: path = '/devices/virtual/block/loop5' 23:31:49 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xf, 0x72, 0xa, 0xff00}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x6, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) 23:31:49 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x6611, 0x20000002) [ 654.216663][T14058] kobject: 'loop2' (000000006a2e5baa): kobject_uevent_env [ 654.224766][T14040] kobject: 'batman_adv' (0000000039977783): kobject_cleanup, parent 0000000053895139 [ 654.237363][T14058] kobject: 'loop2' (000000006a2e5baa): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 654.248368][ T3879] kobject: 'loop2' (000000006a2e5baa): kobject_uevent_env [ 654.259363][T14040] kobject: 'batman_adv' (0000000039977783): calling ktype release [ 654.267845][ T3879] kobject: 'loop2' (000000006a2e5baa): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 654.278645][T14040] kobject: (0000000039977783): dynamic_kobj_release [ 654.312881][T14040] kobject: 'batman_adv': free name 23:31:50 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\xff', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 654.334132][ T3879] kobject: 'loop5' (0000000071821e81): kobject_uevent_env [ 654.360587][T14057] kobject: 'loop3' (000000002104f498): kobject_uevent_env [ 654.367888][T14057] kobject: 'loop3' (000000002104f498): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 654.384106][T14040] kobject: 'rx-0' (00000000a5c353b1): kobject_cleanup, parent 0000000090218731 [ 654.390557][ T3879] kobject: 'loop5' (0000000071821e81): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 654.427662][ T3879] kobject: 'loop1' (000000005ba54b96): kobject_uevent_env [ 654.433183][T14040] kobject: 'rx-0' (00000000a5c353b1): auto cleanup 'remove' event [ 654.463221][ T3879] kobject: 'loop1' (000000005ba54b96): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 654.474706][T14040] kobject: 'rx-0' (00000000a5c353b1): kobject_uevent_env [ 654.486286][T14069] kobject: 'loop2' (000000006a2e5baa): kobject_uevent_env [ 654.498548][T14069] kobject: 'loop2' (000000006a2e5baa): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 654.514364][T14040] kobject: 'rx-0' (00000000a5c353b1): fill_kobj_path: path = '/devices/virtual/net/þ€/queues/rx-0' [ 654.574523][T14040] kobject: 'rx-0' (00000000a5c353b1): auto cleanup kobject_del [ 654.622852][T14040] kobject: 'rx-0' (00000000a5c353b1): calling ktype release [ 654.646169][T14040] kobject: 'rx-0': free name [ 654.686830][T14040] kobject: 'tx-0' (000000008f247e25): kobject_cleanup, parent 0000000090218731 [ 654.702556][T14040] kobject: 'tx-0' (000000008f247e25): auto cleanup 'remove' event [ 654.712018][ T3879] kobject: 'loop0' (000000003f61b277): kobject_uevent_env [ 654.719185][ T3879] kobject: 'loop0' (000000003f61b277): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 654.724028][T14040] kobject: 'tx-0' (000000008f247e25): kobject_uevent_env [ 654.763118][T14040] kobject: 'tx-0' (000000008f247e25): fill_kobj_path: path = '/devices/virtual/net/þ€/queues/tx-0' [ 654.774527][T14082] kobject: 'loop2' (000000006a2e5baa): kobject_uevent_env [ 654.789225][T14082] kobject: 'loop2' (000000006a2e5baa): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 654.795862][T14040] kobject: 'tx-0' (000000008f247e25): auto cleanup kobject_del [ 654.819340][T14040] kobject: 'tx-0' (000000008f247e25): calling ktype release [ 654.836579][ T3879] kobject: 'loop2' (000000006a2e5baa): kobject_uevent_env [ 654.844163][T14040] kobject: 'tx-0': free name [ 654.849003][ T3879] kobject: 'loop2' (000000006a2e5baa): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 654.861153][T14040] kobject: 'queues' (0000000090218731): kobject_cleanup, parent 0000000053895139 [ 654.870302][T14040] kobject: 'queues' (0000000090218731): calling ktype release [ 654.878689][T14040] kobject: 'queues' (0000000090218731): kset_release [ 654.886089][T14040] kobject: 'queues': free name [ 654.891287][T14040] kobject: 'þ€' (00000000e80f347c): kobject_uevent_env [ 654.898193][T14040] kobject: 'þ€' (00000000e80f347c): fill_kobj_path: path = '/devices/virtual/net/þ€' 23:31:50 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0xfeff0000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:50 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x6, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 23:31:50 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x6612, 0x20000002) 23:31:50 executing program 0: r0 = userfaultfd(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x40}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000240)={{&(0x7f00002d3000/0x1000)=nil, 0x1000}, 0x1}) read(r0, &(0x7f00000000c0)=""/128, 0x80) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x4, 0x8031, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) setsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, 0x0, 0x0) 23:31:50 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\xff', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:50 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\xff', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 654.980982][T14040] kobject: 'þ€' (00000000e80f347c): kobject_cleanup, parent 0000000053895139 [ 654.990149][T14040] kobject: 'þ€' (00000000e80f347c): calling ktype release [ 654.997636][T14040] kobject: 'þ€': free name 23:31:50 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x6, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 655.051003][ T3879] kobject: 'loop4' (0000000048b0d411): kobject_uevent_env [ 655.058205][ T3879] kobject: 'loop4' (0000000048b0d411): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 655.083404][T14099] kobject: 'loop2' (000000006a2e5baa): kobject_uevent_env 23:31:50 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x8912, 0x20000002) [ 655.104551][T14099] kobject: 'loop2' (000000006a2e5baa): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 655.130750][T14097] kobject: 'loop3' (000000002104f498): kobject_uevent_env [ 655.138370][T14097] kobject: 'loop3' (000000002104f498): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 655.187078][ T3879] kobject: 'loop5' (0000000071821e81): kobject_uevent_env [ 655.230935][ T3879] kobject: 'loop5' (0000000071821e81): fill_kobj_path: path = '/devices/virtual/block/loop5' 23:31:51 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x6, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 23:31:51 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x8924, 0x20000002) [ 655.297967][ T3879] kobject: 'loop1' (000000005ba54b96): kobject_uevent_env [ 655.324894][ T3879] kobject: 'loop1' (000000005ba54b96): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 655.355235][T14110] kobject: 'þ€' (0000000019ea75a2): kobject_add_internal: parent: 'net', set: 'devices' [ 655.374643][ T3879] kobject: 'loop1' (000000005ba54b96): kobject_uevent_env [ 655.429609][ T3879] kobject: 'loop1' (000000005ba54b96): fill_kobj_path: path = '/devices/virtual/block/loop1' 23:31:51 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x72, 0xa, 0xff00}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x6, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) 23:31:51 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x8933, 0x20000002) [ 655.480068][ T3879] kobject: 'loop2' (000000006a2e5baa): kobject_uevent_env [ 655.492951][T14097] kobject: 'loop3' (000000002104f498): kobject_uevent_env [ 655.501008][T14097] kobject: 'loop3' (000000002104f498): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 655.506867][ T3879] kobject: 'loop2' (000000006a2e5baa): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 655.517925][T14110] kobject: 'þ€' (0000000019ea75a2): kobject_uevent_env [ 655.566341][T14110] kobject: 'þ€' (0000000019ea75a2): fill_kobj_path: path = '/devices/virtual/net/þ€' [ 655.597206][T14110] kobject: 'queues' (00000000bf093607): kobject_add_internal: parent: 'þ€', set: '' [ 655.608311][T14117] kobject: 'loop2' (000000006a2e5baa): kobject_uevent_env [ 655.618673][T14117] kobject: 'loop2' (000000006a2e5baa): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 655.629800][T14110] kobject: 'queues' (00000000bf093607): kobject_uevent_env [ 655.640896][T14110] kobject: 'queues' (00000000bf093607): kobject_uevent_env: filter function caused the event to drop! [ 655.660886][ T3879] kobject: 'loop5' (0000000071821e81): kobject_uevent_env [ 655.668095][ T3879] kobject: 'loop5' (0000000071821e81): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 655.681416][T14110] kobject: 'rx-0' (00000000cbc1f6ca): kobject_add_internal: parent: 'queues', set: 'queues' [ 655.711592][T14110] kobject: 'rx-0' (00000000cbc1f6ca): kobject_uevent_env [ 655.742880][T14110] kobject: 'rx-0' (00000000cbc1f6ca): fill_kobj_path: path = '/devices/virtual/net/þ€/queues/rx-0' [ 655.781612][T14110] kobject: 'tx-0' (000000008faba136): kobject_add_internal: parent: 'queues', set: 'queues' [ 655.811941][ T3879] kobject: 'loop0' (000000003f61b277): kobject_uevent_env [ 655.819130][ T3879] kobject: 'loop0' (000000003f61b277): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 655.834343][T14110] kobject: 'tx-0' (000000008faba136): kobject_uevent_env [ 655.845279][T14110] kobject: 'tx-0' (000000008faba136): fill_kobj_path: path = '/devices/virtual/net/þ€/queues/tx-0' [ 655.872906][T14110] kobject: 'brif' (00000000f131ad54): kobject_add_internal: parent: 'þ€', set: '' 23:31:51 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0xfeffffff, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:51 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\xff', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:51 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\xff', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 23:31:51 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x72, 0xa, 0xff00}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x6, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) 23:31:51 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x8946, 0x20000002) 23:31:51 executing program 0: r0 = userfaultfd(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x40}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000240)={{&(0x7f00002d3000/0x1000)=nil, 0x1000}, 0x1}) read(r0, &(0x7f00000000c0)=""/128, 0x80) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x4, 0x8031, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) [ 655.885166][T14110] kobject: 'batman_adv' (000000003e91b9ca): kobject_add_internal: parent: 'þ€', set: '' [ 655.966263][ T3879] kobject: 'loop4' (0000000048b0d411): kobject_uevent_env [ 655.983382][ T3879] kobject: 'loop4' (0000000048b0d411): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 655.988448][T14152] kobject: 'loop3' (000000002104f498): kobject_uevent_env 23:31:51 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x89a0, 0x20000002) 23:31:51 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x72, 0xa, 0xff00}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x6, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) [ 656.017889][T14152] kobject: 'loop3' (000000002104f498): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 656.041569][T14157] kobject: 'brif' (00000000f131ad54): kobject_cleanup, parent 0000000019ea75a2 [ 656.070818][T14153] kobject: 'loop2' (000000006a2e5baa): kobject_uevent_env [ 656.078187][T14157] kobject: 'brif' (00000000f131ad54): auto cleanup kobject_del [ 656.084186][T14153] kobject: 'loop2' (000000006a2e5baa): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 656.095540][T14157] kobject: 'brif' (00000000f131ad54): calling ktype release [ 656.111750][T14157] kobject: (00000000f131ad54): dynamic_kobj_release [ 656.120105][ T3879] kobject: 'loop1' (000000005ba54b96): kobject_uevent_env [ 656.139513][ T3879] kobject: 'loop1' (000000005ba54b96): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 656.151725][T14157] kobject: 'brif': free name [ 656.178923][ T3879] kobject: 'loop5' (0000000071821e81): kobject_uevent_env [ 656.210808][T14157] kobject: 'batman_adv' (000000003e91b9ca): kobject_uevent_env [ 656.226970][ T3879] kobject: 'loop5' (0000000071821e81): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 656.259619][T14157] kobject: 'batman_adv' (000000003e91b9ca): kobject_uevent_env: filter function caused the event to drop! [ 656.294119][ T3879] kobject: 'loop2' (000000006a2e5baa): kobject_uevent_env [ 656.310135][T14157] kobject: 'batman_adv' (000000003e91b9ca): kobject_cleanup, parent 0000000053895139 [ 656.330506][ T3879] kobject: 'loop2' (000000006a2e5baa): fill_kobj_path: path = '/devices/virtual/block/loop2' 23:31:52 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x89a1, 0x20000002) 23:31:52 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xf, 0x72, 0xa, 0xff00}}, 0x0, 0x6, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 656.345274][T14157] kobject: 'batman_adv' (000000003e91b9ca): calling ktype release [ 656.353908][T14157] kobject: (000000003e91b9ca): dynamic_kobj_release [ 656.362294][T14157] kobject: 'batman_adv': free name [ 656.393296][T14152] kobject: 'loop3' (000000002104f498): kobject_uevent_env [ 656.404223][T14152] kobject: 'loop3' (000000002104f498): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 656.416709][T14157] kobject: 'rx-0' (00000000cbc1f6ca): kobject_cleanup, parent 00000000bf093607 [ 656.443230][T14157] kobject: 'rx-0' (00000000cbc1f6ca): auto cleanup 'remove' event [ 656.452200][T14157] kobject: 'rx-0' (00000000cbc1f6ca): kobject_uevent_env [ 656.460158][T14157] kobject: 'rx-0' (00000000cbc1f6ca): fill_kobj_path: path = '/devices/virtual/net/þ€/queues/rx-0' [ 656.472304][T14163] kobject: 'loop2' (000000006a2e5baa): kobject_uevent_env [ 656.477815][T14157] kobject: 'rx-0' (00000000cbc1f6ca): auto cleanup kobject_del [ 656.479769][T14163] kobject: 'loop2' (000000006a2e5baa): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 656.504983][ T3879] kobject: 'loop1' (000000005ba54b96): kobject_uevent_env 23:31:52 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 656.549691][ T3879] kobject: 'loop1' (000000005ba54b96): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 656.580228][ T3879] kobject: 'loop5' (0000000071821e81): kobject_uevent_env 23:31:52 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xf, 0x72, 0xa, 0xff00}}, 0x0, 0x6, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 656.610470][ T3879] kobject: 'loop5' (0000000071821e81): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 656.643513][T14157] kobject: 'rx-0' (00000000cbc1f6ca): calling ktype release [ 656.670146][ T3879] kobject: 'loop1' (000000005ba54b96): kobject_uevent_env [ 656.683478][ T3879] kobject: 'loop1' (000000005ba54b96): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 656.693644][T14157] kobject: 'rx-0': free name [ 656.694092][T14157] kobject: 'tx-0' (000000008faba136): kobject_cleanup, parent 00000000bf093607 [ 656.723877][ T3879] kobject: 'loop0' (000000003f61b277): kobject_uevent_env [ 656.739081][T14157] kobject: 'tx-0' (000000008faba136): auto cleanup 'remove' event [ 656.740097][ T3879] kobject: 'loop0' (000000003f61b277): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 656.760024][T14191] kobject: 'loop2' (000000006a2e5baa): kobject_uevent_env [ 656.768285][T14191] kobject: 'loop2' (000000006a2e5baa): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 656.768294][T14157] kobject: 'tx-0' (000000008faba136): kobject_uevent_env [ 656.768583][T14157] kobject: 'tx-0' (000000008faba136): fill_kobj_path: path = '/devices/virtual/net/þ€/queues/tx-0' [ 656.810806][ T3879] kobject: 'loop5' (0000000071821e81): kobject_uevent_env [ 656.818072][ T3879] kobject: 'loop5' (0000000071821e81): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 656.870096][T14157] kobject: 'tx-0' (000000008faba136): auto cleanup kobject_del [ 656.873627][ T3879] kobject: 'loop2' (000000006a2e5baa): kobject_uevent_env [ 656.887162][ T3879] kobject: 'loop2' (000000006a2e5baa): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 656.894495][T14157] kobject: 'tx-0' (000000008faba136): calling ktype release [ 656.902202][ T3879] kobject: 'loop2' (000000006a2e5baa): kobject_uevent_env [ 656.929296][ T3879] kobject: 'loop2' (000000006a2e5baa): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 656.936877][T14157] kobject: 'tx-0': free name [ 656.944730][T14157] kobject: 'queues' (00000000bf093607): kobject_cleanup, parent 0000000053895139 [ 656.954033][T14157] kobject: 'queues' (00000000bf093607): calling ktype release [ 656.954105][T14202] kobject: 'loop2' (000000006a2e5baa): kobject_uevent_env [ 656.961673][T14157] kobject: 'queues' (00000000bf093607): kset_release [ 656.961695][T14157] kobject: 'queues': free name [ 656.962058][T14157] kobject: 'þ€' (0000000019ea75a2): kobject_uevent_env [ 656.973564][T14202] kobject: 'loop2' (000000006a2e5baa): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 656.975833][T14157] kobject: 'þ€' (0000000019ea75a2): fill_kobj_path: path = '/devices/virtual/net/þ€' 23:31:52 executing program 4: syslog(0xa, &(0x7f00000004c0)=""/90, 0x5a) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x100000000000802, 0x0) pipe(0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = creat(0x0, 0x110) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0xd, {0x0, 0xffffffffffffffa9, 0x4, 0x694}}) fallocate(0xffffffffffffffff, 0x0, 0xffffbffffffffa6d, 0xffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) syslog(0x0, &(0x7f0000000240)=""/134, 0x86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}) getsockopt$inet6_int(r1, 0x29, 0x7f, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0xff000000, 0xfeff0000, 0x77a0100, 0x0, 0xf0ffff, 0x6]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) write$vnet(r1, &(0x7f0000000300)={0x1, {&(0x7f0000000040)=""/93, 0x5d, &(0x7f00000001c0)=""/67, 0x3, 0x3}}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000003c0)=""/205) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) 23:31:52 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x89e0, 0x20000002) 23:31:52 executing program 3: r0 = userfaultfd(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x40}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000240)={{&(0x7f00002d3000/0x1000)=nil, 0x1000}, 0x1}) read(r0, &(0x7f00000000c0)=""/128, 0x80) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x4, 0x8031, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) setsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, 0x0, 0x0) 23:31:52 executing program 0: r0 = userfaultfd(0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x40}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000240)={{&(0x7f00002d3000/0x1000)=nil, 0x1000}, 0x1}) read(r0, &(0x7f00000000c0)=""/128, 0x80) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x4, 0x8031, 0xffffffffffffffff, 0x0) 23:31:52 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xf, 0x72, 0xa, 0xff00}}, 0x0, 0x6, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 23:31:52 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_virtio(&(0x7f0000000080)='vfat\x8c', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x202028, &(0x7f0000000500)=ANY=[@ANYBLOB=',fsuuid=\x00\x00\x00\x00\x00\x00\x00\x00-\x00\x00\x00\x00-c6\x00\x00-\x00\x00\x00\x00-\x00\x000\x00\x00\x00\x00']) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0}, 0x0) r3 = syz_open_dev$usb(0x0, 0x100000001, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x80040, 0x0) fgetxattr(r3, &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000400)=""/180, 0xb4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 657.041092][T14157] kobject: 'þ€' (0000000019ea75a2): kobject_cleanup, parent 0000000053895139 [ 657.049903][T14157] kobject: 'þ€' (0000000019ea75a2): calling ktype release [ 657.059131][T14157] kobject: 'þ€': free name [ 657.080256][ T3879] kobject: 'loop4' (0000000048b0d411): kobject_uevent_env 23:31:52 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x89e7, 0x20000002) [ 657.115843][ T3879] kobject: 'loop4' (0000000048b0d411): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 657.171691][T14216] kobject: 'loop2' (000000006a2e5baa): kobject_uevent_env [ 657.194075][T14209] kobject: 'þ€' (000000004dc1057a): kobject_add_internal: parent: 'net', set: 'devices' 23:31:52 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xf, 0x72, 0xa, 0xff00}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x0, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) [ 657.214193][T14216] kobject: 'loop2' (000000006a2e5baa): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 657.226247][T14209] kobject: 'þ€' (000000004dc1057a): kobject_uevent_env [ 657.234603][T14209] kobject: 'þ€' (000000004dc1057a): fill_kobj_path: path = '/devices/virtual/net/þ€' [ 657.247220][T14209] kobject: 'queues' (000000000315c9ed): kobject_add_internal: parent: 'þ€', set: '' [ 657.267578][ T3879] kobject: 'loop1' (000000005ba54b96): kobject_uevent_env [ 657.280950][T14209] kobject: 'queues' (000000000315c9ed): kobject_uevent_env 23:31:53 executing program 1: perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x60f3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x89e8, 0x20000002) [ 657.323994][ T3879] kobject: 'loop1' (000000005ba54b96): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 657.340104][T14209] kobject: 'queues' (000000000315c9ed): kobject_uevent_env: filter function caused the event to drop! [ 657.357411][T14209] kobject: 'rx-0' (0000000015e01cb2): kobject_add_internal: parent: 'queues', set: 'queues' [ 657.419053][ T3879] kobject: 'loop5' (0000000071821e81): kobject_uevent_env [ 657.436580][T14209] kobject: 'rx-0' (0000000015e01cb2): kobject_uevent_env [ 657.454672][ T3879] kobject: 'loop5' (0000000071821e81): fill_kobj_path: path = '/devices/virtual/block/loop5' 23:31:53 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xf, 0x72, 0xa, 0xff00}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x0, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) [ 657.460569][T14236] kobject: 'loop2' (000000006a2e5baa): kobject_uevent_env [ 657.468275][T14209] kobject: 'rx-0' (0000000015e01cb2): fill_kobj_path: path = '/devices/virtual/net/þ€/queues/rx-0' [ 657.489962][T14236] kobject: 'loop2' (000000006a2e5baa): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 657.495198][ T3879] kobject: 'loop2' (000000006a2e5baa): kobject_uevent_env [ 657.524326][T14209] kobject: 'tx-0' (0000000059e14696): kobject_add_internal: parent: 'queues', set: 'queues' [ 657.535649][ T3879] kobject: 'loop2' (000000006a2e5baa): fill_kobj_path: path = '/devices/virtual/block/loop2' 23:31:53 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x8, 0x2, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x4, 0xe, 0x18, 0xffff, 0x0, 0x5, 0x1000, 0x128, 0x8, 0x0, 0x0, 0x6567, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x4, 0x3, 0x0, 0x800, 0x2973, 0x3f, 0x3, 0x3, 0x8, 0x7fff, 0x0, 0x4, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffff0e70}, 0x10200, 0x7, 0xfff, 0x0, 0xfffffffffffffc01, 0x6, 0x25}, 0x0, 0x2, r0, 0x0) pipe2(&(0x7f00000002c0), 0x4000) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$TUNSETCARRIER(0xfffff