@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7}, @in6={0xa, 0x4e20, 0x3, @empty, 0x1a2}, @in6={0xa, 0x4e24, 0x7, @dev={0xfe, 0x80, [], 0xa}, 0x2}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}, @in6={0xa, 0x4e22, 0x8, @mcast1, 0x40}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x4e23, @broadcast}], 0xa0) mbind(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, &(0x7f00000005c0)=0x1, 0x50000000000000, 0x6) open_by_handle_at(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="520000000700000064cd71f740f3e915784ac73705001c59e85e0e434e3c6f5d8cdad93b0ec2e83eafe68cc7009ef42bab6e06b305839e9fb0d2c1a7f5e776d1a3ef53aa8867fe874d13a89de3be03e9020a"], 0x80500) 14:18:30 executing program 2: pkey_alloc(0x0, 0x3) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000940)=0xffffffffffffffc9) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x101100, 0x0) sendto$packet(r1, &(0x7f0000000080)="bb2fe2143aa56af42b611e6e1638818c9994c8af2537ef3a9bd3ad698ec6c686d0becf428a8901d225966595675e5578546f526c17f0592d909eb9bf9d11b39b9a34a92e5ef9a24d04e0ea16e0ff3ac0af49c17e2bd26025cdbf2ecad55eeabda4653f96145421d3cc29bc0096861fa9715dab4b24dad24c66377b041db8282f41afacf5cb88482b39c033a1360eb8e04f1b8610a4b6df", 0x97, 0x4048080, &(0x7f0000000180)={0x11, 0x1b, r0, 0x1, 0x2, 0x6, @local}, 0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = fcntl$getown(0xffffffffffffffff, 0x9) rt_sigqueueinfo(r3, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r4 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r4, &(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r4, &(0x7f0000005fc0), 0x800000000000059, 0x0) 14:18:30 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000040)) write$apparmor_current(r0, &(0x7f0000000080)=@profile={'changeprofile ', '\'}\x00'}, 0xfffffe8a) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000140)=0x5, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={0x0, 0x2}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000240)={r2, @in6={{0xa, 0x4e20, 0x8, @ipv4={[], [], @loopback}, 0x4}}, 0x100000001, 0x7, 0x9, 0xff, 0x95}, &(0x7f0000000300)=0x98) setresuid(0x0, r1, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x28000, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000180)=0x1d, 0x4) 14:18:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:18:30 executing program 4: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000640)={0x1, 0x2, 0x0, [{0x1, 0x7, 0x10000, 0x8, 0x3f, 0xffffffffffffffff, 0x9}, {0x7f, 0x1, 0x80000000, 0x3, 0x3ff, 0x0, 0x9}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) readv(r2, &(0x7f0000000700)=[{&(0x7f00000001c0)=""/228, 0xe4}, {&(0x7f00000002c0)=""/130, 0x82}, {&(0x7f0000000380)=""/165, 0xa5}, {&(0x7f0000000080)=""/9, 0x9}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000000440)=""/85, 0xff6b}, {&(0x7f0000000880)=""/81, 0x51}, {&(0x7f0000000540)=""/196, 0xc4}, {&(0x7f00000007c0)=""/176, 0xb0}], 0x9) write$FUSE_CREATE_OPEN(r3, &(0x7f00000011c0)={0xa0}, 0xa0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r3, 0x0) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x27) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r2, &(0x7f0000000200)=ANY=[], 0xffdc) 14:18:30 executing program 0: r0 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x800) getsockname$netrom(r0, &(0x7f00000001c0)={{0x3, @bcast}, [@rose, @default, @remote, @null, @netrom, @default]}, &(0x7f0000000100)=0x48) semget(0x3, 0x0, 0x2c4) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3, 0x113080) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'.yz'}, 0x0, 0xfffff, 0xfffffffffffffffe) 14:18:30 executing program 5: socket$inet6_dccp(0xa, 0x6, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/context\x00', 0x2, 0x0) epoll_create(0x8000000008000) [ 275.934292] audit: type=1400 audit(1546870710.682:59): avc: denied { map } for pid=8830 comm="syz-executor4" path=2F6D656D66643A2D42D54E49C56ABA707070F00884A26D202864656C6574656429 dev="tmpfs" ino=30734 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 275.935970] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 14:18:30 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0xff) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000240)={0xb1f7, 0x3, 'client0\x00', 0x4, "468d4253773f704c", "387baa9fca88b9821ac97d2ff85600990089f6762111f5fbb554663416fd6c95", 0x5}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r3, 0x29, 0xcd, &(0x7f0000000100)={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0x14}, 0x3}, {0xa, 0x4e22, 0xffff, @loopback, 0x1df5}, 0x1, [0x4, 0x5, 0x1f, 0x6, 0x6, 0xd2e7, 0x80, 0xffffffff]}, 0x5c) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) setsockopt$inet6_IPV6_ADDRFORM(r3, 0x29, 0x1, &(0x7f0000000300), 0x4) ioctl$KVM_SET_SREGS(r4, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0xa}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28}) ioctl$KVM_RUN(r4, 0xae80, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$KVM_TRANSLATE(r4, 0xc018ae85, &(0x7f0000000000)={0x0, 0x0, 0x40, 0x1, 0x5}) 14:18:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x2000, 0x8) ioctl$DRM_IOCTL_INFO_BUFS(r1, 0xc0106418, &(0x7f00000003c0)={0x5000000000000000, 0xfffffffffffffc01, 0x3, 0x9, 0x1, 0xffffffffffffb6c3}) ioctl(r0, 0xfffffffffffffff8, &(0x7f00000002c0)="0adc1f023c123f3188a07009d251456aa3c179e8464c8f358c5ea39171894ddb24f308c00fcccb86a75f8196d18790cf85abf90d3080ccd2a2eb0ed90a5f36edd2dbb137a2ffd914870126b55396137161f06909fd4abc160df7da0af04ea392370603b44acac5ef79e8aee4bb212410f9636cd0001952b6bbc711a9dff203c5ac4b4735deeb3037012f2d63be97f98d187319e6a5a31686d8b92fa64b724a1e92645126e5a94eda8aa9d0dda442ae160c669eab3a4ed020a431dd16637558988482f4826bac1787c0cf4bc0aa0a94fc6d4a0be46b2de7c82efaae8ab61947fe76") bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b4210000000000809500000000000000"], &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'}, 0x48) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7, 0x0) socket(0xc, 0x4, 0x3) ioctl$PPPIOCCONNECT(r2, 0x4004743a, &(0x7f0000000240)=0x2) r3 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x2, 0x400) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000200)=0x7fff, 0x4) 14:18:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 276.369531] *** Guest State *** [ 276.420123] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 14:18:31 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x2200, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000280), &(0x7f0000000400)=0x30) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r2, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:18:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:18:31 executing program 2: pkey_alloc(0x0, 0x3) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000940)=0xffffffffffffffc9) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x101100, 0x0) sendto$packet(r1, &(0x7f0000000080)="bb2fe2143aa56af42b611e6e1638818c9994c8af2537ef3a9bd3ad698ec6c686d0becf428a8901d225966595675e5578546f526c17f0592d909eb9bf9d11b39b9a34a92e5ef9a24d04e0ea16e0ff3ac0af49c17e2bd26025cdbf2ecad55eeabda4653f96145421d3cc29bc0096861fa9715dab4b24dad24c66377b041db8282f41afacf5cb88482b39c033a1360eb8e04f1b8610a4b6df", 0x97, 0x4048080, &(0x7f0000000180)={0x11, 0x1b, r0, 0x1, 0x2, 0x6, @local}, 0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r3 = fcntl$getown(0xffffffffffffffff, 0x9) rt_sigqueueinfo(r3, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r4 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r4, &(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r4, &(0x7f0000005fc0), 0x800000000000059, 0x0) 14:18:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:18:31 executing program 0: r0 = socket$nl_generic(0xa, 0x3, 0x10) capset(&(0x7f0000866ffc)={0x19980330}, &(0x7f00001dd000)) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x4b, &(0x7f0000000240)={0x14}, 0x14) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x1, 0x0) [ 276.480528] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 [ 276.494865] CR3 = 0x0000000000000000 [ 276.498621] PDPTR0 = 0x0000000000000000 PDPTR1 = 0x0000000000000000 [ 276.505535] PDPTR2 = 0x0000000000000000 PDPTR3 = 0x0000000000000000 [ 276.536581] capability: warning: `syz-executor0' uses 32-bit capabilities (legacy support in use) [ 276.562801] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 276.580535] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 276.597604] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 276.632938] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 14:18:31 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x2200, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000280), &(0x7f0000000400)=0x30) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r2, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:18:31 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000140)='./file1\x00', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x1ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = dup2(r2, r1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000540)={@loopback, 0x0, 0x0, 0x0, 0x5}, 0x20) r4 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000180)=0x0) write$cgroup_pid(r3, &(0x7f00000001c0)=r6, 0x12) sendmsg$NET_DM_CMD_START(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x42000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r5, 0xe24, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) [ 276.662628] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 276.681973] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 14:18:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 276.817482] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 276.817615] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 14:18:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 276.861344] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 276.875946] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 276.885096] GDTR: limit=0x00000000, base=0x0000000000000000 [ 276.904021] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 276.927419] IDTR: limit=0x00000000, base=0x0000000000000000 [ 276.966983] TR: sel=0x000a, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 277.009972] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 277.028881] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 277.038779] Interruptibility = 00000000 ActivityState = 00000000 [ 277.057018] *** Host State *** [ 277.060461] RIP = 0xffffffff811f9800 RSP = 0xffff88803f3af670 [ 277.111046] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 277.188299] FSBase=00007fe396aa0700 GSBase=ffff8880ae700000 TRBase=fffffe0000033000 [ 277.249305] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 277.289746] CR0=0000000080050033 CR3=0000000098c72000 CR4=00000000001426e0 [ 277.301769] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 277.310646] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 277.318736] *** Control State *** [ 277.322633] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 277.329432] EntryControls=0000d1ff ExitControls=002fefff [ 277.341101] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 277.350783] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 277.367033] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 277.389824] reason=80000021 qualification=0000000000000000 [ 277.400217] IDTVectoring: info=00000000 errcode=00000000 [ 277.410057] TSC Offset = 0xffffff69db19033c [ 277.429084] EPT pointer = 0x000000009f40101e 14:18:32 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0xe, 0x4, 0x4, 0x7cb, 0x0, 0xffffffffffffff9c}, 0x2c) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") bpf$MAP_CREATE(0x2, &(0x7f0000000880)={0x3, 0x0, 0x20000000, 0x0, 0x711000, 0x0}, 0x2c) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x40) ioctl$BLKRRPART(r1, 0x125f, 0x0) 14:18:32 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) r1 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000ec3ff4)) shutdown(r0, 0x0) ppoll(&(0x7f0000bc0fd0)=[{r1}], 0x1, &(0x7f0000c03ff0), 0x0, 0x0) 14:18:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:18:32 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x1) ioctl$TIOCGETD(r3, 0x5424, &(0x7f0000000180)) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000013000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:18:32 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x2200, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000280), &(0x7f0000000400)=0x30) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r2, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:18:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 277.607791] audit: type=1400 audit(1546870712.362:60): avc: denied { map_create } for pid=8911 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 14:18:32 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc1205531, &(0x7f0000000980)={0x0, 0x6, 0x7}) ioctl(r0, 0x0, &(0x7f0000000040)="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") mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x3000004, 0x4010, r0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/enforce\x00', 0x2000, 0x0) ioctl$KVM_SMI(r1, 0xaeb7) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000180)={0x81, 0x1, 0xffffffffffff0000, 0x9, &(0x7f0000000140)=[{}]}) [ 277.698728] audit: type=1400 audit(1546870712.362:61): avc: denied { map_read map_write } for pid=8911 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 14:18:32 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000d12000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0xfffffffffffffdc3, 0x0) connect$unix(r1, &(0x7f0000000040)=@abs, 0x6e) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x2, 0x181002) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000100)={0x4, &(0x7f00000000c0)=[{}, {}, {0x0}, {}]}) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000180)={@hyper}) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f0000000140)={r3, 0x2}) connect$unix(r0, &(0x7f0000000200)=@abs, 0x6e) 14:18:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00044b8a184c7f7b6900000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000d5b989880f57848e01010000000000000000000000000000000000000000000000000000000000000000"], 0xb8}}, 0x0) setsockopt$inet_msfilter(r1, 0x0, 0x15, 0x0, 0x0) ioctl$KDSETLED(r1, 0x4b32, 0x100000001) 14:18:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 277.852743] audit: type=1400 audit(1546870712.602:62): avc: denied { map } for pid=8925 comm="syz-executor0" path="/dev/snd/controlC0" dev="devtmpfs" ino=1655 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sound_device_t:s0 tclass=chr_file permissive=1 14:18:32 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x9, &(0x7f00000000c0)=@raw=[@jmp={0x5, 0x1, 0xe, 0x9, 0xa, 0xfffffffffffffff4, 0x4}, @alu={0x0, 0x3, 0x3, 0x5, 0x9, 0xfffffffffffffff4, 0x8}, @ldst={0x1, 0x3, 0x0, 0x4, 0x3, 0x8, 0x4}, @ldst={0x3, 0x2, 0x3, 0x1, 0x1, 0x40, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1000}, @exit, @map={0x18, 0xa, 0x1, 0x0, r0}], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) ioctl$KVM_ARM_SET_DEVICE_ADDR(r0, 0x4010aeab, &(0x7f0000000040)={0x20, 0x10f000}) socket$unix(0x1, 0x5, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x1000000000000f, &(0x7f0000000180)=0x57bb, 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x34, &(0x7f0000009000)=r1, 0x4) 14:18:32 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:18:32 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000200)={0x4, 0x100, 0xfffffffffffffff9, [], &(0x7f00000001c0)={0x9b0b6f, 0x80, [], @p_u8=&(0x7f0000000180)=0xfffffffffffffff7}}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000280)=[@in6={0xa, 0x4e24, 0x88, @loopback, 0x8}], 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x40, 0x80) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000240)) ioctl$VIDIOC_SUBDEV_S_CROP(r1, 0xc038563c, &(0x7f0000000140)={0x1, 0x0, {0xfffffffffffffe00, 0x4, 0x5, 0x1}}) futex(&(0x7f000000cffc)=0x200000004, 0x80, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000000000), 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x260200, 0x0) r3 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, r3) setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, &(0x7f00000000c0)=0x1, 0x4) futex(&(0x7f000000cffc), 0x83, 0x0, &(0x7f000000d000)={0x0, 0x7f}, &(0x7f0000000080), 0x0) 14:18:33 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000e00)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x5000, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:18:33 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x8, 0x422000) write$smack_current(r0, &(0x7f0000000240)='\x00', 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="0207200002000000a5ce8b80667dfaf9"], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090e000000030000000000000005000600000000000a0000000000000400000000000000000000002100000000000100000000000002000100010000000000000200fd000005000500000000000a004872bbb6896209000000000000009aec3f3f6110aa000000ff1700400000"], 0x70}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x40002ee, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:18:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:18:33 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x2200, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000280), &(0x7f0000000400)=0x30) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r2, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:18:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(0xffffffffffffffff, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:18:33 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="34000000000025000c00000005007c00000000000700000000000000bc445cdd5c4a2434edc15b99912bf3cc5bcb68da3710fd17e3c7ed18a11bb57166a19ed53b541eb8802538936c5701c1704f71d14df9"], 0x1c) sendfile(r0, r0, &(0x7f00000000c0), 0x200ffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) getsockopt$inet_mreqsrc(r2, 0x0, 0x0, &(0x7f0000000280)={@dev, @empty, @loopback}, &(0x7f00000002c0)=0xc) getsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000080)=0xc1b, &(0x7f0000000140)=0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x32b, &(0x7f0000000000)=[{}]}, 0x10) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x3}, 0x8) 14:18:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, 0x0, 0x0) 14:18:33 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:18:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, 0x0, 0x0) 14:18:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, 0x0, 0x0) 14:18:33 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:18:34 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:18:34 executing program 0: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000140)="cd80c20000b0b06969ef69dc00d9c4017d50ee8adcd0d01192000880410fd1b02db5d90000007cc481c653fb0fcdc4e3a95fd965eabe3c3b4d4d408064797f41dfdf400e01efc4a1fd28d29d7d2f67450f483b1c0a1a63460fc4c161fc4d96040476789f") r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x4000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@mss, @mss={0x2, 0x1}, @sack_perm, @timestamp, @sack_perm, @mss={0x2, 0x2c}, @sack_perm, @sack_perm, @window={0x3, 0x7, 0x2}], 0x9) 14:18:34 executing program 3 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 279.635455] FAULT_INJECTION: forcing a failure. [ 279.635455] name failslab, interval 1, probability 0, space 0, times 1 [ 279.665693] CPU: 0 PID: 9075 Comm: syz-executor3 Not tainted 5.0.0-rc1+ #14 [ 279.672848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.682204] Call Trace: 14:18:34 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) [ 279.684811] dump_stack+0x1db/0x2d0 [ 279.688460] ? dump_stack_print_info.cold+0x20/0x20 [ 279.693528] ? should_fail+0xa85/0xd22 [ 279.697434] should_fail.cold+0xa/0x15 [ 279.701334] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 279.706456] ? ___might_sleep+0x1e7/0x310 [ 279.710619] ? arch_local_save_flags+0x50/0x50 [ 279.715238] ? print_usage_bug+0xd0/0xd0 [ 279.719315] ? __lock_acquire+0x572/0x4a30 [ 279.723567] __should_failslab+0x121/0x190 [ 279.727822] should_failslab+0x9/0x14 [ 279.731629] kmem_cache_alloc_node+0x265/0x710 [ 279.736214] ? add_lock_to_list.isra.0+0x450/0x450 [ 279.741159] __alloc_skb+0xf4/0x730 [ 279.744797] ? skb_scrub_packet+0x440/0x440 [ 279.749123] ? ip6_mtu+0x39c/0x520 [ 279.752674] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.758224] __ip6_append_data.isra.0+0x2ed9/0x3f20 [ 279.763242] ? rcu_read_unlock_special+0x380/0x380 [ 279.768184] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 279.773207] ? ip6_mtu+0x160/0x520 [ 279.776769] ? dst_output+0x180/0x180 [ 279.780574] ? ip6_setup_cork+0x136e/0x1ae0 [ 279.784907] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 279.789751] ? lockdep_hardirqs_on+0x415/0x5d0 [ 279.794339] ? trace_hardirqs_on+0xbd/0x310 [ 279.798662] ? lock_sock_nested+0xe2/0x120 [ 279.802902] ip6_append_data+0x1bd/0x2e0 [ 279.806964] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 279.811985] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 279.817008] rawv6_sendmsg+0x1b2f/0x49e0 [ 279.821075] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.826640] ? compat_rawv6_getsockopt+0x150/0x150 [ 279.831576] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.837120] ? avc_has_perm+0x55c/0x7e0 [ 279.841102] ? avc_has_perm_noaudit+0x630/0x630 [ 279.845771] ? add_lock_to_list.isra.0+0x450/0x450 [ 279.850722] ? mark_held_locks+0x100/0x100 [ 279.854959] ? avc_has_perm+0x460/0x7e0 [ 279.858933] ? find_held_lock+0x35/0x120 [ 279.863003] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.868550] ? sock_has_perm+0x2be/0x3e0 [ 279.872637] inet_sendmsg+0x1af/0x740 [ 279.876438] ? inet_sendmsg+0x1af/0x740 [ 279.880416] ? ipip_gro_receive+0x100/0x100 [ 279.884747] ? selinux_socket_sendmsg+0x36/0x40 [ 279.889414] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.894953] ? security_socket_sendmsg+0x93/0xc0 [ 279.899711] ? ipip_gro_receive+0x100/0x100 [ 279.904038] sock_sendmsg+0xdd/0x130 [ 279.907760] sock_write_iter+0x379/0x5e0 [ 279.911832] ? sock_sendmsg+0x130/0x130 [ 279.915811] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.921360] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 279.926909] ? iov_iter_init+0xea/0x220 [ 279.930888] __vfs_write+0x764/0xb40 [ 279.934610] ? kernel_read+0x120/0x120 [ 279.938504] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 279.944069] ? rw_verify_area+0x118/0x360 [ 279.948222] vfs_write+0x20c/0x580 [ 279.951767] ksys_write+0x105/0x260 [ 279.955399] ? __ia32_sys_read+0xb0/0xb0 [ 279.959463] ? syscall_get_arguments.part.0+0x10/0x10 [ 279.964659] ? trace_hardirqs_off_caller+0x300/0x300 [ 279.969768] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 279.974539] __x64_sys_write+0x73/0xb0 [ 279.978431] do_syscall_64+0x1a3/0x800 [ 279.982327] ? syscall_return_slowpath+0x5f0/0x5f0 [ 279.987262] ? prepare_exit_to_usermode+0x232/0x3b0 [ 279.992283] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 279.997138] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.002325] RIP: 0033:0x457ec9 [ 280.005532] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 280.024918] RSP: 002b:00007f026b327c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 280.032625] RAX: ffffffffffffffda RBX: 00007f026b327c90 RCX: 0000000000457ec9 [ 280.039891] RDX: 0000000000003138 RSI: 0000000020002ec0 RDI: 0000000000000004 [ 280.047155] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 280.054425] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f026b3286d4 [ 280.061690] R13: 00000000004c7100 R14: 00000000004dc820 R15: 0000000000000005 14:18:34 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x2200, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000280), &(0x7f0000000400)=0x30) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r2, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) 14:18:34 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="34000000000025000c00000005007c00000000000700000000000000bc445cdd5c4a2434edc15b99912bf3cc5bcb68da3710fd17e3c7ed18a11bb57166a19ed53b541eb8802538936c5701c1704f71d14df9"], 0x1c) sendfile(r0, r0, &(0x7f00000000c0), 0x200ffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) getsockopt$inet_mreqsrc(r2, 0x0, 0x0, &(0x7f0000000280)={@dev, @empty, @loopback}, &(0x7f00000002c0)=0xc) getsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000080)=0xc1b, &(0x7f0000000140)=0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x32b, &(0x7f0000000000)=[{}]}, 0x10) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x3}, 0x8) 14:18:34 executing program 3 (fault-call:3 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:18:35 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:18:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x200) r1 = semget$private(0x0, 0x207, 0x6) semop(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x1800}], 0x1) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000040)=[0xfef, 0xf1b, 0x4000007, 0x1, 0x2, 0x7, 0x7, 0x9, 0x7ff]) 14:18:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x2, 0x0) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{}, {0x0}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000100)={r2, &(0x7f0000000640)=""/237}) sendto$inet6(r1, &(0x7f00000004c0)="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", 0x125, 0x80, &(0x7f0000000600)={0xa, 0x4e22, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2}, 0x1c) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000740)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000509ae4a2938a1b06e61fbdb1a67d6756791cc1dd4ecd3922c0444a3447a11ccacb0460fd699c47ff180a6f186d864c076018edb197e78daa1a21b4c91397a4bb67b5b77fd35aec837cf38359ce8f2de5184163de63a7e2b815de8c27318401dce92689e1f455ded94cda3d2eed95d79e2ba49485fb28d7ac964e53e73f2a4d55299249030ce85bb17e7159aee9321ff6dbb9ec0809c16e576d6082205989", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000ce750820cde61900000000000000000000000000000000000000000000000000000000001d000000000000001000002000060000000000000000000000020000000000000000000000000000516f75d394daed4082283c650000000000000000100000000000000036b51f2aa06f38bcc6"], 0xb8}}, 0x0) setsockopt$inet_msfilter(r3, 0x0, 0x22, 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x4000) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000200)=0x4) [ 280.285918] FAULT_INJECTION: forcing a failure. [ 280.285918] name failslab, interval 1, probability 0, space 0, times 0 [ 280.397243] CPU: 1 PID: 9084 Comm: syz-executor3 Not tainted 5.0.0-rc1+ #14 [ 280.404397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.413756] Call Trace: [ 280.416360] dump_stack+0x1db/0x2d0 [ 280.420026] ? dump_stack_print_info.cold+0x20/0x20 [ 280.425058] ? save_stack+0x45/0xd0 [ 280.428704] ? kasan_kmalloc+0xcf/0xe0 [ 280.432606] ? kasan_slab_alloc+0xf/0x20 [ 280.436683] ? kmem_cache_alloc_node+0x144/0x710 [ 280.441451] ? __alloc_skb+0xf4/0x730 [ 280.445265] ? ip6_append_data+0x1bd/0x2e0 [ 280.449528] should_fail.cold+0xa/0x15 [ 280.453435] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 280.458557] ? ___might_sleep+0x1e7/0x310 [ 280.462717] ? arch_local_save_flags+0x50/0x50 [ 280.467311] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 280.472857] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 280.478412] __should_failslab+0x121/0x190 [ 280.482663] should_failslab+0x9/0x14 [ 280.486477] kmem_cache_alloc_node_trace+0x270/0x720 [ 280.491605] ? __alloc_skb+0xf4/0x730 [ 280.495424] __kmalloc_node_track_caller+0x3d/0x70 [ 280.500370] __kmalloc_reserve.isra.0+0x40/0xe0 [ 280.505057] __alloc_skb+0x12d/0x730 [ 280.508789] ? skb_scrub_packet+0x440/0x440 [ 280.513172] ? ip6_mtu+0x39c/0x520 [ 280.516729] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 280.522294] __ip6_append_data.isra.0+0x2ed9/0x3f20 [ 280.527320] ? rcu_read_unlock_special+0x380/0x380 [ 280.532283] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 280.537312] ? ip6_mtu+0x160/0x520 [ 280.540874] ? dst_output+0x180/0x180 [ 280.544699] ? ip6_setup_cork+0x136e/0x1ae0 [ 280.549052] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 280.553908] ? lockdep_hardirqs_on+0x415/0x5d0 [ 280.558517] ? trace_hardirqs_on+0xbd/0x310 [ 280.562856] ? lock_sock_nested+0xe2/0x120 [ 280.567108] ip6_append_data+0x1bd/0x2e0 [ 280.571194] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 280.576255] ? rawv6_mh_filter_unregister+0xe0/0xe0 [ 280.581293] rawv6_sendmsg+0x1b2f/0x49e0 [ 280.585367] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 280.590940] ? compat_rawv6_getsockopt+0x150/0x150 [ 280.595919] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 280.601467] ? avc_has_perm+0x55c/0x7e0 [ 280.605467] ? avc_has_perm_noaudit+0x630/0x630 [ 280.610157] ? add_lock_to_list.isra.0+0x450/0x450 [ 280.615102] ? mark_held_locks+0x100/0x100 [ 280.619350] ? avc_has_perm+0x460/0x7e0 [ 280.623335] ? find_held_lock+0x35/0x120 [ 280.627411] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 280.632965] ? sock_has_perm+0x2be/0x3e0 [ 280.637094] inet_sendmsg+0x1af/0x740 [ 280.640929] ? inet_sendmsg+0x1af/0x740 [ 280.644935] ? ipip_gro_receive+0x100/0x100 [ 280.649264] ? selinux_socket_sendmsg+0x36/0x40 [ 280.653952] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 280.659511] ? security_socket_sendmsg+0x93/0xc0 [ 280.664282] ? ipip_gro_receive+0x100/0x100 [ 280.668621] sock_sendmsg+0xdd/0x130 [ 280.672352] sock_write_iter+0x379/0x5e0 [ 280.676429] ? sock_sendmsg+0x130/0x130 [ 280.680412] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 280.685971] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 280.691535] ? iov_iter_init+0xea/0x220 [ 280.695532] __vfs_write+0x764/0xb40 [ 280.699263] ? kernel_read+0x120/0x120 [ 280.703160] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 280.708728] ? rw_verify_area+0x118/0x360 [ 280.712888] vfs_write+0x20c/0x580 [ 280.716445] ksys_write+0x105/0x260 [ 280.720087] ? __ia32_sys_read+0xb0/0xb0 [ 280.724165] ? trace_hardirqs_off_caller+0x300/0x300 [ 280.729292] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 280.734066] __x64_sys_write+0x73/0xb0 [ 280.737968] do_syscall_64+0x1a3/0x800 [ 280.741871] ? syscall_return_slowpath+0x5f0/0x5f0 [ 280.746815] ? prepare_exit_to_usermode+0x232/0x3b0 [ 280.751860] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 280.756724] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.761921] RIP: 0033:0x457ec9 [ 280.765125] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 280.784043] RSP: 002b:00007f026b327c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 280.791753] RAX: ffffffffffffffda RBX: 00007f026b327c90 RCX: 0000000000457ec9 14:18:35 executing program 2: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TIOCNXCL(r0, 0x540d) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r2, 0x80045200, 0x0) [ 280.799033] RDX: 0000000000003138 RSI: 0000000020002ec0 RDI: 0000000000000004 [ 280.806306] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 280.813580] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f026b3286d4 [ 280.820884] R13: 00000000004c7100 R14: 00000000004dc820 R15: 0000000000000005 14:18:35 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x1, 0x1c8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'sit0\x00', 'eql\x00', 'ifb0\x00', 'eql\x00', @link_local, [], @remote, [], 0x108, 0x108, 0x138, [@physdev={'physdev\x00', 0x48, {{'eql\x00', {}, 'vlan0\x00'}}}]}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x240) r1 = dup(r0) sendmmsg$alg(r1, &(0x7f0000000f80)=[{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)='#', 0x1}, {&(0x7f0000000080)="c249b0e36f3948d240c51c5066838ab60b7d2341", 0x14}], 0x2, &(0x7f0000000180)=[@assoc={0x18, 0x117, 0x4, 0x5}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @iv={0x40, 0x117, 0x2, 0x27, "116fef057cd4266b9ab61a974927319c639bff0a3143d5565c0bc10e034e245417668c5ae44a46"}], 0x88, 0x84}, {0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000004c0)="9f0a260eb5e3a7ac150af301febbb8650033ea8e1185797b1fe7a0a2dbc29ccd2aee5261d4c052b4534247c968d00d31d69ae2aa331b46eaa93eef16407cd97292cf29f7270ab39f2eb1b83d71145ea97d630099f4fb0642968c4ebfd62cc0589fed17061ff4c7df922f862c0730ebde42e1cdd1e03d9da6818cd60792a5d9e9b15a91db86477d42a398c3db87ecb12f15eaf69e959f2d2fa8a9d4348cd4a4c048034a879bc09b95e575e0b661a527b9e2557b209e2837df8bb4e9311f4ae1053d4a541d31bfdbe403106495ddeb558e353d0401f6604603c7d2108afa9666e6403ac4646692cbd0d94c2feb6bfafdc5209c969050ed47", 0xf7}, {&(0x7f0000000240)="e6e9d69b8b8b936baa130c7a87db04d958c2c7fe40b32b414134c79533c23325afa9e1171fdc6372a04635edfc46060811d8d16b46ce26a25ddab35d9af7115612e60dda8e634b67520b11a65cfd510003f7697c45e6", 0x56}, {&(0x7f00000005c0)="b627b049cc72270d0bf6c0a0dec0b412469f4c10a0539c3457c22ac3f8ddb88c5a513d7fe337cb332338cc000173737ba1f2b25bf4209817681cc139a371d9a970efadf0abd3f28cd05504a4bc492f78f28a041d0a45ece63242da4f4a387b5d8abf9b8aefd91c6b87ce04d191b68d3766083754932c6c99b6a35503d3fe571404df4480606d392c5c1aace2d16e9c511695914040b2c46faa93e73100", 0x9d}, {&(0x7f0000000680)="ff2f3da8fd2506ad03ed8e78bed9e2", 0xf}, {&(0x7f00000006c0)="c0269086491c033a3c1e16429fe8cd54bbd469e1a014f713754a67d72dfde2cb819b87a7ebbf204308288fcc68ee756ca088b2619d51380a6dcfe1ce30d3a1b00ab9a6b8205a610a61f2f5efa54b9c523eff3f8b8c7fd6fd5d73e5f0aeef5299ce5d5fd665280bc7ae26a112aa4224cc19c72f87", 0x74}, {&(0x7f0000000740)="195ef7ede62f19601aa4f2d3257e94", 0xf}], 0x6, &(0x7f0000000800)=[@assoc={0x18, 0x117, 0x4, 0x1}, @iv={0x50, 0x117, 0x2, 0x38, "9d04330fae58e5f633cc739bd1d17aa24d1e5c8b30fde4b3ad22204ac86ded9047b39694abbc5f0233ef384f817d7e877b1c1e604873b7b9"}, @iv={0x88, 0x117, 0x2, 0x72, "845f17a3a5ded61f03732b5c7d3eb52e90339a4b5c8724f93115b449ccdbf8bb643be6b6c3c0e8ea86f8fc7f38a77904ec88abc0cad38e7206bd0fa815485a135402846fab9fb2446f7a3b4d1b415b6197bc1a8c2fa0d8794535f2e368037fa4db2ff3431285625ab775bab7a9ee68c991cc"}, @assoc={0x18, 0x117, 0x4, 0x9}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18}, @assoc={0x18}, @iv={0x20, 0x117, 0x2, 0xa, "30fc95ec866099b85716"}], 0x170}, {0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000980)="3d109f2732e3b7e7cd919084850f0a22e78b8913b2f07711c95fce3899cc107b5f2d1d90440acdbdb59b042a3864a17683a8493dee6130551836ee05370618d42bdcbbad1051f881c46fbf466a9726be85926ed6329168bafd319b50cbeb6de622fb10a7c4a9d3bbfd6bb2e75284803fb8bb5788ed2551cafe9afe6e376b90ed9620b08fd70022483c085a1685016bb9ed8925273457c5ebd3cd06d5d0b93ad7cf83dff4617648464abaadaade8d8b137aa6fee84aba0bbbc43fcc1fde261e9051ef40b3759b9c5e0d8f0d12a6a2509ec539721cf5", 0xd5}, {&(0x7f0000000a80)="83533727ca6109a1e9aa906ad891fb93b0359667ac94774babc60cd164ab34e4b588440b19a2456c1aab2f2549660d13ea43fba42eda62bc1fa4e8cc2514ae388354387b44a652124b7657f202285d17997bc16b89d2d77d4a41fb4d63e5bbd8775b542584996f03687898ef898ab46e5458c17a850d03754810cd699c63ebc7df2345256e", 0x85}, {&(0x7f0000000b40)="e427a41919565e81822db98f8edb04ccde10e240c125c477add091317bee78c63d8e57ada79ce18a6703ce0d1d9050862163944c60a97ac5955b65e54683e61f6710a96ff0a244553387649b808d183d0abebb2e76def4cfc167d80df2524544f78f198247625eb1999a5ecf9209839bcf061dd0e710e7f8e531883e285beb1c7abef5d657dca888466c3dbe1fc6e0424862ae7df28351c6673ea89d24bb3d8c9306d961d4e81be08468ccb48655f061ae760cc6e263f33cb3c3bd40da20bdcac09f49c3fb1857c1bee5afeff1fe5dfc01b43fe9be", 0xd5}, {&(0x7f0000000c40)="88fb7b52f54706dfb03ac0600e8874b3973958f330b49504f0eed831a8e1a18d885872a5cacce34186e738004c544bb8586fa8cb35789847606e3a570a906827e15065525c9f5664fafba0264b8fe37a13b1fac9961d64fb6f86cc450fd7f2fac15608051436647b63dd10a49e592b3f3455a1cf7d6d416cb1d5e6db00595c4287ced82f86ee733b381b6680d84a99f23a744e2b92", 0x95}], 0x4, &(0x7f0000000d40)=[@assoc={0x18, 0x117, 0x4, 0x7}, @iv={0x78, 0x117, 0x2, 0x5d, "4b9709963b22f719bc8096f5d1095923013f480d409314d9a59fe6292e1cc77c564c410e775a9eafc5285710f33bca9c8014e8872aafcfb83392ee241cdfa4df1f5187aadba4e64150ee2a82617ec101ccc1d564e22abf830432bb3eb5"}, @assoc={0x18, 0x117, 0x4, 0x6}, @iv={0x68, 0x117, 0x2, 0x51, "faa046a7921e187abaebdfcb1f6227e66c92b2a6bd0b240c426d293bdc4572967520b0b01f142198b5f58cd183fca07f2c8903e66eb45d15fb8cce0d91ebed71888be3bdb8603d8067a802a2a3bcef2433"}, @assoc={0x18, 0x117, 0x4, 0x1ff}, @iv={0x70, 0x117, 0x2, 0x5a, "d568d67e630521cc74077656cfc346465382d18d1218abad8c3146ad088a210a627a7b1044dc42269356eeff325edade6f405d670a8bba524c1a5c28a59dc247c3cca5ca190b3ace8c56fcbea48a24946019a526278ba9197c50"}, @assoc={0x18, 0x117, 0x4, 0x4}, @iv={0x80, 0x117, 0x2, 0x66, "258e9027b27be94e0ed7cb7272fb04bae7c19b9098a86e8156ceefe80a8b035922dbd970f4c7474d1535877a913e7a7e211ab45e40b5486ebf11924877a63254fffebfce473942f909131a5e49e34753b42c40323de8a9550f119ccb80521d74bc87e324f826"}], 0x230, 0x4000000}], 0x3, 0x24000080) modify_ldt$read_default(0x2, &(0x7f0000001040)=""/246, 0xf6) 14:18:35 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:18:35 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup3(r0, r0, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x46, &(0x7f0000000000)=ANY=[@ANYBLOB="01800300000000000000aa2086dd60a1d8f200100600fe800000000000000000000000000000ff0200150000000000000000000000010009ad78000000000000000000000000f9fad463ff8f90855a03bff8600cb1167490fc86fd1580a93c7f7056b94d4d491f1f56dd063077eb943a173fda03804c4380d2c84868374db3e4246e53b3c598f8f934ac06278912643f03d3d6aeb62ddf52daccf6e4ad90bd567b7704285699bead1a8e43dc"], &(0x7f00000001c0)={0xfffffffffffffffe, 0x2, [0x0, 0x36]}) 14:18:35 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x2200, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000280), &(0x7f0000000400)=0x30) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:18:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:18:35 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) 14:18:36 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="34000000000025000c00000005007c00000000000700000000000000bc445cdd5c4a2434edc15b99912bf3cc5bcb68da3710fd17e3c7ed18a11bb57166a19ed53b541eb8802538936c5701c1704f71d14df9"], 0x1c) sendfile(r0, r0, &(0x7f00000000c0), 0x200ffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) getsockopt$inet_mreqsrc(r2, 0x0, 0x0, &(0x7f0000000280)={@dev, @empty, @loopback}, &(0x7f00000002c0)=0xc) getsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000080)=0xc1b, &(0x7f0000000140)=0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x32b, &(0x7f0000000000)=[{}]}, 0x10) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x3}, 0x8) 14:18:36 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x2200, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000280), &(0x7f0000000400)=0x30) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r2, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) 14:18:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100000c912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, r2, 0x221, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) sendmmsg(r0, &(0x7f0000000180)=[{{&(0x7f0000000200)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(serpent)\x00'}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000280)="b9ff942e5c0632f90911bb4c391e377151ce9ec5279b5af6593295c431930153437a790b45b089dc23a394ceaef8909a85bc2fd493b90661efb44ded41a7b78817d5f8bd953ce87d07a955599c0b969685e5ea691fba5c8b060df68df56b50c98b03442035a3fcd2936451d02a0f3028b4fac9dcea6eaf0fccd0c4d4012f1889da45005284b44f6b6df4165f54bdcfb4d7ddd683155c3cac78fc36de63901bec6c79e67a624091d3a8edd82823372fe2da9f3089612b87dfe202110166024c6668016706fce637b2dc2cb8a6a53ac0b10743431ab36c70adc927bd513e4775468dbd6a25f2a6017fc1fb7c5e6de8701348d241c137d2d78c152b1eb6161bda808fc9506045dc1ec9ddb98ae78a639afaa9f4dbd9a0f37c53a9b930d06ed2d32cfd22529b65a7c7e4f93fa14922478f8e22500b65f8b73814c0e15bf50b2e60399c285febc3b8ed220295ab96f24dae20e3ed3ecf3cf941094a7bb1cbaf6ccfdcdcd868bbf731d20839933e3d3afdf671d4ee7dbf317a7f3ef827ba3fd05c6d0b07243b2743f5fa6a6118eb20fda6ccdbd09d11a61c9dbf8939fa4b121ef947f34938f77baa3ce8e6c5f44d03d502dceadbebdf0c09f367444f923ce600efaaa2dedf5a184bfcbc2088508367cf55ea57f26b5a89e2d6572c7a2379cddc2cb551ef81c1643467cab16311957c63d190edecc0126a23b27549b903f586718846baf79026f5ee78041475be812ec7b2e75bd3ad3e0ce7280017ef9539a9c7978bbdeb3cfc6ca5677a5222d17616c6f25ec5d54cb1167226e5be2e9c6fd4f998b44dd9d60d8c42e485bda158dffd14a1de5e6a9946549df9e300f0defb01ed7fcd671f771b9ad66ff24a1a06c7eaeae6dd20ab7b9e905651282c3bce5770d13c5139eb4ef9c26fba57a3e18df5693861f7f3c736f8cee14956ea1faf062dc8b52fe3b0c95ba7e2051bc7328f53e71eb48fccd934a1163606c8eff3bc82426f26cb67ee1f0c14af05c5fba8a06266f531175f9ca7bb4487fb0c89f04c258597e8dfc59df2bede3e3141c5209082cd8bace18d2ec504d7c1711442ae99f0f80d7fbefc66d33a74aab5861d36912c19bea16b2159281a87217657e61786bfe8301318505c3ab43bf31fdbdc43a73cdee4874992012f56afd816154379e023b55e3c38eb823f71a4bd74a6a7baabfadcbc6aacfd201a98455f19709be8c00ef519ef226d28bafa8b31bcc2c0b97bc586658879775cfb51bb8d53c39c044bd636bcbd13da43fd1704371e36216cdd1879b760cb7489f7b3f279a8cf17853d820198989a931b2622bb86ce6c597fca45f87a76d512d0ee9998a1230e6642e45b0253ed916ca541f09848080f018232f9bd4065989f556bde3e8f2f44be2263e033c3633c1e83d7cfff3a81656da2dc6d222b63c3af62af98db7cfebb7bbf6ba3a0c7d39f2bc62541ae14a957da37fb9dc6fae96999e846e0446711f9d5af72782d0868434900b3406584dd96df379bee8f3e1b6a0bbcb6c496114a4b5600bc75190b9ad93813c3938a17a3c778540f5d8687ee2a25ac95a9955632bd5faab0326b650224a38d461086bd632ee5596aeed5a8004af51b67c6e1b432d3b255f3248d1ef04565b35968f72307a5e66d7b629d281b82e826f5148a2b1ddd65bddbb111116baea44a9784f5d7ff65716f643a97a376f7042d617bc0b56ace5d387bcc337747def589ec897007936e296d0acf45e9300e3ce844d146ea70354bd0d9a2caf9929e84ee4f2e4ef8e6d3254b18cc1894ba5603557ba6b049916b851da80935d85a477479be567ae098c5ee0a1252c15556a0785f673b77b5dc984b96ba3e0decc65157b8f55a90492d0da17612d96e5e20c8e0f1bbf8c8609066872b5d2085781de008fd7a9503c8520f6be6838a00c5ed2707fe189a55fc2ce6751245076a0545eb91f9e609544add4ff4f1d7c9f00cd0237ecca7cd31fc144a456b19531fe9c150a630cfa2b900900e175a92d20915678246940a09400d384b1fc69030c0da610705289899d1ffd1c49711b8b86d7cbd68cebfe3dce30f479a4d317d5a5386c5e420be27edac7c782a88d8fd0231bbf0bf3af0dba716c3cb2f737543408c03fd0a523a004909652092a128e853592bc406287ba142a8f6c8fd5863cd1a65b12f4e722a77372d7eb6ebeb4f62a084acad6d18631256f79eeffe07d26615a5afe6c345b94f008380c5de1b7d8f777f728466a7c39733e9c08deb2f0556469dd19a3e4bb8c0bb3249c6fe096398804be83ccd43b79655120183cdced7892451d36418ed2d40c7aefe53061d71af0b02546fded4d7da2b716643b3ff666904d159501a23320c0d510f93f382e059a9913a53cc0c5df465b3044ce60fd3cfabdda3eea09609289520e4d4b0a02e2417b7af0487b39ad22df003bc316f4843231d70a061f614cf699a463d2df4b820530254d0baff878509a2de502a807bfd8b21220156739459d2cb1e69b19deed7e169a785e631474f8b742642864f7cd9fa65c5d96951bfff9619a85b396dbc9d65bddba8337cd4a638ed974c1323671c9618cc8ba3f704ec825e8b0c186b12a1acffd6be23ac8a8b96eaf3b510aff51f5a7111110854f7f1e52cd093b33747d26fda58289e94c75e7005c4b44b1bb16dce58a630b146010d1136aac771d8e1294b79a873dd785568b77c8a979f9cd7afbcf8c8a5c797c9326b759f73e5291240d762f121310bdf2ad56de2761a1fdf00df22ae1b5bca87f2f72d0613b7cd925ed070cacbf59faea47d914dca4ac3e5368e1dfd9a95809aa42678cd53b12246113430ee931f2d9ee20166ae9183990d0b3f3cc3a577eace293e0a33ed6784124d06a088a548ea7d9d9ae0036989782e1e98bbcaaf8b0ec9e0208a46ebda9707344776232da729349ce2a66142a96beb16f1eb82c0c8f2a4c253b465c2d5ec21694e52088bc693d2ac034529bb808eaf522daffce0105eacd394fc0b8556389848798536183984f63999dbf4cdec160461372009a79bc90cff8cefbbafa09a7e52f17b06134815595805b025a8ce443ef7cffb606cb997c856ec374269b31c2c4e2e2f7c2f4d8a2efd1c2b038ba2eb8058dda9fc306de9cc9b5d1e33e07f7db85f4cc85f7c5f1361dd04f9b1d3e28f57b6b0a3d4e3b922df75527ce553e7bb73f038e38ddb6f6d5bc5168cbc8053178c4be38e8108b7513aab3410f9a21363f3b79d7a9090b2d4df34dd435619fd3a54bd2aaa8e293b521212bd7eb5b409b89c46d647c0516226e1f7d12447775a23db2b52b8178523bcf99e3629e38e37628b3e1946bc3dbf5077ae643204904250e9ac8a70545ffe5aeda57721afda586e6690bbd535e21157ae3747bb3f92d5d31292ae3e5f9f6af9838d5241372e3aa9b46a1e13c93d23706f44ec233ccfd207b7156abd06a90b4c02dbb691bd3e14e0e5eaf7a6ba841843225e40dfed5218a83c87c040408584447b1329ecbfb6c2eabdef3235d29bc535483da021d37efc30eb86b8f3f810c261217213aec023abc4b8a3305817b25c0e8b97f2dd1484f0bf6b30e901895472389fc63ab500a1aa655864add5afb314977b0f18168613c1f364d2d94b96ec5a3ac6d662e3560ee78f99242df57584c8eaf790a40a48ff77eeee2b63d3e256d2fdca076f9e78f89aa1340f5c404c36b2c29efa05e5bb6628456dca7adcec33278e79b6b8981f6b14559df04c13169d497bf787857a8a3852878dfe4b8684c0f1db38cfc28da61929dd075a09d26c06c99f966633b484e09925c0a655a1d3922fc832c2f852e511bbf37105677349cd3dddf80521df4c3dccc333139af386cae3c517b75b4c65438bb0f1b50cf65879097a7d15ef1eb9abcdc74bf50f3cdc6e64d134d52d5bd173197a82dd02be0740261bb9262239578f67eabc889e90c5d049246477ce3447c7a01d0e9a5f6531d6dea136bcf13d40a28d2abd360daa051d9de132d92e4cf705917953b19a38c7f5ffbb17cbd013b6399d3e4649c702d92fa7a75f4a0c895e30bbebdf270ef0af51c32dc2e0942b1fcc1026ec179dde490387ed6dd20bfe87cfca1bfc0a440a6d9e0706c257f90fb21ca66912c89adb3c51f05c8eb5053a2f93f0eecd63460bd7e7e6d2d309f30905013c04095a1221578fc3c33ecc901642bc422564d9ec12de93e2a77697f4fde22862a59ffc76bcd247272a827027d0baa5ab3254eee8cfd6982191fc5e729ade3b169e439ff46b96c3738d07d057264df45481316a08d97a00ded31521f8692ba37bd08fed9b0967128d28f770b8e0776c704cd5b32e5815dd146c83a557bb87606fdda4cedaa0ebb51a5ab45fa8b1f4038c4a19f06be045ca52e51fd3fb02cbf3367d000ba593498a57202e2a7a903662fe56e176a2dfb5353d323e5227210e4eef261bc8299745228a63f3fd9694cdca31688a9aed4d915e9b03fd86e9911248c22eedd656daf7c7d9cedd243a501e99ac3f8d40be105f053ce7ec33c04d3aa782de1a31372961a9e4b1d942a86c01a0a27114669a5e570a5261be43b24c7d6a01b0efdeb6d84506225c5d2f2f1469f77dff95ec108c591bc31fb108ebb2090c2c38319f746d90c7745a60beec19b408181ef94c7260725f6209f43a84dc07e61a1427870cdc6baac911950e73de7be697edd6f760e4d6a5f0862e194f051d4430a3606fa7b523f8a22b23def2bdff13106192b0c4331af42f976fa47e625cc1cad83f292d484eaa9c87ba4c2fcc76e46eb95a02caacd46fa611475163d21f9d4dbadf800767b0fe59a2aa0d876fe8af6bfec07b2e5a6d23c3c01fe53bd6375bf4ef9e9844f26a2f40cedd2cd3e097a4c115e0880e1ed0f683f099ad38f18abbd8f2885543983f06ac9c31f9bc1e7df59262062822e67b25d7a7916e6ec83912c68f89b244e462dff8bf34c942391b4786febb34e923774d0ce4b3573fe130106090c830c74dde4a7751d4b6431a46f9fbfa9c77ab4c54769a476354c8f21bf00d22780c6ec9f03523a0d58551c798490c7eed1499ea6f4e5140a88a0c5607dd8b37e94cb4322bfecf73f755ea0aaac8768492493f7d4e45899f8a9678d1f816b25401861c5af68d823768c7cbcb57b143fb434802a7492d7db1a8b3b55a6ff1b5fda6f50c32bf62989d81ff31db3e8fea236d0ed91c45c46add4801c90ecf588c0fcd9b1b1910887d7820c7962fd9c3a50ee00a798abdbd145fa1d82e9ed4cd21c221851c58a92716b21a133e6f548811ba682b34f8ce7d39ebee591aca6d6d1cad2a2fc067080588caa427023c926a7a512976ffd643fee3f5461d5b5482de7674d4120fe0eb501bea09eea75d7bdd4feed1874026521a31648495047dc1c8d8162bd3a10df63927738a0bc1c992bd622288136bc5d44297e1e388d1ce3299fafb5da4ecdef091aaae70d89e754e84dd2123f9d80e4dee1d817be207f317d701a82407b6cf45c39fea5e77b02cd91134aba073e78fba58967671eca3d2b271c56b834f246e51133e13c01c92314006df8cf506d9e3d7afe8c6b7d1044e1f6e334a9315c4fc14e8f08dbb3bbec922e0b91fc091ce350e4020ed1d9f2af2f1a49ce5380d53c8355a44cfabd0a4a48342877bc5ec32f0c74f385d037ee55d0da242f13a7092e4f72820e4f975c80379d96cdd28598a2e8bccc6a7b0dffe3a97875a19e96e696a0583ccc02119fef2f944f456fce331dfd66e40b49842df311853cfd843141f802dffb6635d41b38273542bde3e4db91c32cde0b9e2f9d4fadc594cebd4cdf8cda5cc01cb", 0x1000}], 0x1, &(0x7f00000025c0)=[{0x1010, 0x29, 0x8, "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"}, {0xf8, 0x105, 0x1ff, "1d53f57593c1639a1b51fe57ede24c263bf53af328b181c866f8fcc4a7ee93bcef0b82d8ff02e3485ed3b000222c148ba538cc45e11f77c7c6a7b3a0429687c1ae5e4f64f57e41396f3ef54e185ff74d22366e411467888a4ee2b9a295ee7ec675213a1c8b3a5301be0d3478b2bdd92f9f5845ac55306093f45e15cbc7b5bfe3b852d6b9b0becbb10a579dc85401fd8a5579cd3345f1276cdb646dcec72d899ea1a553252d07e6b47f89987616410a60145ec0a9536d9409ebe3a1e84a38857373cc86e7146fa195b309f2494ed754e0588bf8a3340c2a6565407d8a6e9b1302bcb12adff4b8"}, {0xe0, 0x10a, 0x38, "a68c46ddd0e15db9b6b116837f3da2b2cd2ef36f14865a661e3a91a6492c5d8f7f1c043cd4b12951362913f03e7a73f6173f627eac2396fd50763fb6ef28ea6ef1af7bf585ea9003b8c2836715ede6ecb47aaff27dbb016fd9e2ff2e7feab38383120125e4c666068aa62d0f7b5af18a512f5e39d035d8736a770c22c4ed6d3fb69eb97fbe4f2d7e5c31ff84ccc48f18000726541d144c9cf5bb5452f6b25213af4fbea076f1d6b61e4a9c4335f140c8524f7beadd4a65b0ca3f48ee3249b0b171b426661f741e930e5c10695f"}, {0x80, 0x110, 0xfffffffffffffc00, "1d78f22fb216cc43b504ea4c8ecbc2af5052cd895e5dd81930365c2fc442997d1683de96cf65e8ff19fa2a51b690acde26ed046d0a6d1029df104505b235aacd13de8199ab3c70a9052ebeabbb62c890c51f4ac55abfeb72c5219c3698679d60cc1cf931c8be1fb90440"}, {0x58, 0x115, 0x4, "38f89daee111e3d40756cb87ad0859ecbf6fecaf836eef0e95e1650ee2ead765070679f8a6c2897ee2b705e294105ba296e7c5445810bb999bd0702e1ffbb581dc78c18e9ebc6306"}, {0x208, 0x108, 0x7, "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"}], 0x14c8}, 0xfffffffffffffff9}], 0x1, 0x40c0) r3 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000001280)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_DV_TIMINGS_CAP(r3, 0xc0905664, &(0x7f00000012c0)={0x0, 0x0, [], @bt={0x1, 0x0, 0x3b2f, 0x7f, 0x8001, 0x4, 0x1, 0x2}}) 14:18:36 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:18:36 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:18:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={',! ', './file0'}, 0x3138) 14:18:36 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) 14:18:36 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(0xffffffffffffffff, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:18:36 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:18:36 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x2200, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000280), &(0x7f0000000400)=0x30) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:18:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={';! ', './file0'}, 0x3138) 14:18:36 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:18:37 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:18:37 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:18:37 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x2200, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000280), &(0x7f0000000400)=0x30) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:18:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'0x0) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)=0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0, 0x0}, &(0x7f0000000440)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) fstat(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)=0x0) r10 = getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600)={0x0, 0x0}, &(0x7f0000000640)=0xc) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) r15 = getegid() r16 = accept$packet(0xffffffffffffff9c, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14) r17 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000a80)={0x0, 0xffffffffffffff9c, 0x0, 0x5, &(0x7f0000000a40)='nfs4\x00'}, 0x30) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0)={0x0, 0x0}, &(0x7f0000000b00)=0xc) getgroups(0x6, &(0x7f0000000b40)=[0xee00, 0xee01, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff]) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000b80)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000bc0)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@initdev}}, &(0x7f0000000cc0)=0xe8) getresgid(&(0x7f0000000d00)=0x0, &(0x7f0000000d40), &(0x7f0000000d80)) r24 = getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000ec0)=0xe8) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r27 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000fc0)='cgroup.type\x00', 0x2, 0x0) r28 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000001000)='/dev/video35\x00', 0x2, 0x0) r29 = syz_open_dev$vivid(&(0x7f0000001040)='/dev/video#\x00', 0x2, 0x2) r30 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r31 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000001080)='cgroup.type\x00', 0x2, 0x0) r32 = accept4$rose(0xffffffffffffffff, &(0x7f00000010c0)=@short={0xb, @dev, @rose, 0x1, @null}, &(0x7f0000001100)=0x1c, 0x80800) r33 = openat$vsock(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/vsock\x00', 0x800, 0x0) pipe2(&(0x7f0000001500)={0xffffffffffffffff}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000001540)='nfs4\x00'}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000015c0)={{{@in6, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f00000016c0)=0xe8) stat(&(0x7f0000001700)='./file0\x00', &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r38 = gettid() stat(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r41 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000001940)='/dev/video1\x00', 0x2, 0x0) r42 = socket$vsock_stream(0x28, 0x1, 0x0) r43 = openat$vsock(0xffffffffffffff9c, &(0x7f0000001d40)='/dev/vsock\x00', 0x40000, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001d80)=0x0) lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x4, &(0x7f0000001e80)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff]) r47 = fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001ec0)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}}}, &(0x7f0000001fc0)=0xe8) lstat(&(0x7f0000002000)='./file0\x00', &(0x7f0000002040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r50 = accept4$packet(0xffffffffffffffff, &(0x7f00000020c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002100)=0x14, 0x80000) r51 = bpf$PROG_LOAD(0x5, &(0x7f0000002580)={0x0, 0x4, &(0x7f0000002440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xe81, 0x0, 0x0, 0x0, 0x7f}, [@generic={0x3, 0xff, 0x46b, 0x1, 0xffffffff}]}, &(0x7f0000002480)='GPL\x00', 0x8, 0x87, &(0x7f00000024c0)=""/135, 0x0, 0x1, [], 0x0, 0xa}, 0x48) r52 = openat$dsp(0xffffffffffffff9c, &(0x7f0000002cc0)='/dev/dsp\x00', 0x100, 0x0) r53 = syz_open_dev$sndctrl(&(0x7f0000002d00)='/dev/snd/controlC#\x00', 0x1, 0x0) r54 = socket$bt_cmtp(0x1f, 0x3, 0x5) r55 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000002d40), 0x0) r56 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000002d80), 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002dc0)={0x0}, &(0x7f0000002e00)=0xc) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)=0x0) lstat(&(0x7f0000002f00)='./file0\x00', &(0x7f0000002f40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003000)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000002fc0)='\x00'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003040)={{{@in=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@local}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180)={0x0, 0x0, 0x0}, &(0x7f00000031c0)=0xc) r63 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000003200)='/dev/vga_arbiter\x00', 0x50b200, 0x0) r64 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000003240)=0xffffffffffffffff, 0x4) r65 = socket$packet(0x11, 0x3, 0x300) r66 = accept4(0xffffffffffffff9c, &(0x7f0000003280)=@hci, &(0x7f0000003300)=0x80, 0x80800) r67 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000003340)='/selinux/status\x00', 0x0, 0x0) r68 = fanotify_init(0x14, 0x400) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003700)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003740)={0x0, 0x0}, &(0x7f0000003780)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000037c0)={0x0, 0x0, 0x0}, &(0x7f0000003800)=0xc) r73 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000003840)={{0x3, @bcast}, [@rose, @null, @remote, @default, @default, @rose, @bcast, @bcast]}, &(0x7f00000038c0)=0x48, 0x0) r74 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000003900)='/dev/sequencer\x00', 0x40000, 0x0) r75 = syz_open_dev$radio(&(0x7f00000039c0)='/dev/radio#\x00', 0x0, 0x2) r76 = bpf$MAP_CREATE(0x0, &(0x7f0000003a00)={0x1, 0x2, 0x2, 0x8, 0x2, 0x1, 0x4}, 0x2c) r77 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000003a40)='/dev/dlm_plock\x00', 0x100, 0x0) r78 = socket$inet_dccp(0x2, 0x6, 0x0) r79 = syz_open_dev$vcsn(&(0x7f0000003a80)='/dev/vcs#\x00', 0xff, 0x4240) r80 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003ac0)='/selinux/checkreqprot\x00', 0x6800, 0x0) r81 = socket$rxrpc(0x21, 0x2, 0x0) r82 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003b00)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003b40)={{{@in=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000003c40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80)={0x0, 0x0, 0x0}, &(0x7f0000003cc0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003d00)={0x0}, &(0x7f0000003d40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003d80)={{{@in6=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000003e80)=0xe8) r88 = getgid() sendmmsg$unix(r0, &(0x7f0000004480)=[{&(0x7f0000000100)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000180)="9f5e9c1fe1924230194669905ea7de639c11a5d26165c6a1891329b7081f9acce8f2f1401cb4e7da3ce20f35c03e0759872d420147a3bdab204e39199b766270d927a5959f9718da6068ebcfee92a3a66a71dd7dd6c5e28f84a0f8fc2a8929a8b61537c843b5352bde3037cb725d5456b4d42cbb781c", 0x76}], 0x1, &(0x7f0000000740)=[@rights={0x20, 0x1, 0x1, [r1, r2, r3]}, @cred={0x20, 0x1, 0x2, r4, r5, r6}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @cred={0x20, 0x1, 0x2, r10, r11, r12}], 0x80, 0x48041}, {&(0x7f00000007c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000900)=[{&(0x7f0000000840)="1580101bcf312542e100ff8b6091c5a657cc212c7ccdd39e638cdcf10aa51e8c77439db1c65fa429cde95351e13491d2cff08576ae3af1d76946fad9c335ce7d5dc522af40701f590e462ffad059ea3d1ebbb205800b8edf2672881c45cd8776824c49d056555ac86891661c17b6d01183637c677b1e6e968995294bd81af1c3460f042fb6f37e40ce61de79b8ac53507b731af9336321f7e8598e6cc03ac2d52c7a6affe1f5db", 0xa7}], 0x1, &(0x7f0000001140)=[@cred={0x20, 0x1, 0x2, r13, r14, r15}, @rights={0x18, 0x1, 0x1, [r16, r17]}, @cred={0x20, 0x1, 0x2, r18, r19, r20}, @cred={0x20, 0x1, 0x2, r21, r22, r23}, @cred={0x20, 0x1, 0x2, r24, r25, r26}, @rights={0x20, 0x1, 0x1, [r27, r28, r29]}, @rights={0x18, 0x1, 0x1, [r30, r31]}, @rights={0x18, 0x1, 0x1, [r32]}], 0xe8, 0x8010}, {&(0x7f0000001240)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000001480)=[{&(0x7f00000012c0)="a61863586773f77e10d086b3b86743098cd7098c68c6d66432a2ca4675247694890b9e923d750cad94b42f589d53e259fad4abffd8f3dec1ea27d1fe26592c577c26cbb0f8ffd81fde50eee8b2d22e0dd3e09fe8fb2ce87a8678159517388fbcbf73565d3bc80552e6ae9c6cb50d15a451ee6352f35b71f5ccb1b640a42235d07979929addcc335a4a4fea918dce9d1cbe2f74ac8205c0bde9764710d72983", 0x9f}, {&(0x7f0000001380)="f598aa43e1dab11b19c377f881fe5c175ba372349450feb9356962df28f8c3d87696596222062493b688d77141c54b5695c8c0b835c7a252b9e2d1a5b3c8de80fdd2b7cdbd4f8ea198e654285ecab1931aef2c0dabb3b862d060fd79094778975ae13cbea55ba5bd1323d6332f6a10c672719f966dc7d8fb0da46f6b6dc4151bb630fff1e31b31b9194d93bef5cdeae4d30723a491236365c6b3bc1abb5e78686b3495013eb7dcdceb170e2a88e34afb669912d779", 0xb5}, {&(0x7f0000001440)="a16a5ccdcc6270f4d787428a98a8b4494d410f823871b29b9b95a1a5a78456601bb8839ca995f99cf12b753d2948dfcce6", 0x31}], 0x3, &(0x7f0000002140)=[@rights={0x18, 0x1, 0x1, [r33, r34]}, @cred={0x20, 0x1, 0x2, r35, r36, r37}, @rights={0x10}, @cred={0x20, 0x1, 0x2, r38, r39, r40}, @rights={0x20, 0x1, 0x1, [r41, r42, r43]}, @cred={0x20, 0x1, 0x2, r44, r45, r46}, @cred={0x20, 0x1, 0x2, r47, r48, r49}, @rights={0x18, 0x1, 0x1, [r50]}], 0xe0, 0x1}, {&(0x7f0000002240)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002400)=[{&(0x7f00000022c0)="8617c27c512dd90aae523b3985b9b90c66f5a46aa49cc91e54fe1470b0ca0cd5a4c587f50d0a08b508d8f3c91985f6e2e0793f28cdd0298cb108aca8237472c84b73b1097a9e64c3dabcfc729549d9eb8b24cf803770239db0333e10681a868d1412a935c6b5", 0x66}, {&(0x7f0000002340)="92ab24c4b0faafcba3530db8746607cd4b562da83644ca1ca543bbd7edc4a2", 0x1f}, {&(0x7f0000002380)="6cac5b184c8912c30445c8ce8b573a978a44e826e867094dcce5024374adf2711320a0ede58b9299b653bf46e251cd4a4d9545d036df845a9c2058fe76ba936906c0871fcb5762c078d9fb529b0da8e0c5f2557034509ed0f93cd29aeea58917ea61c5", 0x63}], 0x3, &(0x7f0000002600)=[@rights={0x18, 0x1, 0x1, [r51]}], 0x18, 0x8040}, {&(0x7f0000002640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002c00)=[{&(0x7f00000026c0)="4ca50f40096a5f125d8d4ecd7595201e6c7262e660c6f8130af7e491f497e45403467be5bd95", 0x26}, {&(0x7f0000002700)="67d362661b13d13a3a183df42dfd5a358739f2fbbbb2c885e5d2c22eb8015e40908bd199cb1be6e13386070dfdb7ed716caec76717233d68f399ef7ad682cb908001ce747a69d661", 0x48}, {&(0x7f0000002780)="d450072f70ba35dd586be665afb67fb489280b2602a8148f3332444ce6d530bf3c34ddb75f88fb9581be440d3ce24e5d853b25f33000d50f927d255fd17a983afa0c75ad918500230f415b8772ba98a7c40c975cc15008c5bb9041130eccdcb945a6fff4aa13ba7ecc2c29a75e6b05d95f3c8a5a7ddf575d11018c83bed729b42636b8faf70ac456829b077c64b640a32ba1f0a63c85b8cc0a0dc339777a7f1aee5ba6999816475a336b398ac3083b813b5edb69c3d504b936ba1ed9620e4e31ee968861d6cd5eb542df5b3c", 0xcc}, {&(0x7f0000002880)="a4effcdaa57ea9fa013e6f6dbc432449959cebb473f4896a775cbd9a9c1d525623b8413cc7558bf33bdb7ac159031df7190f0c81a690407ab09918cd768fd6015d9920a734d8a6fffffafdafa13c9c7a21f1ee8c78d35dc1611946f54891afa4bc1777cc", 0x64}, {&(0x7f0000002900)="aee3fc8b0c10f33e25c30b77ad3914d1edba9b2517dcb391c07b8bc756c342d6563703939cf7a8cab90f6258769e1d496fd41d1e51baed0a1f78c6ee87c4e60083eece6afd23e4", 0x47}, {&(0x7f0000002980)="7fe95475bb43a48723b3db81f1ddcb8d2ff8653d69ef5e8a96e6887a6d103672d55fc2740a08a939285f0f6989cfcafdb7c0114799d08c1c22f9d847609c3a06de473accc48baf3b17bdcaa135092a2f5f873badcc5aaf226486c9903cf41d17c94ab9cf9be42df003fb96ba61526453fffcfe12014256e00c7ddc070e8039b6eab15447bf3a1de8d2bfcec49f7f03b5aea7c9c90e63a2e1ccadea08b1a814f58b967addbc1199fabbacc634860e5ea9daf24ccc095e2f5a2d352cd77b18b7b1b9ce643ed5aa0e16fa1fc874038c2da09a8d433db9159f623405fc7877095d95cb93f7c77d77b4aea2e9f84bad277e42376e7e", 0xf3}, {&(0x7f0000002a80)="d9a306616a388f1ec95caca4a5e74de19505ad12773905328e8b2fa4dc8476905336044813adfb8a18c59aa5a5f6c369126e", 0x32}, {&(0x7f0000002ac0)="fa3506b7fb7f6dbc83c512ce64ca69721e36668910a4b6b4bc5a544f58494ca137b266759a4369a1b8ac1ce9c03ca44188785fbe5165178233b790b131bd6b032e467d9748b9b9f0f55553b038fdc6350d34e16d52afa5959629499d8a4b46089f0f4a017415c51a181dc3f453a2", 0x6e}, {&(0x7f0000002b40)="d3eeb0f24c3609a0976c19e5c028ea8912154c03f2653cf987b712d86a28680a58d0a3fa958f66405573d58b18c8d1492a", 0x31}, {&(0x7f0000002b80)="f3f696bac9c8e6ea91bc79cc92fba53dad1b34d37e34c5397b027b8b4f7866f7b573c8cf6e7c77afac518b35e728496f30c3e652d60893f2e9fca9fce734dae0d3780da22efcc59290b9236a772bf69903dcdef055634bee5c1b25c63fbc05a48cf168e7cd19a1160268e816c5ee151a", 0x70}], 0xa, &(0x7f00000033c0)=[@rights={0x28, 0x1, 0x1, [r52, r53, r54, r55, r56]}, @rights={0x10}, @cred={0x20, 0x1, 0x2, r57, r58, r59}, @cred={0x20, 0x1, 0x2, r60, r61, r62}, @rights={0x30, 0x1, 0x1, [r63, r64, r65, r66, r67, r68, r69]}], 0xa8, 0x4000}, {&(0x7f0000003480)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f00000036c0)=[{&(0x7f0000003500)="c0b1592e26f6a5cc9027471a9705f5c57ff358", 0x13}, {&(0x7f0000003540)="9c51d13784b8e55f82c84400fbb4963d43304c88d26e520ca6d8ed4ced54b37ef2b28af4a412c87d52e2ef313a7f75b8f7458999601c55ed4f87a85587c520bc7e088793efc119553584e63985401b76f6786ed964fff30dcc6257420a2b6724660f82dbc77d4783b60eae0c255b40ceb1e594495d083efb8c8c3ab052f50a2ff94f8327fcbb9a66ac774ce96eb9ffa31578e6d03da18a2b8deda4dc080d18abc90fd3498c29cab020379f291194de2acbd89eec3c605a19e83a53aa44915406fc88fc8aee187caf5006d6bad1ef1d", 0xcf}, {&(0x7f0000003640)="6057c929d73cf3dfe15bc47ddee3e74067b3c9bee66387917a89f960fff7500fd98a45f280ab3328a47c2b26c0219ce379ac5b1a99cbcb2f40826fe3e3153694064400532661d63175958b309bbe87b361106e24445ba099c2eaf6ea3ce759d28603014641c5", 0x66}], 0x3, &(0x7f0000003ec0)=[@cred={0x20, 0x1, 0x2, r70, r71, r72}, @rights={0x38, 0x1, 0x1, [r73, r74, r75, r76, r77, r78, r79, r80, r81, r82]}, @cred={0x20, 0x1, 0x2, r83, r84, r85}, @cred={0x20, 0x1, 0x2, r86, r87, r88}], 0x98, 0x4}, {&(0x7f0000003f80)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000004400)=[{&(0x7f0000004000)="e2", 0x1}, {&(0x7f0000004040)="18e946708daab2c01fdf8d08b5060c74f162bb3eb240ca477ea7531646ef8718f641da57a37c880f973d1235682d14d2eb56eff5015c8560f3456ceb10a88fdd74ea51270cc8ea117e3e478fc5ede01ff748810e0ff4f1f6bd1690b352a49eb64743c5a1a734ff3f082ac0398bb7e01a729b83c55668f1ad16cc937988e5bcef563ba3abdad4c4241fe162c95692ab033603f53b1e626d8122b4d0a2b0971795514a6ee0cf79b6090e4da1c0b717e796a9e098ade380eb606cc1260eba645265fa815b22f85edf9d", 0xc8}, {&(0x7f0000004140)="dc38eabb38be1350eba677c8b13b90c6a77c7ec1f2989d3880e7ec13aa1adb2296bf3aa11f3c2c543535d85b6c57440d4470d0d6b19f7761fd9cea08c21793eb0cc3cdfabe05004218f691acf902e422717b5e5bb16b93114c8718b8", 0x5c}, {&(0x7f00000041c0)="df92fa0a6ad51dd303fdec1c785f9fca345dbbb74fb0d8f4e200c16541c42d1c3a23d1840dfa3132ec0635ba1f4d4ca3041c61ba698be3", 0x37}, {&(0x7f0000004200)="783b1dabfb4cb42ab3a57a22129560ad3af5b2e71db9abb5c81d87bf13ef2e05e6b8682a4d9f84f9", 0x28}, {&(0x7f0000004240)="82da6dc591ce6f0a80b59ff843851a4925d3607ea0cf0de1888549ccc5ee70d32c61a36e7be253e77a1dd18b7032188ae003f6512f61ef0d8c66f8a52fc29ba2e1409588e55af3b210df1979c677a74294622293c71cc83f6398a3edb37a807c0565ef6f2848d97eb1fcd4bc80ad66c73f3683af7d576c6de0a0861d16d159ec752581080c137b8b669861514dce9c8c16bee0cd2f9bb54c918c81bc24084835d64e090151051799c77221b598c4366381f3bf029758064d5a95b1c56fa93dbb078a212fbb9960377a0fa01d1c28a54d26e378a37ab1e87b3f2dd9abb9236d2e5bee9f2f236942839b524e63fb193bbe7063ec", 0xf3}, {&(0x7f0000004340)="c20549242fee13e2dcf0721502e530616b195b70b98a95a18e18686d2b95d25ab98189befc2fbd3066", 0x29}, {&(0x7f0000004380)="556f8d95c0049e9e16fc1e6a8c261b70274515afe293f0a4dd0b17271233fc7b86bca797539d2459f9722d157e8bf81de34163b91f18d2f142e3d05923ab7998585db22a8949621869469d4a9215ce50d3cf3ea2fee28cfe9d94739795fc701fcf3092fe43cddaa1c695d77a24be", 0x6e}], 0x8, 0x0, 0x0, 0x40}], 0x7, 0x40) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x10000000006, 0x0, 0x20000000, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x1, 0x0, 0x0, 0x0, 0x1}, 0x2c) mount(&(0x7f00009f8000), &(0x7f00000000c0)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) 14:18:46 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e666174000204010002000274", 0x14}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) [ 291.873779] protocol 88fb is buggy, dev hsr_slave_0 [ 291.879054] protocol 88fb is buggy, dev hsr_slave_1 14:18:46 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x2200, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r2, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:18:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000100)) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140), 0x10) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f00000000c0)={0x34, 0x0, &(0x7f0000000080)}) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r2, &(0x7f0000002ec0)=ANY=[@ANYBLOB="ff0700002f66696c300a"], 0x3138) ioctl$DRM_IOCTL_ADD_BUFS(r1, 0xc0206416, &(0x7f0000000180)={0x8, 0x2, 0x9, 0x1, 0x10}) 14:18:46 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400", 0x15}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) [ 292.032182] protocol 88fb is buggy, dev hsr_slave_0 [ 292.037354] protocol 88fb is buggy, dev hsr_slave_1 14:18:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000100)) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140), 0x10) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f00000000c0)={0x34, 0x0, &(0x7f0000000080)}) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r2, &(0x7f0000002ec0)=ANY=[@ANYBLOB="ff0700002f66696c300a"], 0x3138) ioctl$DRM_IOCTL_ADD_BUFS(r1, 0xc0206416, &(0x7f0000000180)={0x8, 0x2, 0x9, 0x1, 0x10}) 14:18:47 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(0x0, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:18:47 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400", 0x15}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:18:47 executing program 2: chroot(0x0) write$P9_RMKNOD(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) writev(r1, 0x0, 0xff73) listen(r0, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x1db) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r3 = accept4(r0, 0x0, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{0x40, 0x0, 0x0, 0xfff}, {0x6}]}, 0x10) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0xfffffd55) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x14, "d6d3182de218921332dd19216228c23ec30e829f"}, &(0x7f0000000080)=0x38) 14:18:47 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x9, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) [ 292.375620] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:18:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000000)) 14:18:47 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:18:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x4e, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000d80)={0x1, 0x8, 0x91, 0x0, 0x0, [], [], [], 0x8312, 0x52e}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fstat(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000400)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@mcast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000440)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f00000007c0)=0xe8) bind$unix(r1, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) lstat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000009c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000a00)={{{@in6=@ipv4={[], [], @dev}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000b00)=0xe8) stat(&(0x7f0000000b40)='./file0\x00', &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000c00)={0x0, 0x0, 0x0}, &(0x7f0000000c40)=0xc) getgroups(0x1, &(0x7f0000000c80)=[0xffffffffffffffff]) fsetxattr$system_posix_acl(r0, &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x5}, [{0x2, 0x4, r2}, {0x2, 0x4, r3}, {0x2, 0x7, r4}, {0x2, 0x2, r5}, {0x2, 0x2, r6}, {0x2, 0x4, r7}, {0x2, 0x6, r8}, {0x2, 0x5, r9}, {0x2, 0x6, r10}, {0x2, 0x4}], {0x4, 0x2}, [{0x8, 0x0, r11}, {0x8, 0x2, r12}], {0x10, 0x4}, {0x20, 0x3}}, 0x84, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000480)='./file0\x00', 0x6009, 0x1) mount(&(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='btrfs\x00', 0x0, 0x0) [ 292.672163] protocol 88fb is buggy, dev hsr_slave_0 [ 292.677349] protocol 88fb is buggy, dev hsr_slave_1 14:18:47 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000040)=@ipx, 0xc0, 0x0, 0xfe7d}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_vs_stats\x00') preadv(r0, &(0x7f00000017c0), 0x1a4, 0x0) [ 292.832151] protocol 88fb is buggy, dev hsr_slave_0 [ 292.837282] protocol 88fb is buggy, dev hsr_slave_1 [ 292.844027] print_req_error: I/O error, dev loop9, sector 16 flags 0 [ 292.850962] REISERFS warning (device loop9): sh-2006 read_super_block: bread failed (dev loop9, block 2, size 4096) 14:18:47 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x2200, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r2, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:18:47 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:18:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x40000, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x800) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x600042, 0x0) accept$alg(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x800, @empty, 0x5}, 0xc) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0xb) [ 292.929347] print_req_error: I/O error, dev loop9, sector 128 flags 0 [ 292.940197] REISERFS warning (device loop9): sh-2006 read_super_block: bread failed (dev loop9, block 16, size 4096) [ 292.966442] REISERFS warning (device loop9): sh-2021 reiserfs_fill_super: can not find reiserfs on loop9 14:18:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000000)) 14:18:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e23, 0x1000000, @local, 0x6fc}, {0xa, 0x4e23, 0x7f, @mcast2, 0x100000000}, 0x3, [0x7, 0x8001, 0x4, 0x0, 0x400, 0x1, 0x8, 0x5]}, 0x5c) [ 293.232137] protocol 88fb is buggy, dev hsr_slave_0 14:18:48 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x2200, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r2, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:18:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x4e, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000d80)={0x1, 0x8, 0x91, 0x0, 0x0, [], [], [], 0x8312, 0x52e}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fstat(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000400)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@mcast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000440)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f00000007c0)=0xe8) bind$unix(r1, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) lstat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000009c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000a00)={{{@in6=@ipv4={[], [], @dev}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000b00)=0xe8) stat(&(0x7f0000000b40)='./file0\x00', &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000c00)={0x0, 0x0, 0x0}, &(0x7f0000000c40)=0xc) getgroups(0x1, &(0x7f0000000c80)=[0xffffffffffffffff]) fsetxattr$system_posix_acl(r0, &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f0000000cc0)={{}, {0x1, 0x5}, [{0x2, 0x4, r2}, {0x2, 0x4, r3}, {0x2, 0x7, r4}, {0x2, 0x2, r5}, {0x2, 0x2, r6}, {0x2, 0x4, r7}, {0x2, 0x6, r8}, {0x2, 0x5, r9}, {0x2, 0x6, r10}, {0x2, 0x4}], {0x4, 0x2}, [{0x8, 0x0, r11}, {0x8, 0x2, r12}], {0x10, 0x4}, {0x20, 0x3}}, 0x84, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000480)='./file0\x00', 0x6009, 0x1) mount(&(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='btrfs\x00', 0x0, 0x0) 14:18:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/sequencer2\x00', 0x900, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001100)={{{@in=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000001200)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001240)={{{@in6, @in6=@remote, 0x4e20, 0x5, 0x4e23, 0x2, 0xa, 0x20, 0xa0, 0xff, 0x0, r1}, {0x3, 0x861, 0x10001, 0x1, 0x2, 0x9, 0x7, 0x200}, {0x9, 0x3, 0x4, 0x5}, 0x2, 0x6e6bb4, 0x0, 0x1, 0x1, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x1c}, 0x4d5, 0x32}, 0xa, @in6=@mcast2, 0x3501, 0x3, 0x1, 0xea, 0x4, 0x0, 0x7}}, 0xe8) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r2, &(0x7f0000001480)=ANY=[@ANYBLOB="3321242e2ffde285ed35b2a53777dcf70072e40d3b691fab98a9e90d24b3ed084b37106e7991"], 0x3138) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001340)={{{@in=@remote, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001440)=0xe8) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2040, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r3, 0x40106410, &(0x7f0000001080)={0x1000, &(0x7f0000000080)="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"}) 14:18:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x4000, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000240)={0x1, 0x0, @ioapic={0x5000, 0x1a, 0xe9, 0xc81, 0x0, [{0x4b9e4c79, 0xbd, 0x9, [], 0x8}, {0x68, 0x0, 0x200, [], 0x6}, {0x2, 0x81, 0x11d, [], 0x2}, {0x8, 0xfff, 0xffffffff, [], 0x9}, {0x6a87, 0x0, 0x8, [], 0x7}, {0x7, 0x3, 0x9, [], 0x1}, {0x7, 0x46e, 0x1f, [], 0xc067}, {0x20, 0x4, 0xa682, [], 0x2}, {0x2, 0x40, 0x800, [], 0x100}, {0x0, 0x80, 0x101, [], 0x5}, {0x8b, 0x9, 0x80, [], 0x8}, {0x5, 0x100, 0x1097, [], 0x1}, {0xffffffff, 0xfffffffffffffffc, 0x7, [], 0x800}, {0x7, 0x401, 0x7, [], 0x80000000}, {0x1, 0xfff, 0x0, [], 0x9e}, {0x2, 0x8, 0x3, [], 0x7fffffff}, {0x5, 0x2, 0x3, [], 0xffffffff}, {0x800, 0x97b2, 0x20, [], 0x3}, {0x5d, 0x3ff, 0x401, [], 0x9}, {0x10000, 0x10000, 0x4944, [], 0x401}, {0x200, 0x80000000, 0xfffffffffffffbff, [], 0x6}, {0x10001, 0x401, 0x200, [], 0x4}, {0x9b1, 0x1, 0x8, [], 0x6a}, {0x401, 0x4b, 0x8, [], 0x5}]}}) ioctl$sock_rose_SIOCDELRT(r1, 0x890c, &(0x7f0000000080)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1ff, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00', 0x1, [@bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r2, 0xae03, 0x80000001) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f00000001c0)={0xf5, 0x0, [0xb4, 0x0, 0x0, 0x9]}) 14:18:48 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:18:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vsock\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x0, 0x1fffffffffffff, 0xfffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, 0x0) close(r2) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xce, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r4 = add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f00000001c0)="153520ae1e3b8f747ac285572a549ffe3c9f09fc8a2cc8abbab655c8953df46ff4eef00fced831ca9af9c813fd8c5e1674d6dc1d7cbdf94ca72af65e94c804c3109115070b9ca4767aeae60fe2fe3fb715dfdec6fa9afc7e3170876cbdcff42ea24e", 0x62, 0xfffffffffffffffc) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r1, 0xc0105303, &(0x7f0000000480)={0x5, 0x12b, 0xffffffffffffffe0}) open_by_handle_at(r1, &(0x7f0000000340)={0x91, 0x80, "a6f34a07254b14fe04830bfd1feb4d480ac3c91329584b3f41b5e7ec91e766c37814b48d279a8766ba264302e9ff676e3e3b548ac9ed6a6f6abb6ec3a82c36da85130db7788d37b81054fa513224ce8e82bcef255402802cda26109ac4dd19d89d2a93d815c904d1c1543e44c13288e061005d28abc3f7da65c957b6f05bc76c0fda0d5f692320afe2"}, 0xc00) lsetxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x32, 0x7, 0xffffffffffffff01, "a3ee7364f2d62528d09041da2237e69d", "d4a7856c833fc69f2151465aaab845c233318caffee9892ef1787e46ef"}, 0x32, 0x1) shmget(0x0, 0x2000, 0x200, &(0x7f0000ffd000/0x2000)=nil) shmctl$IPC_STAT(0x0, 0x2, 0x0) keyctl$restrict_keyring(0x1d, r4, 0x0, &(0x7f0000000540)='wlan1em0\\(mime_typewlan0ppp1ppp1proc[)}cpusetvboxnet1securityppp1self\x00') ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, 0x0) ioctl(r0, 0xc2, &(0x7f0000000080)) ioctl$DRM_IOCTL_MODE_GETCRTC(r3, 0xc06864a1, &(0x7f0000000400)={&(0x7f0000000280)=[0x7fc5, 0x1, 0x1ff, 0xcf], 0x4, 0x705, 0x7, 0x10001, 0x100000000, 0x0, {0x5, 0x4, 0x24, 0x3, 0x3, 0x756, 0x600000000, 0x8, 0x5, 0x7f, 0x80000001, 0x400, 0x9, 0xe4, "460e5debb6c52dcb03a3fed39469a77c25c8da3d22b2c6097645ab353cacd7c2"}}) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000000)={0x0, 0x3, 0x1f, 0x80000001, 0x1, 0x3, 0x2, 0x7, 0x400, 0xfffffffffffffffa}) connect$inet(0xffffffffffffffff, &(0x7f0000000300), 0x10) [ 293.648911] print_req_error: I/O error, dev loop9, sector 16 flags 0 [ 293.661908] REISERFS warning (device loop9): sh-2006 read_super_block: bread failed (dev loop9, block 2, size 4096) [ 293.683714] Unknown ioctl -1072671997 [ 293.707643] print_req_error: I/O error, dev loop9, sector 128 flags 0 [ 293.722367] REISERFS warning (device loop9): sh-2006 read_super_block: bread failed (dev loop9, block 16, size 4096) [ 293.757857] REISERFS warning (device loop9): sh-2021 reiserfs_fill_super: can not find reiserfs on loop9 [ 293.761608] Unknown ioctl -1072125377 [ 293.851109] Unknown ioctl -1072671997 [ 293.901078] Unknown ioctl -1072125377 14:18:48 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:18:48 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x4000, 0x0) 14:18:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x1013f}}, 0x20) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{}], r1, 0x1, 0x1, 0x400000}}, 0x20) 14:18:48 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) tee(r0, r0, 0x1f, 0x2) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0x1, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="bb"], 0x0, 0x0, 0x0}) 14:18:48 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:18:48 executing program 3: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) r1 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x517c, 0x2a0000) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f00000001c0)={0x9f0000, 0x2c, 0xffffffff, [], &(0x7f0000000180)={0x0, 0x3, [], @value64=0x10001}}) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000300)={0xc, @remote, 0x4e21, 0x1, 'wrr\x00', 0x8, 0x7, 0x56}, 0x2c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0xa) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000200), &(0x7f0000000280)=0x68) r2 = perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x4, 0x0, 0x800000000, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1ff}}, r0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_out(r2, 0x5462, &(0x7f0000000080)) r3 = socket$inet6(0xa, 0x3, 0x3f) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8) accept4$alg(r1, 0x0, 0x0, 0x80800) setsockopt(0xffffffffffffffff, 0x1f, 0x9, &(0x7f0000000580)="faf592f38e7dbc03caf75892ad1c8ba08dbb9cbc9814d543d82934eead5a62f6a862c3f2a6218eadade7bda233cf69359ed3a4b80545a0dc1b70f748393049da73a72be0a6c01dffb0828f82b04da0a7cccee5aa14448af71c458f39dd2ed6f41086f3733101967d5ff5165ecf7ed0277edeb51f1519fed7610093d986824f6ede427c51630aa6ac6cff79a319d3bbed4d496864c106a88abddc8bf959ddb26e395ba18c4adce2b4d1901067cc5ece989c18e4bd35c051dbaba92487bd09ac641333ab22c6617f1d23edddfd90b412a6ab51b813373b44415635b507f28c97506e3610e803398467b2483e9ae74c7da59327285d47a238439f4e0789ea322261abc69b59b638c97a539ff7e9c04520a3b5ac92706fd16c55555191b6f428648cd4cacf2d1a9520b0ac60ee93fdd250acd305ff3150c8aceb17c4169653f1cca2d57d9eafbdf41a04b5bea027abf7ec69e8b11f4336bdcd2cb1186974a7084eb9912ac6b55c63bd1f6e64a65b5b6ab69d614e2e8900e9a0ee8f8e85015d034f562e4f87f387ead1bf433a9441f3d796b47c0bca0930b8954854abddb4618ae8ca7a220634cb26e9c9b6f3858be346975d7292ff2d7dbd89f378da148fd69ff90d5b8b69b4efa8c069aae11007042534f897f393b7e4e482b2b47d2e0d1f441e76cf2db78fb4d42ce6fd00e056cf80d911f4d85f6d2be6cdaef66949368e1b5ad8bdf9c64c3f4e58f97a803f0468ace98e88852e3e82fdb4b911f13bfbf37dc9e0147cba45c0064fade7ba081dc87d6a7ae33be3a3e400e2133bd39101ff4b634228e1200928eab05dad5a8d603224988fc9d87dce44160bca262f839f40a702e65e7aa5aec1f3c0972409ab169133a8db742de75fca32a69649a25254b6be615f002540d5aa8e964ed54d30b8d1c639ed2ad3078c3927c7ed2f3b83ce713db1095ca7ec70c94db746cbe32d8d010131b5985fcd1b79561d050f452d62b9ba3aa8e46506312f143ae9e88f38e40da7c677eb11ab7fceee7f226a3dbb978a5494133a1344f6c18a91eeb12e2048e1da326cc0379179965c5fe9c289fa3a3381ef126d9664a9490d9b9e3e06d016955db4f7f1a1b6fb0c902a04a29f08fd0e1511fdc234a7f49f011ad8a7eeeecbb005247531cd90f1810547a5e39dc1faaa60cdd8b1f323e6dd6968955b796e794e7cf0f769513e67ac602d4fabb5e3779255864456643134070d905e6a1d1944e5614ab793f1eb15802e4816e8b6c09f3ef5bf7ca6435b01f4eae253f737355026066a3464ff57909d567aad12ece484aa9e690e6ac982c581542c7cacd0632ec55da799bb7ceb232d967a695f3458d59550bac3e05e14297f37758c69b5a088cd70579bf612ee061acf03ca776e9095e75dfef5c772043269a0adc35cff7faf6e2008101e041c75af57d3e59a8ee281d2caa4ac8ec76b5d9f7f2615dd4714de80cbde62a56cc3e267d30014795396a7b68e6a0f835b56a6a4ccfad5e5b2a70c22430da8f155eb8cd922b4cf55d5fb0d10cf7cf3a2e95d44c6aeeb45a6c3f3907b8371c2b110604fcdaa175efea4affc95a855aef0309e7db6045aa8cfeab94c247ce30ec984a2b431bbc7a14fa5190cc1af415f344d37ac1bcfdb2fd0f1d3891da86fa3b789e74001d6fe1d268939359b8948931584097f7a4db328079f4c17a8432d32e6e897c7dc8c1f52ac2f70a4d6c8440614602bad16ee2e9e720a4be9083e2b2ef0c7bddf5c26cdbe2ebc0a56472ecf57c137e89995b11ed917a727625c204a28c8cfff3d59318eddffdfcdf0ec202a64b80a75e6c2669e9ec9c71ce483047f3d0b5be2e5b3bd85355a0aaace98ba73c2c8ab9ef2f7a2bce9a3b137a44e7d0556202eda249423ee6512a04a3160b75648bc364bad166b1165fd761edde8423b3c2a3462f3a12597aecea0fd27126b96de5816baaa5c68495665cebb445949a0464fa62caa0ee008fc47d7e7c8613579a543717942b64b946e8f3e71c911e624732cc43fb9b16374bfcd92eb7ee9ea812096db70c4a9696b5997950287b28c81b2e553ebb5e0a89c5fddeb17df6c2e878497181c9ed46deb8970c5745506207fd7f8ff75abdb5e04175433aa89dfc8bad2724bc8b1c93e79c5f6640c315cb262345718c785f0105f30c5fb2bd100c62fb5f14b94809286ae3aad620e934e94bae5e1a42da37d3cd0fdd3219cb1343dc75f9b2085621c2949eeebfa93773ef05569d5b7b2b9c2fa6c335734471f014c72cdc9256044c442e74b649150b85168c7754dd9abfa04e950abf3dff7f0a78cefc90396920273c73a75f5e37e7df2f1cd3c4b1cf9217d5d7dc2a9fb7671d3c45823a2a54dd07709b5eeafeee30a0b6edd6bfa2ffd53646a1bea448b4c81988dd9c75d890806679da81b82c12267025bad3231f72a3d6ec0c869fe46919830073a71e283d1a1b93a516c4997373c5b4f3d51093acd4d5a9c0f3b2e8ad136044880b4252fac917ab78ed40828bdc7324e6b725b598cca88c85ba04e2f99a8bba54577b8609742d3a43867d01212d4142ef8159d8912710cb1d85a6a1d07e45b939ace460c514491abdb42081f0ba5ef606cb82759ffe188eae878aaf551daa50e4817a0bd50476ae0d384db7e96a4404c753a9cc862ba75521fe62b32823dd97ccd7f7fc2bf6e61a2881a7310c47af526c9fb25e67b46c0f8fd95809fb1163766b495e7e90ff0c339462074e1a0c4efd81a79517ccae1f4666ec88ff92043c162b79aa146dc14be76d01860626834c4d4ca04fcc07da92cfe4b77bb7fe835d2993a0548eca186a6b7162d38ba8beae1d04e8a180f2de082c236984331609871d5f581c2827c8399ef0b9f799f54e31c29bbac7865e85df4ef765b66f3a6a7b2b36f014dcc1d3534f322f23551b74b343c572bcba41577ea70031652e8f27f039bb2902eba28e7def83a4920de730d05db6a93cebcb72da296c22f76b2a8ea6daa32de04ef0bc92001afdedcb726ae8c08429f2f68434157ca1199800750976a700167853149f440238dcc4939c5d1d19362ae23ad663caa31a05c3c10c1f8b8bd86651bab48977009e7e8901317f0068dd0894c99a3d2eb306d9e55bb01a11161a6e39eb1c18f23dbb1d25adfb272ac89d704734d41e0fe0f21c4f858530fc1b39dce9a8ec2f1716774415a3afddb269fd58522410e1fe4237ac029ae2c5faf3af3f03065dfa4e938b1e587273c6b074f40efb0c0d6e1eeb4d94f2ac521ed71f5f11936816b4ffa9d0af91d895aa9025fe6a1f9770a8cf6fc5d2139c6e9e7536fad3aae9d46cfb13bdc4dae8a244dce41ecbccafb078283ed3368d3f1147855858f90c27a4d31e5316bca573379db39d81c8e3890b993927ca1fe0e7660e253d280faffc6aa17e59031e2ac93db64c563869ff198a256a5187ef7e9511e21646c61a8ba75f1f8e88574a87b47b5b1592475adbf1b8dd082588192dee1eebdfe4fa470479de10db2beb4481deb6041ee879c42ac016b36e242c2dd05dd1c8bee7a0857c633bba283872995d4bcd348368aaec3b415d582ea6efcf4e10c503441da35bc6f3132d1592b44eea1c9731b38c9b4446dfa46d30b580040dfa76bfdcebee9e2368cd59457becd3ab193fae5c13bfaedd9b42b974e4614c57806be2d423c652f8d9bfeb0430d2996dbc5b1cbb7a1f9c549dc7ec892e8d4207e0e239623c4c2af3f477fa1728e8dac0828d530a1113108f5abd742205c8dd1befeda2c8ea9da6a5a56c6ed87b46fd750c5c1951eabfd4b9f153e9588e8a783cb9e12df0078f3b459197f814edf629ed55c5e23fdceff306472a3948eabb5eb5b2432225c8b037a9dcae5add232375e49058f7bc540eed4d98ade39d8c458354f6d82cab1efef2173f5f6ab5a6f0e0b16cbaeee1e50292c042d7066d424e465a596b58c06bcf0ca6efdad458cd1568c08f8fc57c21264825612031d02c6c999aaa26b857cdead52f62e896aaebc2b5b1f91191786a5c25d2f776dd3a37982c59304a2bb985f09947c9ca59cfec3876e0076e1e5cc17c287719cbae2d4bdcd534407246005ab92292a2880680143ce5c47bb7a2ae563b4737015286d554bdeb87229154626922a688961fbd2df2b55aa5b19a7dd8b754bd3e164e2bceae4d5a99e3aac1504cbe6abe9e5e5efd16536550defece120ed34beb0619c036f81483690ead5b4a88c5ec2aab2a389c6f9750d1fd4ff6bfb791a3c0b565d772a743045d4aae7e34e453bee9a84a1c3c909a704c82ad1482d388ee0ba154b9cc4d966f85c35ec125a80f9e4a2f62558ec49cc5fad5b470fb07b69afe6fcce2f9d0e64356df7b5fba76783ab1f3720b6dcb70ee6850ae4590c1820595461646bac709930383c1c08928ffd8991ea1af15acd0f5682664dd9464722beaa511f8f0afbb7687a51aa23bf02d431b9a36d130d19ac6f1db7225c2ab9efff2471fc8bc00283ad04b2b848e9cf45eaff45a9802c23868f4b6c0fd6812080041cb4f94918f3f1ceb01a46e91af1a4d96fe01525ca137ab06e500564b7fe91308867ae77d8a685b46331850fa5e39c74052f020e92fc2e515e651b76c6da94546d82f5c4e553cb340bf9018e15d6e37592d144e52c994b810a963f058e4c91da04d91a2aac708c72a3db0ad1c120ece8f93996997c27773c55bb58e9e15ab05e56468bb303a1352784e07ea49bb4f60779ccaaa062d46cae3afd737a3b953b5c35fe70f87b34ec5d5408d49649fb3a934e4a0dbfdbbb7cb0fbe72a3b58bbbc02b60150ef153f33b5ec38f25395361191bc5796ab616187c06077a86d3523842a44bdc070d9d7b35612883d9f3ad70ce52daedbaa48eb5da33f1dca3feeac2d74626d194dfaafe81994ee27a8358bb5fca0c150f70da062f14492ff1301dc78167529c2eae39767bfb893b10b0f4928bb5909cfb0baa602cd70dd5c6b7259560d892e9d585a70b4a17b74ab4209f1421eb56854d4ef3bfe274eb2d78d0460aac5da748e2fca0142e9bbb7ab43d175f87ac0e9c8ec8fe2c59a618fbc2abef6df9c49953c051ac45d08262a700076401c5a10f9cf51ad79ae54fc844c7a1db5f1015dd743d4149219415821e0c1bf7783d6e0d7c23a012239b588255002ced8dbf4a999e6d29841b4d9e5e8fa85bb52a05ff8db5a3c39e29fe1103448a3cfffe5f88d8a8733bac596f5b8167250d4b8cea46264739c27e8be3861f7e249b85b3060479219881be21c96df5c265ccfeb36be5f7c5e741a09056b80e2c76def584a5f4dc0515bf3c508dd42efb6be15d50d32b9e33dd0048f078477dbf0dbc5fe494c2d559490b23e53067f2825453bb844565232aec97be000ff0d8a4a2d638af55ed2aeb26dc7e00aaf41949cf17ea83919a5ef9a584245b2b13ac01b624262a580e26f60a092149729cce79e610d5b6ae4cb4ba3ce024916bc6e41a136da0b948adc05beb5a479aeb94dfd126150012a84d3a2bd706d601424d897276f0d505187affb016eab8e94dc9092f71223bbc0d42e3f3362f9107e0a953dd2dbdf6cb0f6a5838f5dde6e0923c18ed8e358c6065fc4372ae9082773d1f22b90aee50f1504a2d25defd114461240358e2c45f2ee7fab5552f4449892187e09977e188cededbfaf6c73b34ebff2a473365da401e906b7e36cb3bd7a856954eb5cece29a0052ef7a5317a8b7e61a0db47a2bb2d1e477fa0800dd7c10e19224496813f2682da6c36b7fa97964fa94ee353280b91886962023a6c00d2ad14e4140a89ecdf7bfae4268da7ef0aa046a44ebcb2aac6a1efe", 0x1000) write$binfmt_script(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x3138) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000340)=0x26, 0x4) syz_open_dev$radio(&(0x7f00000002c0)='/dev/radio#\x00', 0x0, 0x2) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$PPPIOCSNPMODE(r1, 0x4008744b, &(0x7f0000000000)={0xc0ff, 0x3}) [ 294.176266] binder: 9807:9808 unknown command 187 [ 294.196596] binder: 9807:9808 ioctl c0306201 200003c0 returned -22 14:18:49 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x2200, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r2, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:18:49 executing program 2: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000006000)="1b0000005200030f07fffd946fa283bc04eee6d87986c497271d85", 0x1b}], 0x1}, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) 14:18:49 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) 14:18:49 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:18:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f0000000280)={0xfffffffffffffff8, 0x7, 0x9f38, 0x6a, &(0x7f0000000100)=""/106, 0x27, &(0x7f0000000180)=""/39, 0xa4, &(0x7f00000001c0)=""/164}) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f0000000080)={0x2f3dcbea, 0x0, 0xff, 0x1, 0x8001}) 14:18:49 executing program 4: bind$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001a40)={0x0, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfff7fffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x440, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r1, &(0x7f0000000080), 0x1a6) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) ftruncate(0xffffffffffffffff, 0x1000) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003440)={0x0, 0x0, &(0x7f0000003400)}, 0x0) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) 14:18:49 executing program 2: epoll_create1(0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, 0x0, 0x80800) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000300)='./file0\x00', 0x20000000000000, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000380)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0xfffffffffffffffd, 0x0) 14:18:49 executing program 0: r0 = socket(0x10, 0x802, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x5) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0xffffffe8) dup2(r1, r0) r2 = gettid() timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) write$binfmt_misc(r0, 0x0, 0x0) tkill(r2, 0x401004000000016) 14:18:49 executing program 2: r0 = socket(0x10, 0x100000003, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x1a, 0x201}, 0x14}}, 0x0) 14:18:49 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:18:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:18:49 executing program 2: r0 = socket$inet6(0xa, 0x802, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) 14:18:51 executing program 2: pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000001200)=[{&(0x7f0000001100)=""/233, 0xe9}], 0x6f) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES64=0x0], 0x8) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f000024d000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x10002) 14:18:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x220040) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000080)={0x0, {0x7, 0x9, 0x100000000, 0x7ff}, {0x5, 0x3, 0x7ff, 0x5}, {0x1, 0x3}}) 14:18:51 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r3, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r3, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:18:51 executing program 4: bind$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001a40)={0x0, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfff7fffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x440, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r1, &(0x7f0000000080), 0x1a6) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) ftruncate(0xffffffffffffffff, 0x1000) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003440)={0x0, 0x0, &(0x7f0000003400)}, 0x0) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) 14:18:51 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x2200, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r2, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:18:51 executing program 0: bind$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001a40)={0x0, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfff7fffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x440, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r1, &(0x7f0000000080), 0x1a6) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) ftruncate(0xffffffffffffffff, 0x1000) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003440)={0x0, 0x0, &(0x7f0000003400)}, 0x0) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) 14:18:52 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:18:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e22, 0x7, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x85}}, 0xffff, 0x3, 0x5, 0x80000000, 0x4}, &(0x7f0000000000)=0x98) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000140)={r1, 0x6e, "8ecaffbabb26c1331ede3fb6f81b7b47e6351e7cfbf8a69fa28efb52e191091609bffb136cf494b914cc24608490f8e61e5b8a86ad81d2197aa5e99af5de0baecb1273e623550d3947973e1386e6d63c1953b187a4c7ae2b7ab685461004ba6f59f7c3ce9a07f478799f90474063"}, &(0x7f00000001c0)=0x76) 14:18:52 executing program 4: bind$inet(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001a40)={0x0, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfff7fffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x440, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r1, &(0x7f0000000080), 0x1a6) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) ftruncate(0xffffffffffffffff, 0x1000) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003440)={0x0, 0x0, &(0x7f0000003400)}, 0x0) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) 14:18:52 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:18:52 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:18:52 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f000000a000)={&(0x7f0000010ff4), 0xc, &(0x7f0000012000)={0x0}}, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x622, 0x0) [ 297.718861] mmap: syz-executor2 (9921) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 14:18:52 executing program 2: pipe(0x0) readv(0xffffffffffffffff, &(0x7f0000001200)=[{&(0x7f0000001100)=""/233, 0xe9}], 0x6f) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRES64=0x0], 0x8) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f000024d000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x10002) 14:18:52 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(0x0, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:18:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x200000, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000000c0)={0x0, 0x86, "c9bfc4ec16e73c8f9693e8727174eead124822c2092fb7c3253c140b7f5cff9ae3e258752d18f2e597e195f5113b30c06179620e6cb25453fbbee13b2dc1ab993f60f7f7a57e27a66aac83d8d4a42e4efc00ffbbb49c1f9f66adcc604a932239a8e3007eaa56d4cf12a9bfd18fa56f5c23928879880f60a0ed601087f1a01e311c6a2f7b66f9"}, &(0x7f0000000180)=0x8e) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f00000001c0)=ANY=[@ANYRES32=r2, @ANYBLOB="79000000fe81cf43a06a8264367cfb7ad5a15c1d1d5681b3358fd03153bec8c7fcd97bea28ea6023c43e132801ed89620dd96f2529179c53a61ee7ac5d70ce60801d991c771459380df51a706a87429f073f964f57d6661dfe67f669ba93c721c5bbfaa541b6b8193557609a8a26b09246427364f35814b3c2b5fd1f63"], &(0x7f0000000280)=0x81) r3 = geteuid() ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f0000000080)={0x3, @null, r3}) socket$inet_icmp_raw(0x2, 0x3, 0x1) 14:18:52 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) write$P9_RAUTH(r1, &(0x7f00000000c0)={0x3fb}, 0xffeb) 14:18:52 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:18:52 executing program 0: 14:18:52 executing program 4: 14:18:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f00000014c0)='/dev/snd/pcmC#D#p\x00', 0x80000000, 0x20000) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000000)) mlock(&(0x7f0000984000/0x4000)=nil, 0x4000) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x8032, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000001500)=[@in6={0xa, 0x4e21, 0x3, @loopback, 0x2}, @in6={0xa, 0x4e21, 0x2, @mcast1, 0x4}, @in6={0xa, 0x4e21, 0xffffffff80000001, @mcast1, 0x400000000000000}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x64) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)=ANY=[@ANYBLOB='3) ./file0\n'], 0x3138) 14:18:52 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(0xffffffffffffffff, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:18:52 executing program 0: 14:18:52 executing program 4: 14:18:53 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, 0x0) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:18:53 executing program 2: 14:18:53 executing program 4: 14:18:53 executing program 0: 14:18:53 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x0, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:18:53 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:18:53 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000280)={'vcan0\x00', {0x2, 0x4e23, @rand_addr=0x7}}) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e24, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x9}, 0x1c) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="3321202e2d66696c65300a41f96d1a92980da647cf34dc4cf7423074236f045091ec41ea216dee4416b3297e963cb04f5bf5f3192f29615483296e93bc0cedb8df0f685e32256c9bc18c58a839bae95198938722104c63025b5d8497acbb5a47a1546f9bdec97be03f2478a72d5894ca136d85b2b9a202608040584e0b3d779e6133215ec6487ccec74a1eb2780807"], 0x3138) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000180)={0x1f, {0x7a03, 0xa2, 0x10000, 0x35c, 0x2cf, 0xd3000000000}, 0x2}, 0xa) r3 = dup(r0) ioctl$DRM_IOCTL_MODE_GETCRTC(r3, 0xc06864a1, &(0x7f00000000c0)={&(0x7f0000000000)=[0x7, 0x2, 0x9, 0x8, 0xbd], 0x5, 0x3, 0x3, 0x4779, 0xffff, 0x2, {0x85ed, 0x8, 0x9, 0x3, 0xfffffffffffffffd, 0x0, 0x4, 0x7, 0x1, 0x9, 0xffffffff, 0x4, 0x6916, 0xffffffff, "e4c1ec8e7d4481eec20612930c3b8f019a67750a153b8bc626ac16c51e1e6a81"}}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x23) r4 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@remote, @in6, 0x4e21, 0x7, 0x4e22, 0x57b, 0xa, 0x80, 0xa0, 0x9f, 0x0, r4}, {0x1d, 0x40, 0x1ab7, 0x7, 0x3f, 0x2, 0x80, 0x101}, {0x4, 0x7, 0x5, 0x7}, 0x2, 0x0, 0x0, 0x1, 0x3, 0x1}, {{@in=@multicast2, 0x4d5, 0xff}, 0x2, @in6=@dev={0xfe, 0x80, [], 0xa}, 0x3502, 0x2, 0x3, 0x7fffffff, 0x1, 0xff, 0x7fffffff}}, 0xe8) syncfs(0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x400001, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000080)={0x3b, @loopback, 0x4e20, 0x1, 'lc\x00', 0x8, 0x2a443fe5, 0x3b}, 0x2c) dup3(r2, r0, 0x0) 14:18:53 executing program 4: 14:18:53 executing program 0: 14:18:53 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:18:53 executing program 2: 14:18:53 executing program 4: 14:18:53 executing program 0: 14:18:53 executing program 2: 14:18:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='3! ./file0N\n'], 0x3138) 14:18:53 executing program 0: 14:18:53 executing program 2: 14:18:54 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:18:54 executing program 4: 14:18:54 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:18:54 executing program 0: 14:18:54 executing program 2: 14:18:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) getitimer(0x0, &(0x7f0000000000)) getitimer(0x2, &(0x7f0000000080)) 14:18:54 executing program 4: 14:18:54 executing program 0: 14:18:54 executing program 2: 14:18:54 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, 0x0, 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:18:54 executing program 0: 14:18:54 executing program 2: 14:18:55 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:18:55 executing program 4: 14:18:55 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:18:55 executing program 0: 14:18:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xa2e4, 0x10000) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:18:55 executing program 2: 14:18:55 executing program 4: 14:18:55 executing program 2: 14:18:55 executing program 0: 14:18:55 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, 0x0, 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:18:55 executing program 2: 14:18:55 executing program 4: recvmmsg(0xffffffffffffff9c, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f00000025c0)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) epoll_create1(0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffff9c, 0x0, &(0x7f0000000000)) r1 = accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000003080), 0x80800) sendmmsg(r0, &(0x7f0000008880)=[{{&(0x7f00000002c0)=@nfc_llcp={0x27, 0x1, 0x2, 0x5, 0x5, 0xd4a3, "d34ca841d832d52494f0b45827dee26088d1ce88182ca6c5429e430d6840dc4c085feccbc0037e09c529baa9d2bb080681f4d4dc1b21b0652238f5fe2e0e8d", 0xe}, 0x80, 0x0}, 0x20}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001ec0)="869ec575e653a2262d5c29060be160afc162db1a282fd2a07bcf299c7c51db2f215f7e27c2977795a668922ff1f7805f5974a2683c08e7db061c1b697422d45dc1697aff218ea71c6faa4db17b60b0577e95c41b7e69d2a5db0cf168a733ffe9f545f62ed013a4d9db971b945b3d1c6390a81f85cc9ecddb159a959f28323fb041c2a3438948142862dbaa174986b5162f548d8c79006812826b697a7c03bcdb2baedf55d5487982dcbe1a0c45ad26405df547dd2394c81ae5bdc904b576df0053c998fadee0dde061b4947cbb3446", 0xcf}], 0x1}, 0x3c0000}, {{&(0x7f0000002080)=@x25={0x9, @null=' \x00'}, 0x80, &(0x7f0000002400)=[{&(0x7f0000002300)="e0b742fd3aa128d7d912f2c915c72b031f1556b0b0aa0d41b35cfef472a0456864c4ef2cad01d87abbdb4124c3a7fadfe289ac8382e0fa635653c0bec1d4958a8ccb5106f45ecfea669e4e8ebd802e3422d59888749dd7967d884f997b8788d63186e997cdb5b3ee1915d7c625060f07d6fe7a152df740543f9dc18cdc167edb3e57c4124e6fb3d593d255b0c3e1c46c36bb5b2724558f8239eae002ff91aee0e891e8a7e1eca88d7b990ba73753a39df2697edb405e4e888fe79b35f79c0b5e2ec962c9d3c2f0bfd8e8", 0xca}], 0x1}, 0x1}, {{0x0, 0x0, &(0x7f0000002e40)=[{&(0x7f0000002dc0)}], 0x1}, 0x9}], 0x4, 0x804) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='mounts\x00') preadv(r2, &(0x7f00000017c0), 0x3ba, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/ipv6_route\x00') write$binfmt_aout(0xffffffffffffffff, 0x0, 0xffa2) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg(r2, &(0x7f000000a040)={&(0x7f0000008a00)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x1, 0x1, 0x0, 0x1, {0xa, 0x4e22, 0x30, @loopback, 0x80000000}}}, 0x80, &(0x7f0000002240)=[{&(0x7f0000009a80)="0859dc2bab3511add81d1c944c4788b6bcdc16d4a0509246c3cd575b1ce7570bb79e708d88116510bc6273119a54400efa20160ac915c060479778ba80f29da28f974958b84602cb8479395471cac317356b10223d50320f6bb962459f2c494a040f79b1faa94cf7a6b749eaa0c3d28a6ffb49d0fc2549eba16c8eef7fb19c6166f277da719fdcfd6dd62cc9e452a50781bb5600eb95996586e003c8b945f969b7f9ae9f82359f98d2629626915f1a72482e", 0xb2}], 0x1}, 0x4000) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000280)=0xfce7) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x20000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 14:18:56 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:18:56 executing program 0: 14:18:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x5, 0x8001) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:18:56 executing program 2: 14:18:56 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, 0x0, 0x7) 14:18:56 executing program 4: 14:18:56 executing program 0: 14:18:56 executing program 4: 14:18:56 executing program 2: 14:18:56 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) bind$bt_l2cap(r0, &(0x7f0000000140)={0x1f, 0x3, {0xfffffffffffffc00, 0x812, 0x1, 0xd5a0, 0x9, 0x6}, 0xe5, 0x80}, 0xe) socket$inet6(0xa, 0x5, 0x2) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x840, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000080)=[@in6={0xa, 0x4e21, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @in6={0xa, 0x4e24, 0xff, @dev={0xfe, 0x80, [], 0x27}, 0x4}, @in6={0xa, 0x4e20, 0xfffffffffffffffb, @empty, 0x7fffffff}, @in6={0xa, 0x4e24, 0x4, @loopback, 0x9}, @in={0x2, 0x4e21, @remote}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x23}}, @in={0x2, 0x4e22, @empty}, @in={0x2, 0x4e21, @rand_addr=0x3f}], 0xb0) write$binfmt_script(r1, &(0x7f0000002ec0)=ANY=[@ANYBLOB="33797827c9c4de4131300a"], 0x3138) 14:18:56 executing program 4: 14:18:56 executing program 2: 14:18:57 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:18:57 executing program 0: 14:18:57 executing program 4: 14:18:57 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x0) 14:18:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x40, 0x0) ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f0000000080)=0x6) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:18:57 executing program 2: 14:18:57 executing program 0: 14:18:57 executing program 2: 14:18:57 executing program 4: 14:18:57 executing program 5: 14:18:57 executing program 0: 14:18:57 executing program 2: 14:18:58 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:18:58 executing program 4: 14:18:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x6, @remote, 0x9}, 0xfffffffffffffe0f) fremovexattr(r0, &(0x7f0000000000)=@known='trusted.overlay.origin\x00') write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB='3! .dfile0\n'], 0x3138) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x2, 0x0) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f00000000c0)={0x9, "5b2f69511ec40bf91101fb8eb038c9d7fd304d26103b0d7eeab9a2a38c2bb90f", 0x3, 0x3f, 0x5, 0x800000, 0x20000, 0xe}) 14:18:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) 14:18:58 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000500)=0x208000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x618, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:18:58 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:18:58 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000080)={0x5, 0xc, [0xe1a, 0xd9, 0x0]}) 14:18:58 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:18:58 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x400000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x4, 0x4) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x3138) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x1, 0x0) ioctl$KDGKBTYPE(r2, 0x4b33, &(0x7f0000000580)) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, &(0x7f0000000100)=""/64) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/snmp\x00') getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f00000002c0)={@ipv4={[], [], @dev}, 0x0}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@mcast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@empty}}, &(0x7f0000000440)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000480)={{{@in=@broadcast, @in=@multicast2, 0x4e23, 0x0, 0x4e23, 0xffffffffffffffff, 0x0, 0x80, 0x20, 0xfe, r4, r5}, {0x6, 0x0, 0x7, 0x7fffffff, 0x1, 0xf8f7, 0x0, 0x3}, {0x4, 0x9, 0x1, 0x288b}, 0x0, 0x6e6bb7, 0x1, 0x1, 0x1}, {{@in6, 0x4d6, 0xff}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x13}, 0x3500, 0x2, 0x3, 0x0, 0x100000001, 0x8, 0x1}}, 0xe8) ioctl$RNDADDTOENTCNT(r3, 0x40045201, &(0x7f0000000280)=0x8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'batadv0\x00', &(0x7f0000000180)=@ethtool_flash={0x33, 0x1, "13b7b8a47dd7806b1223de8db1c5b2d58439a6d3db1c317927e1c2d4d6654816f95fd64b19569de01f047cb2f0c4060970a4695466b6439e0c114a90d6d63a128147e17c0234eec9eb8c4b10fa8d70445a70f60c460095ac71bc3aa5c368d6ab1984f5ad7f94952f4aedf5b69b18e91c9a9c629973a07479df2a5fb9fdbaaa0c"}}) ioctl$KVM_INTERRUPT(r3, 0x4004ae86, &(0x7f0000000080)=0x1) ioctl$TCSBRK(r3, 0x5409, 0x8) 14:18:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) 14:18:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) 14:18:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x40, 0x0) ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f0000000080)=0x6) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:18:58 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:18:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) 14:18:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) getitimer(0x0, &(0x7f0000000000)) getitimer(0x2, &(0x7f0000000080)) 14:18:58 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x800000000000008, 0x5) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) connect$x25(r2, &(0x7f0000000140)={0x9, @remote={[], 0x2}}, 0x12) r3 = getpid() perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x3, 0x0, 0x4, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x4, 0x9, 0x8, 0x80000000, 0x3, 0x33, 0xfffffffffffffffa, 0x9, 0x100000001, 0x2, 0x37, 0x320000, 0x10001, 0x5, 0x800, 0x81, 0x73a, 0x7b60, 0x7e9d, 0xfffffffffffffffa, 0x0, 0x6, 0x1, 0x80000000, 0x100000000, 0x1ff, 0x0, 0x6, 0x7, @perf_bp={&(0x7f0000000000), 0x9}, 0x80cc, 0x0, 0x0, 0x2, 0x5, 0x7f, 0x5}, r3, 0xa, r0, 0x1) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000180)={0x168, @time, 0xfffffffffffffc00, {0x6a16, 0x21a}, 0x62, 0x1, 0x8}) 14:18:58 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, 0x0, 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:18:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) 14:18:59 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:18:59 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:18:59 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:18:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000080)={'3! ', './file0', [{}, {0x20, 'md5sum-trusted'}, {0x20, '3! '}, {0x20, '/eth0selfkeyring!ppp1/nodevem1ppp0*user'}, {0x20, 'em1:cgroup\\bdevppp1wlan0'}]}, 0xec) 14:18:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) 14:18:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0xff73) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x80000000, 0x0, 0x0, 0x1, 0x3, 0x80000000}, &(0x7f0000000080)=0x20) 14:18:59 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:18:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) 14:18:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x8, 0x40) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000080)="2a6aaf23f205e39d52f222050d528eb3976f2384b1e37e61ed9558ce4a73f407457824f921f16a6dbeda57965f850a01d56b2aa779f9bd37edef0120ef5095c2859df1f69e5521677f9f00ecb1725421a28e2cfc81628e6977cb20f7bf75b4c8a734c5234f6d38e8e0797148f63e27fd3504bdb36ca9ed3978c7be22c19f6833d7a6afbeeaba8096dd54fd6209337857fa486c32634d11044618516fffe23d24ad113b7c75b8a4979214fc94281f10f553d863b33134d1ff65c819a1a6c525e318efea3142c48628a537555b36146e0ff5bc77e202b9d2133a6fddeb91427e537cc9e64bcdff5cbd8097ccbe1677e8464dbb10", &(0x7f0000000180)="f712e343dc35fd0989f86737e8a9c9270095fd00c38696cbc474be4bc5180db70b6c838b23b0f0695773e5c57eb1241fbe4e3213b98ef7e247c663bd8b3e337d3f214572eff2e915b0"}, 0x20) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) fcntl$getownex(r0, 0x10, &(0x7f0000000280)={0x0, 0x0}) syz_open_procfs(r2, &(0x7f00000002c0)='net/rt_cache\x00') ioctl$SG_SET_COMMAND_Q(r0, 0x2271, &(0x7f0000000240)) eventfd(0x3f) 14:18:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) 14:19:00 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x0, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f00000014c0)='/dev/snd/pcmC#D#p\x00', 0x80000000, 0x20000) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000000)) mlock(&(0x7f0000984000/0x4000)=nil, 0x4000) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x8032, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000001500)=[@in6={0xa, 0x4e21, 0x3, @loopback, 0x2}, @in6={0xa, 0x4e21, 0x2, @mcast1, 0x4}, @in6={0xa, 0x4e21, 0xffffffff80000001, @mcast1, 0x400000000000000}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x64) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)=ANY=[@ANYBLOB='3) ./file0\n'], 0x3138) 14:19:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000080)={'3! ', './file0', [{}, {0x20, 'md5sum-trusted'}, {0x20, '3! '}, {0x20, '/eth0selfkeyring!ppp1/nodevem1ppp0*user'}, {0x20, 'em1:cgroup\\bdevppp1wlan0'}]}, 0xec) 14:19:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{}], 0x1, 0x2) 14:19:00 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x5735}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) r2 = dup3(r1, r0, 0x80000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x4000, 0x0) ioctl$BLKBSZGET(r2, 0x80081270, &(0x7f00000000c0)) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@loopback}, &(0x7f0000000080)=0x14) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x8100, 0x0) 14:19:00 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f00000014c0)='/dev/snd/pcmC#D#p\x00', 0x80000000, 0x20000) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000000)) mlock(&(0x7f0000984000/0x4000)=nil, 0x4000) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x8032, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000001500)=[@in6={0xa, 0x4e21, 0x3, @loopback, 0x2}, @in6={0xa, 0x4e21, 0x2, @mcast1, 0x4}, @in6={0xa, 0x4e21, 0xffffffff80000001, @mcast1, 0x400000000000000}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x64) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)=ANY=[@ANYBLOB='3) ./file0\n'], 0x3138) 14:19:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{}], 0x1, 0x2) 14:19:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f00000014c0)='/dev/snd/pcmC#D#p\x00', 0x80000000, 0x20000) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000000)) mlock(&(0x7f0000984000/0x4000)=nil, 0x4000) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x8032, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000001500)=[@in6={0xa, 0x4e21, 0x3, @loopback, 0x2}, @in6={0xa, 0x4e21, 0x2, @mcast1, 0x4}, @in6={0xa, 0x4e21, 0xffffffff80000001, @mcast1, 0x400000000000000}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x64) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)=ANY=[@ANYBLOB='3) ./file0\n'], 0x3138) 14:19:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = socket$inet6(0xa, 0x3, 0x1f) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) fcntl$setlease(r1, 0x400, 0x0) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:19:00 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, 0x0) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{}], 0x1, 0x2) 14:19:00 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(0xffffffffffffffff, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:00 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x2200, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r2, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x2) 14:19:00 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:01 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x2200, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r2, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:01 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vsock\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x0, 0x1fffffffffffff, 0xfffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, 0x0) close(r2) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xce, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r4 = add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f00000001c0)="153520ae1e3b8f747ac285572a549ffe3c9f09fc8a2cc8abbab655c8953df46ff4eef00fced831ca9af9c813fd8c5e1674d6dc1d7cbdf94ca72af65e94c804c3109115070b9ca4767aeae60fe2fe3fb715dfdec6fa9afc7e3170876cbdcff42ea24e", 0x62, 0xfffffffffffffffc) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r1, 0xc0105303, &(0x7f0000000480)={0x5, 0x12b, 0xffffffffffffffe0}) open_by_handle_at(r1, &(0x7f0000000340)={0x91, 0x80, "a6f34a07254b14fe04830bfd1feb4d480ac3c91329584b3f41b5e7ec91e766c37814b48d279a8766ba264302e9ff676e3e3b548ac9ed6a6f6abb6ec3a82c36da85130db7788d37b81054fa513224ce8e82bcef255402802cda26109ac4dd19d89d2a93d815c904d1c1543e44c13288e061005d28abc3f7da65c957b6f05bc76c0fda0d5f692320afe2"}, 0xc00) lsetxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x32, 0x7, 0xffffffffffffff01, "a3ee7364f2d62528d09041da2237e69d", "d4a7856c833fc69f2151465aaab845c233318caffee9892ef1787e46ef"}, 0x32, 0x1) shmget(0x0, 0x2000, 0x200, &(0x7f0000ffd000/0x2000)=nil) shmctl$IPC_STAT(0x0, 0x2, 0x0) keyctl$restrict_keyring(0x1d, r4, 0x0, &(0x7f0000000540)='wlan1em0\\(mime_typewlan0ppp1ppp1proc[)}cpusetvboxnet1securityppp1self\x00') ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, 0x0) ioctl(r0, 0xc2, &(0x7f0000000080)) ioctl$DRM_IOCTL_MODE_GETCRTC(r3, 0xc06864a1, &(0x7f0000000400)={&(0x7f0000000280)=[0x7fc5, 0x1, 0x1ff, 0xcf], 0x4, 0x705, 0x7, 0x10001, 0x100000000, 0x0, {0x5, 0x4, 0x24, 0x3, 0x3, 0x756, 0x600000000, 0x8, 0x5, 0x7f, 0x80000001, 0x400, 0x9, 0xe4, "460e5debb6c52dcb03a3fed39469a77c25c8da3d22b2c6097645ab353cacd7c2"}}) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000000)={0x0, 0x3, 0x1f, 0x80000001, 0x1, 0x3, 0x2, 0x7, 0x400, 0xfffffffffffffffa}) connect$inet(0xffffffffffffffff, &(0x7f0000000300), 0x10) 14:19:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:19:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x2) 14:19:01 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x0, 0x101000) ioctl$VIDIOC_DBG_G_REGISTER(r0, 0xc0385650, &(0x7f00000000c0)={{0x4, @addr=0x77}, 0x8, 0x100000000, 0x400}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000000)={0x3, 0x1f, 0x2}) write$binfmt_script(r2, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 306.611868] Unknown ioctl -1072671997 14:19:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x2) 14:19:01 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 306.681135] Unknown ioctl -1072125377 14:19:01 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x2) 14:19:01 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x800000000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) listen(r0, 0xfffffffffffffff9) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='veth0_to_team\x00') 14:19:01 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x2) 14:19:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = socket$inet6(0xa, 0x3, 0x1f) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) fcntl$setlease(r1, 0x400, 0x0) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:19:02 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:02 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x2) 14:19:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x2000000003c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x2, 0x6, @remote, 0xc000000000000000}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:19:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = socket$inet6(0xa, 0x3, 0x1f) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) fcntl$setlease(r1, 0x400, 0x0) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:19:02 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) 14:19:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000700)='/dev/btrfs-control\x00', 0x101000, 0x0) connect$unix(r1, &(0x7f0000000740)=@abs={0x1, 0x0, 0x4e24}, 0x6e) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) truncate(&(0x7f0000000000)='./file0\x00', 0x1) 14:19:02 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:02 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) 14:19:02 executing program 0: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/mls\x00', 0x0, 0x0) fcntl$setflags(r0, 0x2, 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000440)={0x2, 0x3ffffffffffffffe, @broadcast}, 0x10) r3 = add_key$user(&(0x7f0000000680)='user\x00', &(0x7f00000006c0)={'syz', 0x2}, &(0x7f0000000700)="62347047c893e891053599b1cc116958911a9ef2c07e0f6328bc68ebfe422ac8da2c8009ed673cfe6452f23c60f160c5efa72253e62de4fcc6058819aac7aa78690de2fb96b2b1e1ef080928e45058200f315a80ef7498f5f7962392687fc440946eb400bde0fbb904cdfb158ed299f18bf185d07589ed388ec98a0fe7", 0x7d, 0xfffffffffffffffb) keyctl$setperm(0x5, r3, 0x20000000) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x4e20}, {0x2, 0x4e1f, @loopback}, {0x2, 0x4e25, @broadcast}, 0x0, 0x8, 0x5, 0x46a, 0x0, 0x0, 0x800, 0x1}) sendmmsg(r1, &(0x7f0000007fc0), 0x40000000000002f, 0x0) write$P9_RRENAMEAT(r2, &(0x7f00000007c0)={0x7, 0x4b, 0x80000000005}, 0x6) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000100)=0x0) ptrace(0x4218, r4) get_robust_list(r4, &(0x7f00000003c0)=&(0x7f0000000380)={&(0x7f00000002c0)={&(0x7f0000000280)}, 0x0, &(0x7f0000000340)={&(0x7f0000000300)}}, &(0x7f0000000400)=0x18) inotify_init() ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000040)=0x4) rename(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file0\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000240)) socket$inet6(0xa, 0x5, 0x1000) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x8) fsetxattr(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="73656375726974602e2f73656c696e75782f6d6c7300f904dbbe4da21983e82fafa14c415aa11a0c"], 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{&(0x7f0000003980)=@rc, 0x80, &(0x7f0000002b80)=[{&(0x7f0000001880)=""/190, 0xbe}], 0x1, &(0x7f0000002c00)=""/125, 0x7d}}], 0x1, 0x0, &(0x7f0000000080)) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = dup3(r5, r5, 0x80000) dup3(r5, r5, 0x80000) ioctl$TIOCGSID(r6, 0x5429, &(0x7f0000000140)) r7 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') preadv(r7, &(0x7f00000017c0), 0x1d0, 0x1f000000) 14:19:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @empty, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB="3369731dce66696c65300a"], 0x3138) 14:19:02 executing program 2 (fault-call:20 fault-nth:0): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:02 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) [ 308.065048] FAULT_INJECTION: forcing a failure. [ 308.065048] name failslab, interval 1, probability 0, space 0, times 0 [ 308.087378] CPU: 0 PID: 10394 Comm: syz-executor2 Not tainted 5.0.0-rc1+ #14 [ 308.094595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.103953] Call Trace: [ 308.106575] dump_stack+0x1db/0x2d0 [ 308.110222] ? dump_stack_print_info.cold+0x20/0x20 [ 308.115265] should_fail.cold+0xa/0x15 [ 308.119174] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 308.124316] ? ___might_sleep+0x1e7/0x310 [ 308.128493] ? arch_local_save_flags+0x50/0x50 [ 308.133113] ? retint_kernel+0x2d/0x2d [ 308.137037] __should_failslab+0x121/0x190 [ 308.141302] should_failslab+0x9/0x14 [ 308.145115] kmem_cache_alloc+0x2be/0x710 [ 308.149300] getname_flags+0xd6/0x5b0 [ 308.153113] do_mkdirat+0xba/0x2f0 [ 308.156800] ? __ia32_sys_mknod+0xb0/0xb0 [ 308.160965] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 308.166344] ? trace_hardirqs_off_caller+0x300/0x300 [ 308.171462] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 308.176232] __x64_sys_mkdirat+0x76/0xb0 [ 308.180310] do_syscall_64+0x1a3/0x800 [ 308.184223] ? syscall_return_slowpath+0x5f0/0x5f0 [ 308.184244] ? prepare_exit_to_usermode+0x232/0x3b0 [ 308.184268] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 308.184288] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 308.184301] RIP: 0033:0x457ec9 [ 308.184315] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 308.184322] RSP: 002b:00007f95db39cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 308.184350] RAX: ffffffffffffffda RBX: 00007f95db39cc90 RCX: 0000000000457ec9 [ 308.184356] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000007 [ 308.184363] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 308.184384] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f95db39d6d4 [ 308.184391] R13: 00000000004c3afc R14: 00000000004d6838 R15: 0000000000000008 14:19:03 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x1, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB='3!d./fie0\b\x00'], 0x3138) 14:19:03 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x2) 14:19:03 executing program 2 (fault-call:20 fault-nth:1): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) [ 308.427109] FAULT_INJECTION: forcing a failure. [ 308.427109] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 308.438963] CPU: 1 PID: 10410 Comm: syz-executor2 Not tainted 5.0.0-rc1+ #14 [ 308.446159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.455530] Call Trace: [ 308.458142] dump_stack+0x1db/0x2d0 [ 308.461796] ? dump_stack_print_info.cold+0x20/0x20 [ 308.466830] ? add_lock_to_list.isra.0+0x450/0x450 [ 308.471788] should_fail.cold+0xa/0x15 [ 308.475695] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 308.480821] ? get_pid_task+0xd4/0x190 [ 308.484725] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 308.490283] ? add_lock_to_list.isra.0+0x450/0x450 [ 308.495226] ? kasan_check_read+0x11/0x20 [ 308.499388] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 308.504689] should_fail_alloc_page+0x50/0x60 [ 308.509198] __alloc_pages_nodemask+0x323/0xdc0 [ 308.513880] ? find_held_lock+0x35/0x120 [ 308.517960] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 308.522990] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 308.528564] ? ___might_sleep+0x1e7/0x310 [ 308.532735] ? trace_hardirqs_off+0xb8/0x310 [ 308.537167] cache_grow_begin+0x9c/0x8c0 [ 308.541242] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 308.546802] ? check_preemption_disabled+0x48/0x290 [ 308.551840] kmem_cache_alloc+0x645/0x710 [ 308.556013] getname_flags+0xd6/0x5b0 [ 308.559834] do_mkdirat+0xba/0x2f0 [ 308.563418] ? __ia32_sys_mknod+0xb0/0xb0 [ 308.567585] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 308.572963] ? trace_hardirqs_off_caller+0x300/0x300 [ 308.578087] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 308.582857] __x64_sys_mkdirat+0x76/0xb0 [ 308.586932] do_syscall_64+0x1a3/0x800 [ 308.590831] ? syscall_return_slowpath+0x5f0/0x5f0 [ 308.595777] ? prepare_exit_to_usermode+0x232/0x3b0 [ 308.600808] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 308.605672] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 308.610873] RIP: 0033:0x457ec9 14:19:03 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x2) 14:19:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @empty, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB="3369731dce66696c65300a"], 0x3138) [ 308.614079] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 308.632982] RSP: 002b:00007f95db39cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 308.632998] RAX: ffffffffffffffda RBX: 00007f95db39cc90 RCX: 0000000000457ec9 [ 308.633008] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000007 [ 308.633017] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 308.633027] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f95db39d6d4 [ 308.633043] R13: 00000000004c3afc R14: 00000000004d6838 R15: 0000000000000008 14:19:03 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x800000000000000d) setsockopt$ax25_int(r0, 0x101, 0x7, &(0x7f0000000000), 0x4) socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x400) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) fcntl$notify(r0, 0x402, 0x6) 14:19:03 executing program 4: syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x3, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x3, 0x1020000) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x1, 0x4) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000380)={0x10, @pix={0x0, 0x0, 0x34324142}}) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'HL\x00'}, &(0x7f0000000100)=0x1e) 14:19:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x4000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r1, 0x50, &(0x7f0000000080)}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:19:03 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x2) 14:19:03 executing program 2 (fault-call:20 fault-nth:2): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:03 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61}]}, &(0x7f0000000040)='GP\x9aI\xdbZ\xb1\x82\xeadD\xa3\v2\xe5\x00', 0x2, 0xfffffffffffffea9, &(0x7f00001a7f05)=""/251, 0xfffffffffffffffc, 0x0, [], 0x0, 0xfffffffffffffffe}, 0x48) r1 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) write(r0, &(0x7f00000000c0)="3c316259dcd0fae4e1262104c3efa12ea259f3fda9d4d1362d47e5d05d6831cf0b76de293b69867dad8d502327483812578f58470fcba759d4491b2f4d11195673a728f42a2e057a417137b37212a02604a605a84496ae4781184d997ec15f36e46b49902ae4ca9df922d53f73e4e7aece42c02bbf76a3cc681f54f83cd33c4fb9e40de0dabc1a4bcc87783d4898a602b57a019fb0fb75df4e5ee07ec471f8065c76b7abed3e9cdbbf6da7db1d75cf76b09ea014f2a763283d6c80fb5e", 0xbd) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000001480)={0x0, 0x2, 0x30, 0x2, 0x7f}, &(0x7f00000014c0)=0x18) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000001500)={r2, 0x85, "5c0016dc7e39b0154bcadc3bc890b784f832ea95f1f3fa4c2d0ea5e3daf8930afde024c900723aa7677f7cc1d7b5bcb6461c0e00bd89ab7d9d87f6e571ae58c4100c00f3b7986ba26ea075c67d8c1a79ad4a9e89cebcac5622d5c73f789b192ec9628ed76a080cfa154156d2a510c49543996b994ef9418a4c41360a7c1fc6300701081b1d"}, &(0x7f00000015c0)=0x8d) 14:19:04 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) close(r0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) fcntl$setlease(r1, 0x400, 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) shutdown(r0, 0x1) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x3de) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x14}, 0xffe3}}, 0x5000000) 14:19:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB='3! ./gilu0X'], 0x3138) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x22) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000100)=0xbaba, 0x4) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e21, @loopback}, {0x2, 0x4e21, @local}, 0x28, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0xfff}) 14:19:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x2) 14:19:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = gettid() syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x35, 0x4000) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f00000000c0)=0x1, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x88040, 0x0) ioctl$RTC_WKALM_RD(r4, 0x80287010, &(0x7f0000000140)) setsockopt$inet_tcp_int(r3, 0x6, 0x4000000000014, &(0x7f0000000180)=0x80000000002, 0x93) sendto$inet(r3, &(0x7f0000000100), 0xfffffffffffffdcd, 0x0, 0x0, 0x162) write$P9_RLOPEN(r3, &(0x7f0000000000)={0x18}, 0x18) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) dup2(r1, r3) tkill(r2, 0x15) 14:19:04 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:04 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) r0 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x8b9a, 0x101000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$session_to_parent(0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b700000000000100bfa30000000000000703000028feffff7a0af0ffffffffff79a4f0ff00000000b7060000000000016d400300000000003506000001ed00005d040000000000006f460000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000"], &(0x7f0000000100)='P\\\x88\x1c'}, 0x48) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x402800, 0x8) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000240)={@host}) r2 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x8001, 0x1) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x4080, 0x0) ioctl$VIDIOC_ENUMAUDIO(r2, 0xc0345641, &(0x7f00000000c0)={0x3, "9d27fccc4801149e388f4e1df73c709bb55e84c2ad4bb4a6808cf8b5b09dec0d", 0x2, 0x1}) 14:19:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x2) 14:19:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000140)='./file0\x00', 0x1) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::d:0.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 14:19:04 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x2) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) [ 309.543162] libceph: resolve 'd' (ret=-3): failed 14:19:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x8) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e24, 0x80000000, @remote, 0x900000000000}, 0xffffffffffffff07) open(&(0x7f0000000000)='./file0\x00', 0x8000, 0x10) write$binfmt_script(r1, &(0x7f0000000400)=ANY=[], 0xffffffffffffffb2) 14:19:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x2) [ 309.569584] libceph: resolve 'd' (ret=-3): failed [ 309.619390] audit: type=1400 audit(1546870744.372:63): avc: denied { prog_run } for pid=10477 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 309.648103] libceph: parse_ips bad ip '[d::d:0.,[' [ 309.652511] libceph: parse_ips bad ip '[d::d:0.,[' 14:19:04 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:04 executing program 4: r0 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) fcntl$setstatus(r2, 0x4, 0x2003) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) writev(r2, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) ioctl$TIOCMBIS(r3, 0x5416, &(0x7f0000000140)=0x9) read(r2, &(0x7f00000003c0)=""/72, 0x100000104) sendmsg$xdp(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f00000002c0)=0x1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000340), 0xc, 0x0}, 0x0) mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x0, 0x0, 0x0) mq_unlink(0x0) 14:19:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000140)={0x14, 0x2e, &(0x7f0000000180)="ce07ff7fd2754b564e04b0b5985c52957dd54209dd8e5b0e5dfa0e6e4ca566af0234174cdbd96896f1a7113f8906"}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @local}]}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$VT_DISALLOCATE(r1, 0x5608) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) socket$rds(0x15, 0x5, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000680)='/dev/audio\x00', 0x200800, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0xa) 14:19:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB="0821202e19be2f66696c65"], 0x323d) 14:19:04 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x6b6b6b) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) 14:19:05 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) 14:19:05 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x1000000) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:05 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x2) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:05 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(r0, 0x406, r0) r1 = socket$inet6(0xa, 0x3, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r1}) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) ioctl$SIOCRSSCAUSE(r2, 0x89e1, &(0x7f00000000c0)=0x2) 14:19:05 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) 14:19:05 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x2000000) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:05 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:05 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x1000000) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB="0821202e19be2f66696c65"], 0x323d) 14:19:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x40, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000080)={'bridge_slave_0\x00', @remote}) 14:19:05 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) 14:19:05 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x6b6b6b00) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:05 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) 14:19:06 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(r0, 0x406, r0) r1 = socket$inet6(0xa, 0x3, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r1}) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) ioctl$SIOCRSSCAUSE(r2, 0x89e1, &(0x7f00000000c0)=0x2) 14:19:06 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x9, 0x42, 0x400000000249e20, 0x8000000001}, 0x2c) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x507000, 0x0) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000040), 0x1) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) r1 = getpid() ptrace$setopts(0x4200, r1, 0x7a, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/76) ftruncate(r2, 0x7) 14:19:06 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) 14:19:06 executing program 3: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000080), &(0x7f0000000100)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)=ANY=[@ANYBLOB="3321202edd2a8a3065300a"], 0x3138) 14:19:06 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x8cffffff) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:06 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) 14:19:06 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/uts\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') 14:19:06 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x80) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:19:06 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0xf6ffffff) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:06 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:06 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x11, 0x4, 0x4, 0x10000}, 0x2c) r1 = socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@dev, @in6}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000000200)=0xe8) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000140)={r0, &(0x7f0000000000), &(0x7f00000000c0)}, 0x18) 14:19:06 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:06 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) 14:19:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x5, 0x840) sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x2, 0x0, 0x0, 0xa, 0x1e, 0x0, 0x70bd2d, 0x25dfdbff, [@sadb_key={0x1c, 0x8, 0x6b8, 0x0, "0f17783399c3d3830f0d1b6e8413d34f2c13f0d4ce019a21741b3da6b6918b6f091ec0f41965ce834cfed4ae1ba5b1a4f73580bd0bf6da50be885fb8e43039893db8a898a4a07ff0f34bbf8fbd80eb5a36b9277ba65da39b0b4c445b78d43a679733eb866c9f32aba825196dd926ad9bf4615e6cf925e2c432ad16f3b5fdbab35d767eefc6988d5d05b00f8f139dad46cdbd9a898d943c577ab2ec7081b4e66ccecc04280c79f1d742b3ccd5a0cf7ea0fe8bbd706cc88a4b4244be61c89fe7e6b21e4da97409cc90a123dfc9d28207ce2f8f0805a32bcb"}]}, 0xf0}}, 0x24048810) r1 = socket$inet6(0xa, 0xfffffffffffffffe, 0x22) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)=ANY=[@ANYBLOB="3321202e0066696c65f56d"], 0x3138) 14:19:06 executing program 0: 14:19:06 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) 14:19:07 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="2a000000060000000000000000000000000000000000000000000000000096e25fedffff000000007d00"], 0x2a) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x80000) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x4e24, @multicast1}}) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r2, 0x4010ae68, &(0x7f0000000080)={0x5000, 0x1000}) 14:19:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB="3321202e97b12fc97cfe5c"], 0x3138) 14:19:07 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0xffffff8c) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:07 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) [ 312.419678] QAT: Invalid ioctl 14:19:07 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0xf6ffffff) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:07 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:07 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) 14:19:07 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x81, 0x2000) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffff9c, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000100)={0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0x10, 0x1, @ib={0x1b, 0x10000, 0x6e, {"217a21e4311e51c13f169752306e4359"}, 0xc68, 0x8, 0xa54a}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000140)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0), r2}}, 0x18) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) socket$packet(0x11, 0x2, 0x300) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000005fc0), 0x80000000000006a, 0x24) 14:19:07 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0xfffffff6) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000040)={0x0, 0x5, 0x400, 0xffffffffffffffff, 'syz1\x00', 0x2}) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f00000001c0)) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x2, @mcast2, 0x1}, 0x1c) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="3321202e2f7c69ec65300ae15e1195eb043208ca77ebd078a5760edcbecdb2edb449ea2dddb711b8f5977e66f695c3da2647c8d575c2db2e52f891b05a02c0c53649401fe702df1aa296531c322718e35bf8b2498788d90ae73b9a1d28efae63a0809ac32771f3efcfa285957d1dfd7d1a01fede"], 0x3138) 14:19:07 executing program 0: socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000440)='/dev/audio\x00', 0x280, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000200)=ANY=[@ANYBLOB="c35202411b060cce7ab82389000d5cf6b99731c68f98dcc15798e20d33e4ed709e6c593bc39ecada563408680c6e0a49e11237ea340a6dcac4de8bba17409f3a579a67b87c00a2489901003f46d11097f626bc97"]) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TCSETAF(r1, 0x5404, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_GET_IRQCHIP(r3, 0xc208ae62, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r5, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x800000004}, 0x14) listen(r5, 0x2) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x10, &(0x7f0000000140)=[@in={0x2, 0x4e23, @local}]}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp6_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000), &(0x7f0000000080)=0x4) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x80000, 0x0) r8 = syz_open_dev$vcsa(&(0x7f00000004c0)='/dev/vcsa#\x00', 0x400, 0x0) write$P9_RLERROR(r8, &(0x7f0000000300)=ANY=[@ANYBLOB="170000000002000e046367726f75702dbc857455c7d094a6d2f02f6b8f6615eaa00e311a6b4cb4b6553c7cb93f64daecd9b7e7dcea001b11761382028cb52198f90b6dc570c2ab151b181974417b99c1066ae939c9b05a49b5567b393a12b92d7b227985cfc2177b5b2535b122ab0f58220c610500e012e4de1858f6493289fae6d61b8723d3a15c1621c6b2c11bf69917ecd1b27996e10e4b0a5db2b093408052244b29d74f17ec2e27da1a85b47bcba5540d0a40aa7e7423a8893b18b552fb4b3e735fe3dfd411b5b3026990e567e9e9071d0036987378f55d9b82311e34e7a6e3e700007c0d10fa3b823dafd289"], 0xe0) ioctl$SIOCRSGL2CALL(r8, 0x89e5, &(0x7f0000000080)=@default) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet6_mreq(r8, 0x29, 0x14, &(0x7f0000000280)={@mcast1}, &(0x7f00000002c0)=0x14) mkdir(&(0x7f00000001c0)='./file1\x00', 0x1) setsockopt$inet_mtu(r7, 0x0, 0xa, &(0x7f0000000180)=0x8000100042, 0x2b0) accept4(r8, &(0x7f0000000000)=@ax25, &(0x7f0000000500)=0xfffffffffffffea6, 0x80000) socket$inet6_udplite(0xa, 0x2, 0x88) syz_init_net_socket$llc(0x1a, 0x801, 0x0) socket(0x40000000216, 0x3, 0x1) 14:19:07 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) 14:19:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="3321202e2f6608e32b57a7a33e0a"], 0x3138) 14:19:08 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x6b6b6b00000000) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) [ 313.218979] sctp: [Deprecated]: syz-executor0 (pid 10687) Use of int in max_burst socket option. [ 313.218979] Use struct sctp_assoc_value instead 14:19:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x1f) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000340)={&(0x7f00000000c0)={0x278, r2, 0x800, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x1c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_LINK={0x128, 0x4, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc4b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb5fd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5db}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x77}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x200}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x10000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x859}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xac7e}]}, @TIPC_NLA_BEARER={0xbc, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x9, @local, 0x1}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x7, @ipv4={[], [], @remote}, 0x8}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0xde2, @mcast1, 0xfff}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}]}]}, 0x278}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x101080, 0x0) ioctl$VIDIOC_G_STD(r3, 0x80085617, &(0x7f0000000400)) 14:19:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) 14:19:08 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x406, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000003b4800004000000000000000800000000000000081000000000000008200000007000010000000000100000000000006c034a40200010000100000000000000000000000000c0908040c", 0x401}], 0x0, 0x0) 14:19:08 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000100)=0x10001, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') getsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000080), &(0x7f00000000c0)=0x4) sendfile(r1, r2, 0x0, 0x80000001) 14:19:08 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f0000000100)={r2, 0x9, 0x6, 0x2, 0x10001, 0x8, 0xf3b4}) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000140)=0x20, &(0x7f0000000180)=0x2) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:19:08 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x100000000000000) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) [ 313.780711] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=10722 comm=syz-executor0 14:19:08 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(0x0, 0x0, 0x2) 14:19:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c1f023c126285719070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x7, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r2, &(0x7f0000000000)={'3! ', './file0', [{0x20, '3! '}]}, 0xf) [ 313.917073] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=10736 comm=syz-executor0 14:19:08 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x200000000000000) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) [ 314.034986] (unnamed net_device) (uninitialized): option arp_interval: invalid value (18446744073709551615) [ 314.054930] (unnamed net_device) (uninitialized): option arp_interval: allowed values 0 - 2147483647 14:19:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(0x0, 0x0, 0x2) 14:19:08 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000100)=0x10001, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') getsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000080), &(0x7f00000000c0)=0x4) sendfile(r1, r2, 0x0, 0x80000001) [ 314.156957] (unnamed net_device) (uninitialized): option arp_interval: invalid value (18446744073709551615) [ 314.206636] (unnamed net_device) (uninitialized): option arp_interval: allowed values 0 - 2147483647 [ 314.271432] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=10758 comm=syz-executor0 14:19:09 executing program 1: syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(0xffffffffffffffff, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000300)) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:09 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x8cffffff00000000) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) r1 = inotify_init() r2 = inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x24000000) inotify_rm_watch(r1, r2) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x4, 0x4) 14:19:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(0x0, 0x0, 0x2) 14:19:09 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000100)=0x10001, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') getsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000080), &(0x7f00000000c0)=0x4) sendfile(r1, r2, 0x0, 0x80000001) 14:19:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080), 0x0, 0x2) [ 314.676001] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=10768 comm=syz-executor0 14:19:09 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:09 executing program 1: r0 = socket$inet(0x2, 0x0, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) inotify_init() write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB="3321212e2f666144d5790a"], 0x3138) 14:19:09 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0xf6ffffff00000000) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:09 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000100)=0x10001, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') getsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000080), &(0x7f00000000c0)=0x4) sendfile(r1, r2, 0x0, 0x80000001) 14:19:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080), 0x0, 0x2) 14:19:09 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(0x0, 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 315.158749] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=10797 comm=syz-executor0 14:19:09 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) getsockopt$bt_BT_DEFER_SETUP(r4, 0x112, 0x7, &(0x7f0000000140)=0x1, &(0x7f0000000200)=0x4) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080), 0x0, 0x2) 14:19:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0xb) 14:19:10 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000100)=0x10001, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000001) 14:19:10 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x181080, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080)=0x5, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x300000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r2, 0x8, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x40}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x4090}, 0x40010) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 315.534581] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=10821 comm=syz-executor0 14:19:10 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() r3 = dup2(r0, r0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="06010000", @ANYRES16=r4, @ANYBLOB="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"], 0x11c}, 0x1, 0x0, 0x0, 0x11}, 0x40) sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r5 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r5, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r6, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r6, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r6, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{}], 0x1, 0x2) 14:19:10 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:10 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000100)=0x10001, 0x4) sendfile(r1, 0xffffffffffffffff, 0x0, 0x80000001) 14:19:10 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x400) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:19:10 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{}], 0x1, 0x2) 14:19:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file1\x00', 0x80, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="0ed7c15a221e5ff102e9126c8a9d479ec1f131b40f8373f231cc61417cc17f3bc2d014c9cf986826a889d9b45780a3471ef07df057853c2deb45e7cd8449ff7c96f6e1f58d4431796ccc371efbc745fd3670c9e86eb92713177b1b6e7c1d6ff49fa3fa2d52fa", 0x66, 0x1}], 0x1000000, &(0x7f0000000180)={[{@nouuid='nouuid'}, {@allocsize={'allocsize', 0x3d, [0x37, 0x7b, 0x3d, 0x70]}}, {@inode32='inode32'}, {@nouuid='nouuid'}], [{@dont_hash='dont_hash'}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x35, 0x63, 0x7e, 0x37, 0x36, 0x64, 0x61], 0x2d, [0x77, 0x7a, 0x77, 0x7f5707f536c3aae6], 0x2d, [0x31, 0x77, 0x66, 0x33], 0x2d, [0x31, 0x65, 0x32, 0xccc2a59ede1688e9], 0x2d, [0x36, 0x39, 0x0, 0x36, 0x3e, 0x62, 0x7f, 0x37]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, ',GPL'}}]}) 14:19:10 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000001) 14:19:11 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x10900) ioctl$SCSI_IOCTL_DOORUNLOCK(r2, 0x5381) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r4 = creat(&(0x7f0000000880)='.//ile0\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r4, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r5, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r5, &(0x7f0000000040)='./file0\x00', 0x0) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000240)) mkdirat(r5, &(0x7f00000001c0)='.//ile0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x19, 0x1, 0x7fff, 0x10, r5, 0x8}, 0x2c) ptrace$peekuser(0x3, r3, 0x7) [ 316.230052] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=10854 comm=syz-executor0 14:19:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{}], 0x1, 0x2) 14:19:11 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x80000001) 14:19:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x0) 14:19:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file1\x00', 0x80, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="0ed7c15a221e5ff102e9126c8a9d479ec1f131b40f8373f231cc61417cc17f3bc2d014c9cf986826a889d9b45780a3471ef07df057853c2deb45e7cd8449ff7c96f6e1f58d4431796ccc371efbc745fd3670c9e86eb92713177b1b6e7c1d6ff49fa3fa2d52fa", 0x66, 0x1}], 0x1000000, &(0x7f0000000180)={[{@nouuid='nouuid'}, {@allocsize={'allocsize', 0x3d, [0x37, 0x7b, 0x3d, 0x70]}}, {@inode32='inode32'}, {@nouuid='nouuid'}], [{@dont_hash='dont_hash'}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x35, 0x63, 0x7e, 0x37, 0x36, 0x64, 0x61], 0x2d, [0x77, 0x7a, 0x77, 0x7f5707f536c3aae6], 0x2d, [0x31, 0x77, 0x66, 0x33], 0x2d, [0x31, 0x65, 0x32, 0xccc2a59ede1688e9], 0x2d, [0x36, 0x39, 0x0, 0x36, 0x3e, 0x62, 0x7f, 0x37]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, ',GPL'}}]}) 14:19:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x200, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x8000, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="3bac153321202e2f08006c65300a6fd927a7c41863272f493c3033a2478c6f46c4000000a12c9a4f00000000003589d1d3670d63dd753a89c668bf8c9e5f234c01d13c4e869fcb8fbcd3a71a6d2bfe2afdf079325483729245b90aaa9c9ad3d6d2564fae4a780a47416aabd0664b2173a06530457f39b3c2e1558c33ad576c52bb9b355be9169ad0404a66c44b7df1068cc705e72d89e793c924b59ec5b72fbc3345bf2a590b22f98efe9ef7910998b154d81edc4b5342e489e5dada6e586de67d8a15621db03e38c6d966aea020295e858c7bcc178862141c7dd30d9188bae9d9958beed9b37e11374e14c759caeee309e11787ce785d1ee82f5bf390c8721684c21b8f6f39d918165d172d8c43034312067f12b4"], 0x3138) 14:19:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x0) 14:19:11 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:11 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:11 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r0, r1, 0x0, 0x80000001) 14:19:11 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_TRANSLATE(r3, 0xc018ae85, &(0x7f0000000140)={0x1000, 0x5002, 0x1, 0x5, 0x4}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) setsockopt$inet6_tcp_buf(r3, 0x6, 0x0, &(0x7f0000000380)="88f1b7983d8746a6df8875acdce5f5ff7c0cf603c0fa7a333adf3481f945c8a7b28954f33e9ac243c73748edce8f5e6e20d30754bc751fb254e4ba26ea519637659d39e73c49afcd899050372932c4b1d83efa239056145a8f9e77de0c395159ea364eff12263a4ce1cff0a2a7548cb96dee8d5deb8a7971359e0a26bc2adb7ca55ad1231b322a2a82ad0140420091ac385a30", 0x93) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) [ 317.103185] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=10902 comm=syz-executor0 14:19:12 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:12 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x1, 0x0) connect$rose(r2, &(0x7f0000000200)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x4, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x40) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r4 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r4, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r5, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r5, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r5, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r3, 0x7) 14:19:12 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r0, r1, 0x0, 0x80000001) [ 317.386351] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=10916 comm=syz-executor0 14:19:12 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r0, r1, 0x0, 0x80000001) 14:19:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x0) 14:19:12 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f0000000100)="c06b9a7d68658f729661e68709eeba5238c8939910184ecb257a6f7924f969e4b9abf7497b8680583468b50c33f46106e86f056a811c3ac1cd8b539c79eb5dcdf83765"}, {&(0x7f0000000240)="6403b9"}], 0x1000000000000252) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r5, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r5, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r5, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) [ 317.665334] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=10929 comm=syz-executor0 14:19:12 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(0x0, 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0xc0, &(0x7f0000000080)=[@in={0x2, 0x4e24, @local}, @in={0x2, 0x4e20, @broadcast}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e21, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, @in6={0xa, 0x4e20, 0xfffffffffffffff9, @loopback, 0x4}, @in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e23, 0x2, @local, 0x8}, @in6={0xa, 0x4e21, 0xffff, @loopback, 0xaf9}, @in={0x2, 0x4e20, @multicast1}]}, &(0x7f0000000140)=0x10) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x4a800, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x200000, 0x0) ioctl$KVM_GET_PIT(r2, 0xc048ae65, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000180)={r1, 0x5}, &(0x7f00000001c0)=0xc) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:19:12 executing program 0: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r0, r1, 0x0, 0x80000001) 14:19:12 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:12 executing program 0: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r0, r1, 0x0, 0x80000001) 14:19:12 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x100000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(r2, r2, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:13 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x8001, 0x1) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f0000000080)={0x1, 0x1}) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:19:13 executing program 0: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r0, r1, 0x0, 0x80000001) 14:19:13 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_getscheduler(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:13 executing program 0: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000001) 14:19:13 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x40000, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000200)=@sack_info={0x0, 0x100000000, 0xfffffffffffffffc}, &(0x7f0000000240)=0xc) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f00000002c0)={0xbe05, 0x200, 0x9, 0xfff, r4}, &(0x7f0000000300)=0x10) r5 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r5, 0x40106439, &(0x7f0000000280)) renameat2(r3, &(0x7f0000000380)='./file0/f.le.\x00', r6, &(0x7f00000003c0)='./file0/f.le./file0\x00', 0x5) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) fstat(r3, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000840)=0x0, &(0x7f0000000c40), &(0x7f0000000c80)) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000cc0)={{{@in, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@multicast2}}, &(0x7f0000000dc0)=0xe8) getresuid(&(0x7f0000000e00), &(0x7f0000000e40)=0x0, &(0x7f0000000e80)) getresuid(&(0x7f0000000ec0)=0x0, &(0x7f0000000f00), &(0x7f0000000f40)) fstat(r6, &(0x7f0000000f80)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfsplus(&(0x7f0000000440)='hfsplus\x00', &(0x7f0000000480)='./file0/f.le.\x00', 0xfff, 0x8, &(0x7f0000000b00)=[{&(0x7f00000004c0)="6be012186c9c89efeb468be74c5eee373b84fc1240041f4cb19a8ef3cdbe71198f3791d5b83caeeecc8b97ddc1f8603fed10295eb5c929c0a0a2bc4421a7fe50f1f619faa127418f7f52c5a8f85c3678be55805a80449ba3658b5f1cb5c93fcfd20bb7514e33d8a2dc7ec24363990872f8b758b5a0297694b7d93a05bc349c7d25d339727b1761", 0x87}, {&(0x7f0000000580)="e66a7c637ebc4b84599329eda8a26791f0ce67822115117f773aec15fe8c9d2fbf57ee95a2b35362939282f716be92", 0x2f}, {&(0x7f0000000740)="cf16412f964d2f78074d0027672cae17b5d6554827bbcdec78e944b4cc9aa6b5238afe3bd2795cdbf62b12835b270fe49880f9512372d281fcea01bd5f04c3ae505d837027c255246bb6d9ed3893cd57191ea073192f07f681c9c653c7ad1a5ef9c70e0d0703d3568667cf8a675b5c0c443160a857b14443d50b74e6c046459213c1fc1e22a68b2b4a8c291a8ab3c4a54d3da02dec4d4afd0e13f63addc10e82158262ad40a1c1e10688b398d93318161b4700e72ec43cfaa92953debc21ea279a982266c7a707a3694be2ca5fd7869224ab2892151fb124bb943be7061c", 0xde, 0x9}, {&(0x7f00000005c0)="0cbc3598879673f569992bbbf0aa1dbd3556063dfbcde7112d57c0f097c083963ab43834d595a5ef833f38eb67dce1c5022a73d4f8582f071a5177456e849e95f8ff42aa1c264429e06be42dcccadbde2d732a38ed", 0x55, 0x100000000}, {&(0x7f00000008c0)="2cb3df5acd4de4e546b0427a595b27e03589824194e0daea2f3ec3ea619f126a1c014afbdb81518eab6537d3db319ff342d3a3085499e0f4688a4c56d0f1a1862d1f1ce9d6a4d9138acdf5c9c7320d047f24d663fe0c251394fb9dcb3042d72c8c747734965bfc4a31bedad44e8735ce1347ce958fa077a142d06b08d052c935cd72c6a1fef2096840eee67f9ff0c458c20883ec284a679bd4", 0x99, 0x2}, {&(0x7f0000000640)="a8e5dbc7a981f10cf93c86773d1ca1fc180ab52971ffd856697eacbbe85e9493879c7f78baa0456dc59e69e3f7e9662b785dd040716cd153bb78", 0x3a, 0x9ada}, {&(0x7f0000000980)="a2bb62d59285d69dfb9f02ad8b3d9b66d39aea8ec74bf67d63a506b7f1dcba1159f744a038fc143e096e0e1c23ca9eed89016ae7ad782149709c567683b8fb49e1e101525ceddaa038f55b91d8ce3673c5c6055b450cedf76530dac5bc307ffe7fac644f8f", 0x65, 0x7fff}, {&(0x7f0000000a00)="9ee5c0a597738e91a31924b67e2b4179facfb4e5124b28c8f4e54fe34a46bc7b6eb560215012ded939cd169542d6171b251cf66f02089d2d774d01b3728c7eb609760a67f0288633789360ece37b6993af36b474812687851f1e655b9426f52fd8d6bc772ceaba4a088dbf7f4e3dbacb9630fab270309c96c3d62f5f7bc24bd87921e3f3232ae788907e8f0cccf2206473a9bc4f9cb392ffba1a6678dfa17aa16eb7f9dda269f1505dddf6ae1e57ba477333ee6a0de0f76176b16e0ec3c4ec47e3f80c26df55cd90bc04d5caf1a456d802d2c31ea7596aedb00cb14c7e1b79ae2ccf413910086cae64200ebc93f18ad711", 0xf1, 0x5}], 0x110004, &(0x7f0000001000)={[{@creator={'creator', 0x3d, "3150bdb0"}}, {@session={'session', 0x3d, 0x5}}, {@gid={'gid', 0x3d, r7}}, {@nls={'nls', 0x3d, 'cp936'}}, {@nodecompose='nodecompose'}, {@gid={'gid', 0x3d, r8}}, {@uid={'uid', 0x3d, r9}}, {@nobarrier='nobarrier'}], [{@euid_eq={'euid', 0x3d, r10}}, {@uid_eq={'uid', 0x3d, r11}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@subj_role={'subj_role', 0x3d, '$'}}, {@fowner_gt={'fowner>', r12}}]}) setsockopt$inet_sctp6_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000400)={0x80, 0x1, 0xd0, 0xd7}, 0x8) r13 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r13, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r13, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r13, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x8001, 0x1) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f0000000080)={0x1, 0x1}) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:19:13 executing program 0: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000001) 14:19:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000000c0)={0x2, [0x7, 0x5]}, 0x8) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000100)=0x4d66) 14:19:13 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:13 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r3, 0x0, 0x3, &(0x7f0000000140)=0x4, 0x4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:13 executing program 0: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000001) [ 318.957386] selinux_nlmsg_perm: 5 callbacks suppressed [ 318.957403] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=10997 comm=syz-executor0 14:19:13 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x181080, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080)=0x5, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x300000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r2, 0x8, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x40}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x4090}, 0x40010) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:19:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) fsync(r0) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:19:13 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x100000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(r2, r2, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:13 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r0, r1, 0x0, 0x80000001) 14:19:13 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f0000000140)={0x1, 0x5}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) [ 319.216179] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=11013 comm=syz-executor0 14:19:14 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r0, r1, 0x0, 0x80000001) 14:19:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:19:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) inotify_init() write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB="3321212e2f666144d5790a"], 0x3138) 14:19:14 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0206434, &(0x7f00000002c0)={0xaecf, 0x0, 0x10002, 0x10000}) ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0206434, &(0x7f00000003c0)={0xff, 0x0, 0x10001, 0x100000000}) ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0206434, &(0x7f0000000440)={0x1000, 0x0, 0x2, 0x7}) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000480)={0x8, r4}) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r5, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r5, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r5, &(0x7f00000001c0)='.//ile0\x00', 0x0) rename(&(0x7f0000000140)='\x00', &(0x7f0000000200)='./file0\x00') ptrace$peekuser(0x3, r2, 0x7) [ 319.510491] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=11025 comm=syz-executor0 14:19:14 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:14 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r0, r1, 0x0, 0x80000001) 14:19:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000580)=@nat={'nat\x00', 0x19, 0x2, 0x4b8, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000548], 0x0, &(0x7f0000000080), &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0xf, 0x0, 0xf8, 'nr0\x00', 'team0\x00', 'gre0\x00', 'nr0\x00', @dev={[], 0x13}, [0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0x0, 0xff, 0x0, 0xff], 0x2a8, 0x318, 0x350, [@bpf0={'bpf\x00', 0x210, {{0x23, [{0x81, 0x8000, 0x0, 0x6}, {0x401, 0x40, 0xd159, 0x7}, {0x1, 0x7ff, 0x100, 0x5f}, {0x7d8, 0x9, 0xe27, 0x8}, {0x8001, 0x1, 0x100000001, 0xa1}, {0x4, 0xffffffffffff1ec8, 0x1, 0x8}, {0x31a2, 0x7, 0xfffffffffffffffa, 0x9}, {0x6, 0x9, 0xb0, 0x3e4}, {0x800, 0x0, 0x10001, 0x3ff}, {0x5f5}, {0x80000001, 0x6, 0x3}, {0x7, 0x7, 0x161000000000, 0xb8f}, {0x3f, 0x3f800000000000, 0xfffffffffffffbfd, 0xac}, {0x1, 0x7fffffff, 0x8001, 0x3f}, {0xed5, 0x0, 0x4, 0x6}, {0x81, 0x6, 0x3, 0x1}, {0x4, 0x80, 0x8, 0x7be29951}, {0x7fffffff, 0xffffffff, 0x1, 0x5}, {0x7, 0x4, 0x35f0, 0x4}, {0xe26754, 0xfffffffffffffffe, 0x6, 0x55dcb37d}, {0x9, 0x800, 0x1, 0x43e39818}, {0x1f, 0x55, 0x0, 0xfff}, {0x2, 0xffffffffffffff80, 0x9000, 0x3}, {0xe0ae, 0x81, 0x4, 0x200}, {0xffffffffffffff81, 0x3, 0x3, 0x1}, {0x9, 0x3ff, 0x0, 0xfff}, {0x4, 0x1, 0x7}, {0x7, 0xfffffffffffffffa, 0x8, 0xfc70}, {0x0, 0x1, 0xff, 0x9}, {0x3ff, 0x3, 0x10001, 0xd27}, {0x7, 0x8, 0x4, 0xe36f}, {0x7, 0x7, 0x1, 0xc17e}, {0x1, 0x7, 0x8, 0x1}, {0x3f, 0x4, 0x5, 0x7ff}, {0x0, 0x3, 0x5, 0x9}, {0x3, 0x63c, 0x6, 0x5}, {0x200, 0x63aa, 0x7f, 0xfffffffffffff1b8}, {0x1, 0x3, 0x1, 0x2}, {0x2, 0x10000, 0x8001, 0x6}, {0x1000, 0x200, 0x100000000, 0x9}, {0xff, 0x403bc5fb, 0xffffffff, 0x5}, {0x0, 0xff, 0x7, 0xfff}, {0x20, 0x80000001, 0x2, 0x3}, {0x2, 0x0, 0x9, 0x4}, {0x100000001, 0x5, 0xfffffffffffffff8, 0x2}, {0x4, 0x1000, 0x7, 0x4}, {0x7fff, 0x6, 0x2, 0x8}, {0x6, 0xfffffffffffffff8, 0x7e0, 0x9}, {0x80000001, 0x80000000, 0x8, 0x59}, {0x80, 0x5}, {0x7, 0xfffffffffffffe00, 0x2, 0x7f}, {0x0, 0xffffffff, 0x2, 0x6}, {0x56, 0x0, 0x7, 0x5cd72e9a}, {0x0, 0x5, 0xff, 0x3}, {0x200, 0x115dc, 0x1, 0xd9}, {0x200, 0x200, 0x3, 0x101}, {0x4, 0x1, 0xfffffffffffffffd, 0x8001}, {0x9, 0x10001, 0x3ff, 0x100000000}, {0x7f, 0x4, 0x2, 0x1}, {0x5, 0x9, 0xffff, 0x81}, {0x3e, 0x0, 0xfffffffffffffff8, 0x1}, {0x6, 0x10001, 0x7c, 0xffffffff}, {0x3e, 0x100000001, 0x959, 0x221c}, {0x3, 0x9, 0x20, 0x5}], 0x1}}}]}, [@snat={'snat\x00', 0x10, {{@remote, 0xebe682e6ec0cde3}}}, @arpreply={'arpreply\x00', 0x10, {{@remote, 0xfffffffffffffffe}}}]}, @snat={'snat\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, 0xfffffffffffffffe}}}}, {{{0x3, 0x20, 0x4305, 'veth1_to_bridge\x00', 'lo\x00', 'bridge0\x00', 'syzkaller0\x00', @empty, [0x0, 0x0, 0xff, 0xff, 0xff, 0xff], @empty, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], 0x70, 0xa0, 0xd8}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x4}}}]}, @common=@dnat={'dnat\x00', 0x10, {{@remote, 0xfffffffffffffffc}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x530) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:19:14 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:14 executing program 5 (fault-call:4 fault-nth:0): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) 14:19:14 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000380)={{{@in=@initdev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0xe8) getresgid(&(0x7f0000000200), &(0x7f0000000240)=0x0, &(0x7f00000002c0)) write$FUSE_ENTRY(r3, &(0x7f0000000480)={0x90, 0x0, 0x1, {0x1, 0x1, 0x101, 0x7ff, 0x10001, 0xe40, {0x0, 0x7fffffff, 0x5d, 0x1, 0xbe3e, 0xffff, 0x8ee, 0x8001, 0x6, 0x0, 0x2, r4, r5, 0x1, 0x4}}}, 0x90) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r6, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r6, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r6, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) [ 319.826668] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=11039 comm=syz-executor0 14:19:14 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000001) 14:19:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) 14:19:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800, 0x400003c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @loopback, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 320.156728] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=11060 comm=syz-executor0 14:19:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x8}], 0x1, 0x2) 14:19:15 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000001) 14:19:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000080)={0x20, 0xc2d9, 0x6, 0x200, 0x5, [{0x5, 0x7f, 0x2, 0x0, 0x0, 0x404}, {0x4, 0x400, 0x7}, {0x3, 0x240000000, 0x8, 0x0, 0x0, 0x6}, {0x8, 0x86, 0x10000, 0x0, 0x0, 0x800}, {0x8001, 0x5, 0x2, 0x0, 0x0, 0x1000}]}) [ 320.375676] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=11076 comm=syz-executor0 14:19:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x64}], 0x1, 0x2) 14:19:15 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) fstat(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000400)='.//ile0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000200)='.//ile0\x00', 0x9, 0x2, &(0x7f0000000300)=[{&(0x7f0000000240)="46e6b6bf2344704c30be458c6a5cdafce61521da633a7868c8bafd1bdec922ef693b7e36f8856b", 0x27, 0x5}, {&(0x7f00000002c0)="3140b4fec5d9930b41339bedda2eb405fbe19e", 0x13, 0x10000}], 0x20c4000, &(0x7f00000004c0)={[{@rodir='rodir'}, {@uni_xlateno='uni_xlate=0'}, {@nonumtail='nnonumtail=1'}, {@utf8='utf8=1'}, {@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}, {@fat=@errors_remount='errors=remount-ro'}, {@nonumtail='nnonumtail=1'}], [{@euid_gt={'euid>', r1}}, {@smackfsroot={'smackfsroot', 0x3d, './cgroup\x00'}}, {@obj_role={'obj_role', 0x3d, './cgroup\x00'}}, {@uid_eq={'uid', 0x3d, r2}}]}) removexattr(0x0, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r3, 0x0, 0x0) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r5 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r3, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r5, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r6, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r6, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r6, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r4, 0x7) 14:19:15 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000001) 14:19:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000140)={'3! ', './file0', [], 0xa, "a4175e1be752fa8277809e63bfe76cf04b19be4846d2503d4564b293c382155fd94f629182e98991c878426efbbfb502ab69f2591eac2d2e3e3ffe71d068a17abbc9f259cc654686cf7b62f2ff3deb91e28dc7f56247198c3219e35598cb9e99e4428b23ca287ecbee46f443475043e8be82f91d65e777ab45dfb906a85d576423483eb92905aee3f1f372bd0fc5adf78ddc9c445f33bc89f2d4d536c8cb3a26"}, 0xffffffffffffff55) 14:19:15 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:15 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 320.747386] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=11091 comm=syz-executor0 14:19:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x140}], 0x1, 0x2) 14:19:15 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000080)={'3! ', './file0', [{0x20, '-em1'}, {0x20, '3! '}, {0x20, '3! '}, {0x20, '3! '}, {0x20, '3! '}]}, 0x20fe) 14:19:15 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000001) 14:19:15 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [{}, {0x20, 'ppp0vmnet0}user'}, {0x20, '-vboxnet1trustedtrusted{-ppp1vboxnet0GPLcpusetvboxnet0)'}], 0xa, "47e1cfbfab2d93d7ea6b0591dbc19a043a92a2a49b92a847c993706880e3d006441a949bcd0ec17360d60d858ee19ebba793d3f0e0544e"}, 0x8b) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000140), &(0x7f0000000180)=0x4) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) setsockopt$inet6_udp_int(r1, 0x11, 0xb, &(0x7f0000000000), 0x4) 14:19:15 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f00000002c0)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0206434, &(0x7f0000000300)={0x72, 0x0, 0x0, 0x615d}) sendmsg$nl_generic(r3, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000400)={0x128, 0x36, 0x400, 0x70bd2d, 0x25dfdbfb, {0xd}, [@nested={0x114, 0x43, [@generic="957fb8cf6d84bc6e7c3466a1df8daed34c", @generic="761f7196ee973e6731bf38652ec1ae12a83aaba416541b62ab93f6c7a79d906b98c806ea11185330edc0905e4e7a2bcb76e59abd6bdd0ef1b6db79635f01df3f73f794d9d75f0ba6b1a5364aa117b8f0f3c8e0cdd4d944ff732fe6f951ee52ddab104e570287f13217e960c8c80eb5f03e4de0a669147a73d4cad5ce64142186e2e3bcb83e27e72839cc43b0c647665c384563b87c6f05f8ffea8ed3fd1c432cacd91f00385ca6daff9cec2f97a1ebe5dcde671f851ee8f0c4a73a72fc6fd1a41bc718be7270528e15f5218b19f2ccf23a30deeead3867743c6dbb32f87e19abedcf9f2749f3d62451", @typed={0x14, 0x1c, @str='trusted/eth1\x00'}]}]}, 0x128}, 0x1, 0x0, 0x0, 0x4000004}, 0x20000000) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)={0x3ff, r5}) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x10000, 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r6, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r3, &(0x7f0000000380)='./file0\x00', 0x10) mkdirat(r6, &(0x7f00000001c0)='.//ile0\x00', 0x0) pipe2$9p(&(0x7f0000000140), 0x84000) sched_setattr(r2, &(0x7f00000005c0)={0x30, 0x6, 0x1, 0x6, 0x8, 0x3, 0x200, 0xcb0f}, 0x0) ptrace$peekuser(0x3, r2, 0x7) syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x5, 0x5a1040) 14:19:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x3f00}], 0x1, 0x2) [ 321.078204] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=11118 comm=syz-executor0 14:19:15 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000001) 14:19:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000080)={{{@in=@multicast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000180)=0xe8) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0xa00009, &(0x7f00000001c0)={[{@metacopy_off='metacopy=off'}, {@nfs_export_on='nfs_export=on'}, {@index_on='index=on'}, {@nfs_export_off='nfs_export=off'}, {@index_off='index=off'}, {@default_permissions='default_permissions'}, {@xino_auto='xino=auto'}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@metacopy_on='metacopy=on'}, {@index_off='index=off'}], [{@fowner_gt={'fowner>', r1}}]}) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:19:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x4000}], 0x1, 0x2) [ 321.300524] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=11131 comm=syz-executor0 14:19:16 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000001) [ 321.457074] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=11142 comm=syz-executor0 14:19:16 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:16 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x840fc, 0x0) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x401, 0x210000) 14:19:16 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f0000000140)) ptrace$peekuser(0x3, r2, 0x7) 14:19:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x4001}], 0x1, 0x2) 14:19:16 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x0, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000001) 14:19:16 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [{}, {0x20, 'ppp0vmnet0}user'}, {0x20, '-vboxnet1trustedtrusted{-ppp1vboxnet0GPLcpusetvboxnet0)'}], 0xa, "47e1cfbfab2d93d7ea6b0591dbc19a043a92a2a49b92a847c993706880e3d006441a949bcd0ec17360d60d858ee19ebba793d3f0e0544e"}, 0x8b) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000140), &(0x7f0000000180)=0x4) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) setsockopt$inet6_udp_int(r1, 0x11, 0xb, &(0x7f0000000000), 0x4) 14:19:16 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x6, 0x800) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(r2, r2, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000140)={0xfffffffffffffffb, 0x4, 0x0, 0x7}, 0x8) ptrace$peekuser(0x3, r2, 0x7) 14:19:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x6400}], 0x1, 0x2) 14:19:16 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000001) 14:19:16 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffa}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:19:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$caif_stream(0x25, 0x1, 0x3) clock_gettime(0x0, &(0x7f0000004180)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000004040)=[{{&(0x7f0000000080)=@alg, 0x80, &(0x7f0000000340)=[{&(0x7f0000000000)=""/31, 0x1f}, {&(0x7f0000000100)=""/90, 0x5a}, {&(0x7f0000000180)=""/114, 0x72}, {&(0x7f0000000200)=""/39, 0x27}, {&(0x7f0000000240)=""/12, 0xc}, {&(0x7f0000000280)=""/102, 0x66}, {&(0x7f0000000300)=""/56, 0x38}], 0x7, &(0x7f00000003c0)=""/33, 0x21}, 0x4}, {{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000400)=""/218, 0xda}, {&(0x7f0000000500)=""/163, 0xa3}], 0x2}}, {{0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000600)=""/212, 0xd4}, {&(0x7f0000000700)=""/233, 0xe9}, {&(0x7f0000000800)=""/249, 0xf9}, {&(0x7f0000000900)=""/136, 0x88}, {&(0x7f00000009c0)=""/48, 0x30}, {&(0x7f0000000a00)=""/25, 0x19}, {&(0x7f0000000a40)=""/82, 0x52}], 0x7, &(0x7f0000000b40)=""/93, 0x5d}, 0x7}, {{&(0x7f0000000bc0)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000000c40)=""/35, 0x23}, {&(0x7f0000000c80)=""/1, 0x1}], 0x2}, 0xd675}, {{&(0x7f0000000d00)=@generic, 0x80, &(0x7f0000003f00)=[{&(0x7f0000000d80)=""/4096, 0x1000}, {&(0x7f0000001d80)=""/4096, 0x1000}, {&(0x7f0000002d80)=""/163, 0xa3}, {&(0x7f0000002f00)=""/4096, 0x1000}, {&(0x7f0000002e40)=""/99, 0x63}], 0x5, &(0x7f0000003f80)=""/143, 0x8f}, 0x94}], 0x5, 0x60, &(0x7f00000041c0)={r1, r2+10000000}) r3 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r3, &(0x7f0000004200)=ANY=[@ANYBLOB="3321202e77847a7d36cb9b665c696c65300a000000"], 0x3138) 14:19:17 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0xff00}], 0x1, 0x2) 14:19:17 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x1, 0x0) write$selinux_validatetrans(r5, &(0x7f0000000080)={'system_u:object_r:semanage_trans_lock_t:s0', 0x20, 'system_u:object_r:logrotate_exec_t:s0', 0x20, 0x0, 0x20, '/usr/sbin/cupsd\x00'}, 0x76) ptrace$peekuser(0x3, r2, 0x7) 14:19:17 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) 14:19:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="6e119abf153958204459b4e5244eb15af66e68f36c710413c8f95010eaa774b5f6a5f00a57ebbf83ffcd61846b3ed807e43a1f4f07931af16b792478a0bd4f9602fdaa0d939526f8ce94f0514a900233"], 0x3138) 14:19:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f0000000080)=0x800) socket$inet_udplite(0x2, 0x2, 0x88) 14:19:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x1000000}], 0x1, 0x2) 14:19:17 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) sendmsg$rds(r3, &(0x7f0000001140)={&(0x7f0000000140)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000200)=""/127, 0x7f}, {&(0x7f0000000380)=""/143, 0x8f}, {&(0x7f00000002c0)=""/4, 0x4}, {&(0x7f0000000440)=""/163, 0xa3}], 0x4, &(0x7f0000000f40)=ANY=[@ANYBLOB="580000000000000014010000070000000700000001010000", @ANYPTR=&(0x7f0000000500)=ANY=[@ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00'], @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB="0000000001000000"], @ANYBLOB="000000000000000005000000000000000100000000000000ff0300000000000000000000000000003f000000000000001800000000000000140100000c0000000001000000000000580000000000000014010000060000006e05000049cd0000", @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB="0500000000000000"], @ANYPTR=&(0x7f0000000680)=ANY=[@ANYBLOB="060000000000000014612ca8ef8cf196d8b10c251d680ac373bd9c9caef2088574abc90f7ee941fa72ccdc9a00000000"], @ANYBLOB="9a060000000000000700000000000000552bf308000000004900000000000000040000000000000015040000000000004800000000000000140100000100000004000000ff070000", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='?\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000b00)=ANY=[@ANYPTR=&(0x7f0000000740)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="b400000000000000", @ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="9100000000000000", @ANYPTR=&(0x7f0000000800)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='I\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000980)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='}\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000640)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="1600000000000000", @ANYPTR=&(0x7f0000000a00)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="b700000000000000", @ANYPTR=&(0x7f0000000ac0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='$\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0700000000000000100000000000000000000000000000001800000000000000140100000200000020000000040000004800000000000000140100000100000009000000ff7f0000", @ANYPTR=&(0x7f0000000b80)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="c900000000000000", @ANYPTR=&(0x7f0000000d80)=ANY=[@ANYPTR=&(0x7f0000000c80)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="e500000000000000"], @ANYBLOB="01000000000000000800000000000000060000000000000030000000000000001401000003000000", @ANYPTR=&(0x7f0000000dc0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="ba00000000000000", @ANYPTR=&(0x7f0000000e80)=ANY=[@ANYBLOB='\x00'], @ANYBLOB="0c00000000000000580000000000000014010000080000000000000051000000", @ANYPTR=&(0x7f0000000ec0)=ANY=[@ANYBLOB="0500000000000000"], @ANYPTR=&(0x7f0000000f00)=ANY=[@ANYBLOB="0300000000000000"], @ANYBLOB="05000000000000000400000000000000080000000000000009000000000000000200000000000000050d000000000000"], 0x1f8, 0x8800}, 0x10) pread64(r3, &(0x7f0000001180)=""/179, 0xb3, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) ioctl$TCSETSF(r3, 0x5404, &(0x7f00000005c0)={0x5, 0x8, 0x8, 0x1d0, 0x5, 0x4, 0x4, 0x8, 0x3, 0x9a6c, 0xffff, 0x575e817c}) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:17 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x80000001) 14:19:17 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x1, 0x0) write$selinux_validatetrans(r5, &(0x7f0000000080)={'system_u:object_r:semanage_trans_lock_t:s0', 0x20, 'system_u:object_r:logrotate_exec_t:s0', 0x20, 0x0, 0x20, '/usr/sbin/cupsd\x00'}, 0x76) ptrace$peekuser(0x3, r2, 0x7) 14:19:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x8000000}], 0x1, 0x2) 14:19:17 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) r2 = accept4(r1, &(0x7f0000000080)=@ax25={{0x3, @default}, [@null, @rose, @bcast, @remote, @default, @rose, @null]}, &(0x7f0000000000)=0x80, 0x80000) fcntl$getflags(r0, 0x40a) getsockopt$inet_opts(r2, 0x0, 0x9, &(0x7f0000000100)=""/139, &(0x7f00000001c0)=0x8b) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:19:18 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x3f000000}], 0x1, 0x2) 14:19:18 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x80000001) 14:19:18 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UDMABUF_CREATE_LIST(r3, 0x40087543, &(0x7f0000000140)=ANY=[@ANYBLOB="0100000000000000", @ANYRES32=r1, @ANYBLOB="0000000000400001000000000010000000000000"]) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x4, 0x8}, &(0x7f0000000080)=0xc) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000000c0)={r1, 0x3, 0x3, [0x1000, 0x3f, 0x9]}, 0xe) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:19:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$caif_stream(0x25, 0x1, 0x3) clock_gettime(0x0, &(0x7f0000004180)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000004040)=[{{&(0x7f0000000080)=@alg, 0x80, &(0x7f0000000340)=[{&(0x7f0000000000)=""/31, 0x1f}, {&(0x7f0000000100)=""/90, 0x5a}, {&(0x7f0000000180)=""/114, 0x72}, {&(0x7f0000000200)=""/39, 0x27}, {&(0x7f0000000240)=""/12, 0xc}, {&(0x7f0000000280)=""/102, 0x66}, {&(0x7f0000000300)=""/56, 0x38}], 0x7, &(0x7f00000003c0)=""/33, 0x21}, 0x4}, {{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000400)=""/218, 0xda}, {&(0x7f0000000500)=""/163, 0xa3}], 0x2}}, {{0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000600)=""/212, 0xd4}, {&(0x7f0000000700)=""/233, 0xe9}, {&(0x7f0000000800)=""/249, 0xf9}, {&(0x7f0000000900)=""/136, 0x88}, {&(0x7f00000009c0)=""/48, 0x30}, {&(0x7f0000000a00)=""/25, 0x19}, {&(0x7f0000000a40)=""/82, 0x52}], 0x7, &(0x7f0000000b40)=""/93, 0x5d}, 0x7}, {{&(0x7f0000000bc0)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000000c40)=""/35, 0x23}, {&(0x7f0000000c80)=""/1, 0x1}], 0x2}, 0xd675}, {{&(0x7f0000000d00)=@generic, 0x80, &(0x7f0000003f00)=[{&(0x7f0000000d80)=""/4096, 0x1000}, {&(0x7f0000001d80)=""/4096, 0x1000}, {&(0x7f0000002d80)=""/163, 0xa3}, {&(0x7f0000002f00)=""/4096, 0x1000}, {&(0x7f0000002e40)=""/99, 0x63}], 0x5, &(0x7f0000003f80)=""/143, 0x8f}, 0x94}], 0x5, 0x60, &(0x7f00000041c0)={r1, r2+10000000}) r3 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r3, &(0x7f0000004200)=ANY=[@ANYBLOB="3321202e77847a7d36cb9b665c696c65300a000000"], 0x3138) 14:19:18 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f0000000200)=""/62) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000140)={0x8, 0x0, 0x8001, 0x8001, 0x2}, 0x14) 14:19:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x40000000}], 0x1, 0x2) 14:19:18 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x0) 14:19:18 executing program 3: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) getsockname$unix(r0, &(0x7f00000000c0)=@abs, 0xfffffffffffffffe) 14:19:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x4, 0x8}, &(0x7f0000000080)=0xc) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000000c0)={r1, 0x3, 0x3, [0x1000, 0x3f, 0x9]}, 0xe) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:19:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x40010000}], 0x1, 0x2) 14:19:19 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:19 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x0) 14:19:19 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x200400) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) sched_setscheduler(r2, 0x1, &(0x7f0000000140)=0x100000000) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xb3, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x218000, 0x0) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x3f) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:19:19 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f0000000200)=""/62) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000140)={0x8, 0x0, 0x8001, 0x8001, 0x2}, 0x14) 14:19:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x64000000}], 0x1, 0x2) 14:19:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0xfcffffff}], 0x1, 0x2) 14:19:19 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0xff000000}], 0x1, 0x2) 14:19:19 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x0) 14:19:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000000)) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) r1 = syz_open_dev$audion(&(0x7f0000000340)='/dev/audio#\x00', 0x0, 0x8000) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000380)={0x1, 'tunl0\x00', 0x2}, 0x18) 14:19:19 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:19 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0xfffffffc}], 0x1, 0x2) 14:19:19 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', r2}, 0x10) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:19:19 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x200400) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) sched_setscheduler(r2, 0x1, &(0x7f0000000140)=0x100000000) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xb3, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:19 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$KVM_SET_PIT2(r3, 0x4070aea0, &(0x7f0000000200)={[{0x8f4, 0xf4, 0xa3ef, 0x5, 0x81, 0x5, 0x3f, 0x3, 0xfff, 0x4, 0x3a6d, 0x5, 0x5}, {0x40, 0x5, 0x4, 0x3638, 0x7, 0x8001, 0x3, 0xfffffffffffff000, 0x7, 0x8001, 0x400, 0xb0, 0x1000}, {0x9, 0x5, 0x10001, 0x3, 0x2800000000000000, 0x1, 0x0, 0x3, 0x5, 0x5, 0x9, 0x64, 0x6c}], 0xf98}) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x1ff) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x100000000000000}], 0x1, 0x2) 14:19:20 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x200400) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) sched_setscheduler(r2, 0x1, &(0x7f0000000140)=0x100000000) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xb3, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:20 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:20 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) setxattr$security_evm(&(0x7f0000000140)='.//ile0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000240)=@sha1={0x1, "f723a10827e4d252dc7130bf61ef9b24442c13b4"}, 0x15, 0x1) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:20 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x50010, r0, 0x0) 14:19:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x800000000000000}], 0x1, 0x2) 14:19:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) getpeername(r0, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000000)=0x80) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f0000000100)) socket$inet_udplite(0x2, 0x2, 0x88) bind$isdn_base(r2, &(0x7f0000000180)={0x22, 0x1ff, 0x9, 0x7, 0xffffffffffffffe0}, 0x6) 14:19:20 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x218000, 0x0) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x3f) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:19:20 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x840fc, 0x0) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x401, 0x210000) 14:19:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x3f00000000000000}], 0x1, 0x2) 14:19:20 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$TIOCMSET(r3, 0x5418, &(0x7f0000000140)=0x47) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:20 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x40, 0x0) mq_getsetattr(r0, &(0x7f0000000080)={0x6, 0x6, 0x8000, 0x3, 0x1, 0x8, 0x8, 0xd3f9}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x200000000003, 0x80000001) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)=ANY=[@ANYBLOB='\x00\x00\x00 \x00\x00\x00\x00\x00\x00\x00'], 0x3138) [ 326.191337] audit: type=1400 audit(1546870760.942:64): avc: denied { write } for pid=11400 comm="syz-executor3" name="net" dev="proc" ino=38866 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 14:19:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) socketpair(0xb, 0x2, 0x2, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000080)=0x1, 0x4) 14:19:21 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 326.342386] audit: type=1400 audit(1546870760.942:65): avc: denied { add_name } for pid=11400 comm="syz-executor3" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 14:19:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x4000000000000000}], 0x1, 0x2) 14:19:21 executing program 2: r0 = syz_open_dev$amidi(&(0x7f0000000300)='/dev/amidi#\x00', 0x4, 0x8080) fsetxattr$security_ima(r0, &(0x7f0000000380)='security.ima\x00', &(0x7f00000003c0)=@ng={0x4, 0x4, "2a163ffe8ff987fd6c97b318a1c0e3ef86"}, 0x13, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) removexattr(0x0, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r2, 0x0, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r4 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r2, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r4, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000400)) ptrace$getregset(0x4204, r3, 0x7, &(0x7f00000002c0)={&(0x7f0000000140)=""/2, 0x2}) ioctl$KVM_ASSIGN_SET_MSIX_NR(r5, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) write$P9_RSTATFS(r4, &(0x7f0000000200)={0x43, 0x9, 0x1, {0x80000000, 0x10001, 0x5, 0xffffffff, 0xcf, 0x10000000, 0x3, 0x6, 0xa6}}, 0x43) mkdirat(r5, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r5, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r3, 0x7) 14:19:21 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 326.475264] audit: type=1400 audit(1546870760.952:66): avc: denied { create } for pid=11400 comm="syz-executor3" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:insmod_t:s0 tclass=file permissive=1 14:19:21 executing program 3: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) ioctl(r0, 0xfffffffffffffff7, &(0x7f0000000100)="9d1a9a3cbbc4e8b4a3d4881c0641b357e9b8b2a6e39f330348eb118d2c70b3fdafc96e1d7cb5419a9075fbade5a4e37daaa51c5e28936a8af8662c65031ecf2b49677871cf7bb591ab2bd33b48d77a4ffb38f07fc6cd5b2b3e2a8cf6000bfcc015a979bbfe7311f574b727d8fe27b3b78be5008bc95ab3f4040ce952aca3c9a3fbca3dbcf078a7eb6b9f97372fe21a8495718af98e34f32aad24d789a5f0d2cd31fbcde2767439fd92bc75b19876d43e8721ce498e6f0bcebabd729bd09f5df4e400bf7b153ce3e15b6ef88a649386019c5326c34a177f8938c5a918246fbe036b2b50d60bee990e0b6d0b0f115c") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f0000000080)={0x5, "efd3e7e183ef1e063d51350f427fef91ae7d4703edc86b97516c804c282675b2", 0x1, 0x35, 0x9, 0x9, 0x4, 0x0, 0x3ff, 0xaa}) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r2, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:19:21 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x4001000000000000}], 0x1, 0x2) 14:19:21 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) write$P9_RSTAT(r0, &(0x7f0000000200)={0x45, 0x7d, 0x1, {0x0, 0x3e, 0x3f, 0x8, {0x9, 0x1, 0x1}, 0x40000000, 0x1000, 0x1, 0x7f, 0x1, '{', 0x6, 'msdos\x00', 0x4, 'em0\\'}}, 0x45) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f0000000140)) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000440)={0x0, @dev, @empty}, &(0x7f0000000480)=0xc) sendmsg$xdp(r3, &(0x7f00000008c0)={&(0x7f00000004c0)={0x2c, 0x3, r5, 0x14}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000500)="f3d57d9580f34797d78bc5b0df77e01463e57b484ad2ab45e6e1ff596cbb036bb156a0fe44a4cd4b4ee6516b5386c86d3ecad85de9f8392e14ce299984d91924f43ce502f177b745de1be3dd0220d5bb65a0fea0b98289e90fc32c3a63c969ee8d7d24883bfaa2abc7e435e7dc1c4ce19e5e5f1fca254d4b2ab67e294b40585fd739bc0efcbddd25eb6d2479052736aa1f58a447f308b8b51dbb846b0c4c4df66b5c96349d7b99fefd8c79138d7ee006a3caf00a6b8a69fd6b4d9ca03188a3bcfbb27134ba81cbdd52d3e8a71f48132aa99b", 0xd2}, {&(0x7f0000000740)="f2bfc35bcd295e456bd44442b2542f3e6d04737d2f292f0b1844685c2929e3e23bd29e7158156b0bcd44a1884ec72186c762f0d63492384f01766a3014daf8f2fcf91726c89fc22c040b27f8a8d837a6ffbd0dd34a312bb45cb862ac9465459b38c31fb467b68a792caf6983a7d8ff5b98b7794ad449c59d076d38651b09bbefba022bb67b21cbc8a4cb60a95e870131b978f3a16f9a215753d5d9a5c2525c07bb168dffdcce3d097f914108d53216054248096455cdbe27da39df5d44d16f279d7ec015728817001e01b27f86d331830ed0fc7b7cd62b98ef6dd4502d9aae51736e7392d12c31b432e8aa9f01fd9b06a081a7", 0xf3}, {&(0x7f0000000600)="188b287062d0b7010491f687482c06d177f4bb708985612b08cba71e95a9e17986374f", 0x23}, {&(0x7f0000000640)}], 0x4, 0x0, 0x0, 0x8000}, 0x40010) 14:19:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x4000, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000000080)={'3! ', './file0', [{0x20, 'ppp1ppp0%systemlouser'}, {0x20, '3! '}, {0x20, 'trustedtrusted#'}, {0x20, '3! '}, {0x20, 'eth0\x00'}, {0x20, '!#@\\'}, {0x20, 'bdev^)#GPL'}]}, 0x4f) 14:19:21 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000440)=""/179, 0xffe9, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x80000000) ptrace$peekuser(0x3, r2, 0x7) 14:19:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000000c0)={0x4, [0xffffffff, 0x0, 0x1, 0x100]}, 0xc) 14:19:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x6400000000000000}], 0x1, 0x2) 14:19:22 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000300)='/dev/amidi#\x00', 0x4, 0x8080) fsetxattr$security_ima(r0, &(0x7f0000000380)='security.ima\x00', &(0x7f00000003c0)=@ng={0x4, 0x4, "2a163ffe8ff987fd6c97b318a1c0e3ef86"}, 0x13, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) removexattr(0x0, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r2, 0x0, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r4 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r2, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r4, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000400)) ptrace$getregset(0x4204, r3, 0x7, &(0x7f00000002c0)={&(0x7f0000000140)=""/2, 0x2}) ioctl$KVM_ASSIGN_SET_MSIX_NR(r5, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) write$P9_RSTATFS(r4, &(0x7f0000000200)={0x43, 0x9, 0x1, {0x80000000, 0x10001, 0x5, 0xffffffff, 0xcf, 0x10000000, 0x3, 0x6, 0xa6}}, 0x43) mkdirat(r5, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r5, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r3, 0x7) 14:19:22 executing program 4 (fault-call:4 fault-nth:0): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000001) 14:19:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0xfcffffff00000000}], 0x1, 0x2) 14:19:22 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0xffffffffffffffff, 0x7ff, 0x9, 0x80000000, 0x0, 0x4, 0x80, 0x5, 0x0, 0x141, 0x5, 0x9, 0x3, 0x5, 0x0, 0x7, 0x1, 0x8000, 0x3, 0x2, 0x3, 0x1ff, 0x4, 0xffffffffffff8000, 0xd25d, 0x3f, 0x1, 0x4, 0x6, 0x5, 0x8, 0x401, 0x8c, 0x7, 0x8e, 0x40, 0x0, 0x991, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x2, 0xcc0e, 0x8, 0x2, 0x0, 0x64, 0x6}, r2, 0x3, r0, 0x9) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 327.498626] FAULT_INJECTION: forcing a failure. [ 327.498626] name failslab, interval 1, probability 0, space 0, times 0 [ 327.561816] CPU: 0 PID: 11483 Comm: syz-executor4 Not tainted 5.0.0-rc1+ #14 [ 327.569042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.578406] Call Trace: [ 327.578436] dump_stack+0x1db/0x2d0 [ 327.578460] ? dump_stack_print_info.cold+0x20/0x20 [ 327.584675] ? lock_downgrade+0x910/0x910 [ 327.584701] should_fail.cold+0xa/0x15 [ 327.584722] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 327.584747] ? ___might_sleep+0x1e7/0x310 [ 327.607031] ? arch_local_save_flags+0x50/0x50 [ 327.611639] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 327.616940] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 327.622504] __should_failslab+0x121/0x190 [ 327.626788] should_failslab+0x9/0x14 [ 327.630613] kmem_cache_alloc_trace+0x2d1/0x760 [ 327.635319] alloc_pipe_info+0x152/0x580 [ 327.639399] ? inode_has_perm.isra.0+0x17e/0x210 [ 327.644178] ? pipe_read+0x940/0x940 [ 327.647915] ? file_has_perm+0x2b1/0x420 [ 327.652012] ? selinux_file_open+0x590/0x590 [ 327.656462] ? __might_sleep+0x95/0x190 [ 327.660673] splice_direct_to_actor+0x795/0x9d0 [ 327.665382] ? generic_pipe_buf_nosteal+0x10/0x10 [ 327.670247] ? selinux_file_permission+0x92/0x550 [ 327.675150] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 327.680704] ? do_splice_to+0x190/0x190 [ 327.684705] ? rw_verify_area+0x118/0x360 [ 327.688929] do_splice_direct+0x2c7/0x420 [ 327.688951] ? splice_direct_to_actor+0x9d0/0x9d0 [ 327.688975] ? rw_verify_area+0x118/0x360 [ 327.697967] do_sendfile+0x61a/0xe60 [ 327.697997] ? do_compat_pwritev64+0x1c0/0x1c0 [ 327.710449] ? fput+0x128/0x1a0 [ 327.713752] ? do_syscall_64+0x8c/0x800 [ 327.717746] ? do_syscall_64+0x8c/0x800 [ 327.721744] __x64_sys_sendfile64+0x1f8/0x240 [ 327.726258] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 327.730986] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 327.735771] do_syscall_64+0x1a3/0x800 [ 327.739685] ? syscall_return_slowpath+0x5f0/0x5f0 [ 327.744646] ? prepare_exit_to_usermode+0x232/0x3b0 [ 327.749714] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 327.754609] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 327.759814] RIP: 0033:0x457ec9 [ 327.763030] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 327.781947] RSP: 002b:00007ff6da2bec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 327.789665] RAX: ffffffffffffffda RBX: 00007ff6da2bec90 RCX: 0000000000457ec9 [ 327.789679] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 327.789691] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 14:19:22 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000300)='/dev/amidi#\x00', 0x4, 0x8080) fsetxattr$security_ima(r0, &(0x7f0000000380)='security.ima\x00', &(0x7f00000003c0)=@ng={0x4, 0x4, "2a163ffe8ff987fd6c97b318a1c0e3ef86"}, 0x13, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) removexattr(0x0, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r2, 0x0, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r4 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r2, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r4, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000400)) ptrace$getregset(0x4204, r3, 0x7, &(0x7f00000002c0)={&(0x7f0000000140)=""/2, 0x2}) ioctl$KVM_ASSIGN_SET_MSIX_NR(r5, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) write$P9_RSTATFS(r4, &(0x7f0000000200)={0x43, 0x9, 0x1, {0x80000000, 0x10001, 0x5, 0xffffffff, 0xcf, 0x10000000, 0x3, 0x6, 0xa6}}, 0x43) mkdirat(r5, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r5, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r3, 0x7) [ 327.789701] R10: 0000000080000001 R11: 0000000000000246 R12: 00007ff6da2bf6d4 [ 327.789710] R13: 00000000004c4cdc R14: 00000000004d85c0 R15: 0000000000000006 14:19:22 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:22 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x1, 0x9, 0x7, 0x1, 0x0, 0x3, 0x40, 0x15e347f5b43ead04, 0x6, 0x0, 0x4, 0x1ff, 0x100000001, 0x6, 0x80000000, 0x80000001, 0x1, 0x1f, 0x8, 0xffffffffffff7fff, 0x0, 0x3f, 0x8001, 0xeb, 0x10001, 0x8, 0x6, 0x2, 0x6, 0x4, 0x100000001, 0x8, 0x7, 0x8001, 0x6, 0x2, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2, 0x7f, 0x3ff, 0x0, 0x1, 0x8e69, 0x1}, 0x0, 0x10, r0, 0x8) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r1, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 14:19:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0xff00000000000000}], 0x1, 0x2) 14:19:22 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = shmget(0x2, 0x9000, 0x2, &(0x7f0000ff7000/0x9000)=nil) shmat(r4, &(0x7f0000ffa000/0x4000)=nil, 0x2000) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r5, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r5, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r5, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:22 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x20) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000380)=""/204) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$nfc_llcp(r1, &(0x7f0000000240), 0x0, 0x0) linkat(r0, &(0x7f0000000140)='./bus\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="00000000000000c3530000000000000000000000000000001f000004c3ac7079516d5dc576ab5ceda875bff4a0d316246f4cac91cee591d93276ebf4fe4727b3c31ecf02fc7acda3fc330caa2986840d699d6fa4f1c8207d98a708c848ed5f74eb4e259d0126a1b2ba87f3871d6129e8ba7a6ca719e7a3572638c3f309b1f9184eb1aff17c98a04a7ebe7ad41b4009a88170042cbeab78aa8f6c05faf75ecc034e2f7fe4d3472ac6a695af6e875cbec1bc6d5fb37ada909e878e1ae5ad46caa095f50ed1323dc24a6db5cd0a21304d7008c23f5bda197e"]) 14:19:22 executing program 4 (fault-call:4 fault-nth:1): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000001) [ 328.054271] FAULT_INJECTION: forcing a failure. [ 328.054271] name failslab, interval 1, probability 0, space 0, times 0 14:19:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x7ffe, @dev={0xfe, 0x80, [], 0x17}, 0x6}, 0x1c) write$binfmt_script(r0, &(0x7f0000000580)=ANY=[@ANYBLOB="3321202e2f66696c65300a18665dad19073c6cc05776ff35b131af65de01482dd7c1e841e9d4bbc4e8a2f16d9a3cdf254938871c03defd9dbc51b9aa02951305ddc3b84a81019dc884fe7b1ef59ef7df68d681c58cfcf6316d049706a006a58b2746ff511a9cec2e90232c68381b99cc648e56f5b02d20547b04a573966f9a069443b447c79fe09d8ff4b0fdf4fac07ba0a82b564db4d3020ae1cc268448b9142e4dc515922e5a8230c014ab0af726bac58e1a9ff7e0b30391cde5496117abf23a1419dfb2f5ee76bf130577ee3e5364b81d60354cae73abe3d56d00a3ae3ebe"], 0x3138) recvmsg(r0, &(0x7f0000000540)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f00000004c0)=[{&(0x7f00000000c0)=""/99, 0x63}, {&(0x7f0000000140)=""/149, 0x95}, {&(0x7f0000000200)=""/196, 0xc4}, {&(0x7f0000000300)=""/122, 0x7a}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/242, 0xf2}], 0x6}, 0x20) [ 328.148017] CPU: 0 PID: 11509 Comm: syz-executor4 Not tainted 5.0.0-rc1+ #14 [ 328.155480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.164853] Call Trace: [ 328.167465] dump_stack+0x1db/0x2d0 [ 328.171144] ? dump_stack_print_info.cold+0x20/0x20 [ 328.176191] ? percpu_ref_put_many+0x129/0x270 [ 328.180796] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 328.186365] should_fail.cold+0xa/0x15 [ 328.190275] ? fault_create_debugfs_attr+0x1e0/0x1e0 14:19:22 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x20) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000380)=""/204) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$nfc_llcp(r1, &(0x7f0000000240), 0x0, 0x0) linkat(r0, &(0x7f0000000140)='./bus\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="00000000000000c3530000000000000000000000000000001f000004c3ac7079516d5dc576ab5ceda875bff4a0d316246f4cac91cee591d93276ebf4fe4727b3c31ecf02fc7acda3fc330caa2986840d699d6fa4f1c8207d98a708c848ed5f74eb4e259d0126a1b2ba87f3871d6129e8ba7a6ca719e7a3572638c3f309b1f9184eb1aff17c98a04a7ebe7ad41b4009a88170042cbeab78aa8f6c05faf75ecc034e2f7fe4d3472ac6a695af6e875cbec1bc6d5fb37ada909e878e1ae5ad46caa095f50ed1323dc24a6db5cd0a21304d7008c23f5bda197e"]) [ 328.195399] ? ___might_sleep+0x1e7/0x310 [ 328.195418] ? arch_local_save_flags+0x50/0x50 [ 328.195438] ? rcu_lockdep_current_cpu_online+0x1aa/0x220 [ 328.195460] __should_failslab+0x121/0x190 [ 328.213976] should_failslab+0x9/0x14 [ 328.217800] __kmalloc+0x2dc/0x740 [ 328.221363] ? kmem_cache_alloc_trace+0x354/0x760 [ 328.226240] ? alloc_pipe_info+0x286/0x580 [ 328.230504] alloc_pipe_info+0x286/0x580 [ 328.234609] ? inode_has_perm.isra.0+0x17e/0x210 [ 328.234630] ? pipe_read+0x940/0x940 [ 328.234650] ? file_has_perm+0x2b1/0x420 [ 328.234671] ? selinux_file_open+0x590/0x590 [ 328.234689] ? __might_sleep+0x95/0x190 [ 328.234708] splice_direct_to_actor+0x795/0x9d0 [ 328.247236] ? generic_pipe_buf_nosteal+0x10/0x10 [ 328.265126] ? selinux_file_permission+0x92/0x550 [ 328.269996] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 328.275582] ? do_splice_to+0x190/0x190 [ 328.279601] ? rw_verify_area+0x118/0x360 [ 328.283770] do_splice_direct+0x2c7/0x420 [ 328.287950] ? splice_direct_to_actor+0x9d0/0x9d0 [ 328.292824] ? rw_verify_area+0x118/0x360 [ 328.297015] do_sendfile+0x61a/0xe60 [ 328.300777] ? do_compat_pwritev64+0x1c0/0x1c0 [ 328.305383] ? fput+0x128/0x1a0 [ 328.308689] ? do_syscall_64+0x8c/0x800 [ 328.312692] ? do_syscall_64+0x8c/0x800 [ 328.316693] __x64_sys_sendfile64+0x1f8/0x240 [ 328.321212] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 328.325822] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 328.330617] do_syscall_64+0x1a3/0x800 [ 328.334529] ? syscall_return_slowpath+0x5f0/0x5f0 [ 328.339510] ? prepare_exit_to_usermode+0x232/0x3b0 14:19:23 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x20) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000380)=""/204) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$nfc_llcp(r1, &(0x7f0000000240), 0x0, 0x0) linkat(r0, &(0x7f0000000140)='./bus\x00', 0xffffffffffffffff, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="00000000000000c3530000000000000000000000000000001f000004c3ac7079516d5dc576ab5ceda875bff4a0d316246f4cac91cee591d93276ebf4fe4727b3c31ecf02fc7acda3fc330caa2986840d699d6fa4f1c8207d98a708c848ed5f74eb4e259d0126a1b2ba87f3871d6129e8ba7a6ca719e7a3572638c3f309b1f9184eb1aff17c98a04a7ebe7ad41b4009a88170042cbeab78aa8f6c05faf75ecc034e2f7fe4d3472ac6a695af6e875cbec1bc6d5fb37ada909e878e1ae5ad46caa095f50ed1323dc24a6db5cd0a21304d7008c23f5bda197e"]) 14:19:23 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000400)={0x1, 0x10, 0xfa00, {&(0x7f0000000300), r4}}, 0x18) ioctl$SIOCAX25CTLCON(r3, 0x89e8, &(0x7f0000000200)={@default, @default, @null, 0x0, 0x9, 0x7, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r5, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r5, &(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$trusted_overlay_upper(r5, &(0x7f0000000440)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x99, 0x3, 0x6, "c16f1c73b5507fd69f2a6590e12aa91e", "5d3b512e4d86d284458dd4970f28cbd5c9730ea5447f68a7927b1b56575d0a5c9de9e0461d22bca0b65573df95952a5a6fcb63054898b0189543d58dff4f0effe0ba71c9dc2b939963ad00a096c4c5a368b6ef4b7f40714aaeee9746fec93ca3fb78c9a37f6d9af4e5b5c8964b7391c8f0528bd476cb2a196e0a74e9dba386a84d79a257"}, 0x99, 0x1) mkdirat(r5, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) [ 328.344604] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 328.349477] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 328.354700] RIP: 0033:0x457ec9 [ 328.357910] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 328.376825] RSP: 002b:00007ff6da2bec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 328.384573] RAX: ffffffffffffffda RBX: 00007ff6da2bec90 RCX: 0000000000457ec9 [ 328.391860] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 14:19:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x0, 0x8}], 0x1, 0x2) [ 328.391870] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 328.391880] R10: 0000000080000001 R11: 0000000000000246 R12: 00007ff6da2bf6d4 [ 328.391889] R13: 00000000004c4cdc R14: 00000000004d85c0 R15: 0000000000000006 14:19:23 executing program 4 (fault-call:4 fault-nth:2): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000001) [ 328.638227] FAULT_INJECTION: forcing a failure. [ 328.638227] name failslab, interval 1, probability 0, space 0, times 0 [ 328.656409] CPU: 1 PID: 11541 Comm: syz-executor4 Not tainted 5.0.0-rc1+ #14 [ 328.663686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.673065] Call Trace: [ 328.673092] dump_stack+0x1db/0x2d0 [ 328.673115] ? dump_stack_print_info.cold+0x20/0x20 [ 328.673139] ? percpu_ref_put_many+0x129/0x270 [ 328.673161] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 328.673189] should_fail.cold+0xa/0x15 [ 328.684603] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 328.703723] ? ___might_sleep+0x1e7/0x310 [ 328.707896] ? arch_local_save_flags+0x50/0x50 [ 328.712508] ? rcu_lockdep_current_cpu_online+0x1aa/0x220 [ 328.718102] __should_failslab+0x121/0x190 [ 328.722361] should_failslab+0x9/0x14 [ 328.726196] __kmalloc+0x2dc/0x740 [ 328.729840] ? kmem_cache_alloc_trace+0x354/0x760 [ 328.729863] ? alloc_pipe_info+0x286/0x580 [ 328.729882] alloc_pipe_info+0x286/0x580 [ 328.743024] ? inode_has_perm.isra.0+0x17e/0x210 [ 328.747810] ? pipe_read+0x940/0x940 [ 328.751562] ? file_has_perm+0x2b1/0x420 [ 328.755650] ? selinux_file_open+0x590/0x590 [ 328.760089] ? __might_sleep+0x95/0x190 [ 328.764091] splice_direct_to_actor+0x795/0x9d0 [ 328.768777] ? generic_pipe_buf_nosteal+0x10/0x10 [ 328.768793] ? selinux_file_permission+0x92/0x550 [ 328.768813] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 328.784024] ? do_splice_to+0x190/0x190 [ 328.788031] ? rw_verify_area+0x118/0x360 [ 328.792213] do_splice_direct+0x2c7/0x420 [ 328.796387] ? splice_direct_to_actor+0x9d0/0x9d0 [ 328.801256] ? rw_verify_area+0x118/0x360 [ 328.805430] do_sendfile+0x61a/0xe60 [ 328.809176] ? do_compat_pwritev64+0x1c0/0x1c0 [ 328.813784] ? fput+0x128/0x1a0 [ 328.817088] ? do_syscall_64+0x8c/0x800 [ 328.821090] ? do_syscall_64+0x8c/0x800 [ 328.825095] __x64_sys_sendfile64+0x1f8/0x240 [ 328.829620] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 328.834227] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 328.839011] do_syscall_64+0x1a3/0x800 [ 328.842924] ? syscall_return_slowpath+0x5f0/0x5f0 [ 328.847877] ? prepare_exit_to_usermode+0x232/0x3b0 [ 328.852928] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 328.857803] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 328.863011] RIP: 0033:0x457ec9 [ 328.866316] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:19:23 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x0, 0x64}], 0x1, 0x2) 14:19:23 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x4000001006, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:23 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000400)={0x1, 0x10, 0xfa00, {&(0x7f0000000300), r4}}, 0x18) ioctl$SIOCAX25CTLCON(r3, 0x89e8, &(0x7f0000000200)={@default, @default, @null, 0x0, 0x9, 0x7, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r5, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r5, &(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$trusted_overlay_upper(r5, &(0x7f0000000440)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x99, 0x3, 0x6, "c16f1c73b5507fd69f2a6590e12aa91e", "5d3b512e4d86d284458dd4970f28cbd5c9730ea5447f68a7927b1b56575d0a5c9de9e0461d22bca0b65573df95952a5a6fcb63054898b0189543d58dff4f0effe0ba71c9dc2b939963ad00a096c4c5a368b6ef4b7f40714aaeee9746fec93ca3fb78c9a37f6d9af4e5b5c8964b7391c8f0528bd476cb2a196e0a74e9dba386a84d79a257"}, 0x99, 0x1) mkdirat(r5, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) [ 328.885290] RSP: 002b:00007ff6da2bec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 328.893001] RAX: ffffffffffffffda RBX: 00007ff6da2bec90 RCX: 0000000000457ec9 [ 328.900275] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 328.907617] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 328.914891] R10: 0000000080000001 R11: 0000000000000246 R12: 00007ff6da2bf6d4 [ 328.922172] R13: 00000000004c4cdc R14: 00000000004d85c0 R15: 0000000000000006 14:19:23 executing program 4 (fault-call:4 fault-nth:3): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000001) 14:19:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x0, 0x140}], 0x1, 0x2) 14:19:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB='\x00\x00 n/file0\n'], 0x3138) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2000, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f00000001c0)) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x90000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r2, 0x400, 0x70bd2d, 0x25dfdbfb, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x7}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000800}, 0x0) 14:19:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000001c0)={0xaa, 0x72}) r1 = syz_open_dev$vcsn(&(0x7f0000004880)='/dev/vcs#\x00', 0x9, 0x4000) recvmsg$kcm(r1, &(0x7f0000008a40)={&(0x7f0000006500)=@tipc=@name, 0x80, &(0x7f0000008980)=[{&(0x7f0000006580)=""/4096, 0x1000}, {&(0x7f0000004b00)=""/45, 0x2d}, {&(0x7f0000007580)=""/167, 0xa7}, {&(0x7f0000007640)=""/4096, 0x1000}, {&(0x7f0000008640)=""/234, 0xea}, {&(0x7f0000008740)=""/175, 0xaf}, {&(0x7f0000008800)=""/149, 0x95}, {&(0x7f00000088c0)=""/149, 0x95}], 0x8, &(0x7f0000008a00)=""/36, 0x24}, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmmsg(0xffffffffffffff9c, &(0x7f00000062c0)=[{{&(0x7f0000001200)=@alg, 0x80, &(0x7f00000023c0)=[{&(0x7f0000001280)=""/182, 0xb6}, {&(0x7f0000000140)=""/41, 0x29}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/89, 0x59}], 0x4}, 0x9}, {{&(0x7f0000002400)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f00000026c0)=[{&(0x7f0000002480)=""/132, 0x84}, {&(0x7f0000002540)=""/239, 0xef}, {&(0x7f0000002640)=""/98, 0x62}], 0x3, &(0x7f0000002700)=""/163, 0xa3}, 0x5}, {{&(0x7f00000027c0)=@sco, 0x80, &(0x7f0000003b80)=[{&(0x7f0000002840)=""/62, 0x3e}, {&(0x7f0000002880)=""/84, 0x54}, {&(0x7f0000002900)=""/61, 0x3d}, {&(0x7f0000002940)=""/40, 0x28}, {&(0x7f0000002980)=""/4096, 0x1000}, {&(0x7f0000003980)=""/209, 0xd1}, {&(0x7f0000003a80)=""/245, 0xf5}], 0x7, &(0x7f0000003c00)=""/211, 0xd3}}, {{&(0x7f0000003d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000004180)=[{&(0x7f0000003d80)=""/199, 0xc7}, {&(0x7f0000003e80)=""/26, 0x1a}, {&(0x7f0000003ec0)=""/155, 0x9b}, {&(0x7f0000003f80)=""/97, 0x61}, {&(0x7f0000004000)=""/36, 0x24}, {&(0x7f0000004040)=""/118, 0x76}, {&(0x7f00000040c0)=""/123, 0x7b}, {&(0x7f0000004140)=""/52, 0x34}], 0x8, &(0x7f0000004200)=""/230, 0xe6}, 0xb8d}, {{&(0x7f0000004300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000004580)=[{&(0x7f0000004380)=""/165, 0xa5}, {&(0x7f0000004440)=""/253, 0xfd}, {&(0x7f0000004540)=""/21, 0x15}], 0x3}, 0x6}, {{&(0x7f00000045c0)=@isdn, 0x80, &(0x7f0000004780)=[{&(0x7f0000004640)=""/162, 0xa2}, {&(0x7f0000004700)=""/78, 0x4e}], 0x2, &(0x7f00000047c0)=""/64, 0x40}, 0x8}, {{&(0x7f0000004800)=@ax25={{}, [@netrom, @netrom, @netrom, @remote, @rose, @null, @netrom]}, 0x80, &(0x7f0000004b40)=[{&(0x7f0000004880)}, {&(0x7f00000048c0)=""/32, 0x20}, {&(0x7f0000004900)=""/155, 0x9b}, {&(0x7f00000049c0)=""/170, 0xaa}, {&(0x7f0000004a80)=""/110, 0x6e}, {&(0x7f0000004b00)}], 0x6, &(0x7f0000004bc0)=""/9, 0x9}, 0x7}, {{&(0x7f0000004c00)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000006140)=[{&(0x7f0000004c80)=""/11, 0xb}, {&(0x7f0000004cc0)=""/243, 0xf3}, {&(0x7f0000004dc0)=""/97, 0x61}, {&(0x7f0000004e40)=""/36, 0x24}, {&(0x7f0000004e80)=""/4096, 0x1000}, {&(0x7f0000005e80)=""/140, 0x8c}, {&(0x7f0000005f40)=""/216, 0xd8}, {&(0x7f0000006040)=""/175, 0xaf}, {&(0x7f0000006100)=""/50, 0x32}], 0x9, &(0x7f0000006200)=""/158, 0x9e}, 0x2f}], 0x8, 0x140, 0x0) recvfrom$packet(r2, &(0x7f0000000200)=""/4096, 0x1000, 0x100, &(0x7f00000064c0)={0x11, 0x7, r3, 0x1, 0x8, 0x6, @random="b87645f58d89"}, 0x14) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) r5 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x1, 0x0) ioctl$SG_SET_DEBUG(r5, 0x227e, &(0x7f0000000040)=0x1) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) clone(0x0, &(0x7f00007d1fff), 0x0, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x10, r4, 0x0) read(r0, &(0x7f0000000080)=""/100, 0x219) [ 329.230051] FAULT_INJECTION: forcing a failure. [ 329.230051] name fail_page_alloc, interval 1, probability 0, space 0, times 0 14:19:24 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000000140)=0x5, 0x4) [ 329.312581] CPU: 1 PID: 11563 Comm: syz-executor4 Not tainted 5.0.0-rc1+ #14 [ 329.319818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.329185] Call Trace: [ 329.331800] dump_stack+0x1db/0x2d0 [ 329.335458] ? dump_stack_print_info.cold+0x20/0x20 [ 329.340503] ? is_bpf_text_address+0xd3/0x170 [ 329.340557] should_fail.cold+0xa/0x15 [ 329.340583] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 329.340611] ? arch_local_save_flags+0x50/0x50 [ 329.340631] ? lock_release+0xc40/0xc40 [ 329.349040] should_fail_alloc_page+0x50/0x60 [ 329.349066] __alloc_pages_nodemask+0x323/0xdc0 [ 329.349091] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 329.349121] ? __kmalloc_node+0x3d/0x70 [ 329.349142] ? rcu_read_lock_sched_held+0x110/0x130 [ 329.385969] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 329.391555] alloc_pages_current+0x107/0x210 [ 329.395994] push_pipe+0x3fc/0x7a0 [ 329.399653] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 329.404606] ? kernel_text_address+0x73/0xf0 [ 329.409039] ? __kernel_text_address+0xd/0x40 [ 329.413594] ? iov_iter_revert+0xaa0/0xaa0 [ 329.417864] ? save_stack+0xa9/0xd0 [ 329.421513] ? save_stack+0x45/0xd0 [ 329.425182] ? kasan_kmalloc+0xcf/0xe0 [ 329.429090] ? __kmalloc+0x15c/0x740 [ 329.432827] ? alloc_pipe_info+0x286/0x580 [ 329.437085] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 329.442119] ? iov_iter_pipe+0xba/0x2f0 [ 329.446293] default_file_splice_read+0x1b1/0xac0 [ 329.451155] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 329.456725] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 329.462025] ? iter_file_splice_write+0xfc0/0xfc0 [ 329.466894] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 329.472457] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 329.478017] ? fsnotify+0x4f5/0xed0 [ 329.481673] ? arch_local_save_flags+0x50/0x50 [ 329.486279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 329.491833] ? __fsnotify_parent+0xe2/0x450 [ 329.496178] ? fsnotify_first_mark+0x350/0x350 [ 329.500779] ? init_wait_entry+0x1c0/0x1c0 [ 329.505041] ? avc_policy_seqno+0xd/0x70 [ 329.509136] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 329.514169] ? selinux_file_permission+0x92/0x550 [ 329.519037] ? security_file_permission+0x94/0x320 [ 329.524001] ? rw_verify_area+0x118/0x360 [ 329.528168] ? iter_file_splice_write+0xfc0/0xfc0 [ 329.533027] do_splice_to+0x12a/0x190 [ 329.536872] splice_direct_to_actor+0x31b/0x9d0 [ 329.541584] ? generic_pipe_buf_nosteal+0x10/0x10 [ 329.546504] ? do_splice_to+0x190/0x190 [ 329.550520] ? rw_verify_area+0x118/0x360 [ 329.554712] do_splice_direct+0x2c7/0x420 [ 329.558885] ? splice_direct_to_actor+0x9d0/0x9d0 14:19:24 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x0, 0x3f00}], 0x1, 0x2) [ 329.563764] ? rw_verify_area+0x118/0x360 [ 329.567940] do_sendfile+0x61a/0xe60 [ 329.571688] ? do_compat_pwritev64+0x1c0/0x1c0 [ 329.576352] ? fput+0x128/0x1a0 [ 329.579655] ? do_syscall_64+0x8c/0x800 [ 329.583650] ? do_syscall_64+0x8c/0x800 [ 329.587657] __x64_sys_sendfile64+0x1f8/0x240 [ 329.592192] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 329.596798] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 329.601671] do_syscall_64+0x1a3/0x800 [ 329.605608] ? syscall_return_slowpath+0x5f0/0x5f0 [ 329.610578] ? prepare_exit_to_usermode+0x232/0x3b0 [ 329.615615] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 329.615642] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 329.615655] RIP: 0033:0x457ec9 [ 329.615672] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 329.615680] RSP: 002b:00007ff6da2bec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 329.655578] RAX: ffffffffffffffda RBX: 00007ff6da2bec90 RCX: 0000000000457ec9 [ 329.662861] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 329.670150] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 329.677444] R10: 0000000080000001 R11: 0000000000000246 R12: 00007ff6da2bf6d4 [ 329.684733] R13: 00000000004c4cdc R14: 00000000004d85c0 R15: 0000000000000006 14:19:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB="33216eb01a665d706de80a"], 0x3138) 14:19:24 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000), 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x0, 0x4000}], 0x1, 0x2) 14:19:24 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x0, &(0x7f0000000040)=0x2000009bbf) clock_gettime(0x0, &(0x7f0000003c80)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000003ac0)=[{{&(0x7f00000002c0)=@can, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000140)=""/29, 0x1d}, {&(0x7f0000000200)=""/50, 0x32}, {&(0x7f0000000440)=""/107, 0x6b}, {&(0x7f00000004c0)=""/215, 0xd7}, {&(0x7f0000000340)=""/60, 0x3c}, {&(0x7f00000005c0)=""/147, 0x93}, {&(0x7f0000000680)=""/41, 0x29}, {&(0x7f00000006c0)=""/31, 0x1f}, {&(0x7f0000000700)}, {&(0x7f0000000740)=""/182, 0xb6}], 0xa, &(0x7f0000000980)=""/156, 0x9c}, 0x8}, {{&(0x7f0000000800)=@caif, 0x80, &(0x7f0000001c40)=[{&(0x7f0000000a40)=""/161, 0xa1}, {&(0x7f0000000b00)=""/27, 0x1b}, {&(0x7f0000000b40)=""/4096, 0x1000}, {&(0x7f0000001b40)=""/203, 0xcb}], 0x4, &(0x7f0000001c80)=""/79, 0x4f}, 0x3}, {{&(0x7f0000001d00)=@caif=@util, 0x80, &(0x7f0000003140)=[{&(0x7f0000001d80)=""/132, 0x84}, {&(0x7f0000001e40)=""/111, 0x6f}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/218, 0xda}, {&(0x7f0000002fc0)=""/157, 0x9d}, {&(0x7f0000003080)=""/186, 0xba}], 0x6, &(0x7f00000031c0)=""/83, 0x53}, 0x400}, {{&(0x7f0000003240)=@can, 0x80, &(0x7f0000003400)=[{&(0x7f00000032c0)=""/53, 0x35}, {&(0x7f0000003300)=""/150, 0x96}, {&(0x7f00000033c0)=""/38, 0x26}], 0x3, &(0x7f0000003440)=""/84, 0x54}, 0x2c5b6532}, {{&(0x7f00000034c0)=@tipc, 0x80, &(0x7f0000003580)=[{&(0x7f0000003540)=""/28, 0x1c}], 0x1, &(0x7f00000035c0)=""/54, 0x36}, 0x10000}, {{&(0x7f0000003600)=@generic, 0x80, &(0x7f0000003780)=[{&(0x7f0000003680)=""/117, 0x75}, {&(0x7f0000003700)=""/78, 0x4e}], 0x2, &(0x7f00000037c0)=""/81, 0x51}}, {{&(0x7f0000003840)=@ax25={{0x3, @netrom}, [@netrom, @null, @remote, @null, @default, @bcast, @default, @bcast]}, 0x80, &(0x7f0000003980)=[{&(0x7f00000038c0)=""/174, 0xae}], 0x1, &(0x7f00000039c0)=""/199, 0xc7}, 0x76f}], 0x7, 0x40000120, &(0x7f0000003cc0)={r3, r4+30000000}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r5 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r5, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000380)=""/179, 0xffffffffffffff2b, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getuid() syz_mount_image$iso9660(&(0x7f0000000700)='iso9660\x00', &(0x7f0000003d00)='./file0/f.le.\x00', 0x9, 0x2, &(0x7f0000003e00)=[{&(0x7f0000003d40)="e7ac29b7101640b12c3da905e62fc5ad40a628ae80b175c540a7238de8ec1bb7851e23e574348d365944bafecb0188363e465ae2c0", 0x35, 0xc0ce}, {&(0x7f0000003d80)="9383aa763f5e1ca2a73fee9856d573f2b0b1650ffffc89372c3a133bd45aba3c003a6e36b094e2cc08251d18d723122cdb808ce227ab4009192f43a2290c08880af605b6d3757d919d2b7908f610e0d409f839b937cccbc50ef52afcf1e6386bcfa1768c", 0x64, 0x9}], 0x200000, &(0x7f0000003e40)={[{@norock='norock'}, {@dmode={'dmode', 0x3d, 0x10000}}, {@nocompress='nocompress'}, {@map_normal='map=normal'}], [{@dont_hash='dont_hash'}, {@fsuuid={'fsuuid', 0x3d, {[0x33, 0x31, 0x34, 0x31, 0x66, 0x7f, 0x62, 0x77], 0x2d, [0x36, 0x38, 0x34, 0x77], 0x2d, [0x73, 0x77, 0x30, 0x31], 0x2d, [0x38, 0x61, 0x77, 0x61], 0x2d, [0x75, 0x37, 0x31, 0x32, 0x77, 0x61, 0x7d, 0x77]}}}, {@dont_measure='dont_measure'}, {@context={'context', 0x3d, 'system_u'}}, {@subj_type={'subj_type', 0x3d, 'msdos\x00'}}, {@fowner_eq={'fowner', 0x3d, r6}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r5, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r7, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r7, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$VIDIOC_QUERYBUF(r5, 0xc0585609, &(0x7f0000003f40)={0x8000, 0x3, 0x4, 0x0, {0x0, 0x2710}, {0x7, 0xc, 0x7ff, 0x7, 0x1, 0x3, "eb94fca7"}, 0x81, 0x4, @userptr, 0x4}) mkdirat(r7, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000001c0)={0xaa, 0x72}) r1 = syz_open_dev$vcsn(&(0x7f0000004880)='/dev/vcs#\x00', 0x9, 0x4000) recvmsg$kcm(r1, &(0x7f0000008a40)={&(0x7f0000006500)=@tipc=@name, 0x80, &(0x7f0000008980)=[{&(0x7f0000006580)=""/4096, 0x1000}, {&(0x7f0000004b00)=""/45, 0x2d}, {&(0x7f0000007580)=""/167, 0xa7}, {&(0x7f0000007640)=""/4096, 0x1000}, {&(0x7f0000008640)=""/234, 0xea}, {&(0x7f0000008740)=""/175, 0xaf}, {&(0x7f0000008800)=""/149, 0x95}, {&(0x7f00000088c0)=""/149, 0x95}], 0x8, &(0x7f0000008a00)=""/36, 0x24}, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) recvmmsg(0xffffffffffffff9c, &(0x7f00000062c0)=[{{&(0x7f0000001200)=@alg, 0x80, &(0x7f00000023c0)=[{&(0x7f0000001280)=""/182, 0xb6}, {&(0x7f0000000140)=""/41, 0x29}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000002340)=""/89, 0x59}], 0x4}, 0x9}, {{&(0x7f0000002400)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f00000026c0)=[{&(0x7f0000002480)=""/132, 0x84}, {&(0x7f0000002540)=""/239, 0xef}, {&(0x7f0000002640)=""/98, 0x62}], 0x3, &(0x7f0000002700)=""/163, 0xa3}, 0x5}, {{&(0x7f00000027c0)=@sco, 0x80, &(0x7f0000003b80)=[{&(0x7f0000002840)=""/62, 0x3e}, {&(0x7f0000002880)=""/84, 0x54}, {&(0x7f0000002900)=""/61, 0x3d}, {&(0x7f0000002940)=""/40, 0x28}, {&(0x7f0000002980)=""/4096, 0x1000}, {&(0x7f0000003980)=""/209, 0xd1}, {&(0x7f0000003a80)=""/245, 0xf5}], 0x7, &(0x7f0000003c00)=""/211, 0xd3}}, {{&(0x7f0000003d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000004180)=[{&(0x7f0000003d80)=""/199, 0xc7}, {&(0x7f0000003e80)=""/26, 0x1a}, {&(0x7f0000003ec0)=""/155, 0x9b}, {&(0x7f0000003f80)=""/97, 0x61}, {&(0x7f0000004000)=""/36, 0x24}, {&(0x7f0000004040)=""/118, 0x76}, {&(0x7f00000040c0)=""/123, 0x7b}, {&(0x7f0000004140)=""/52, 0x34}], 0x8, &(0x7f0000004200)=""/230, 0xe6}, 0xb8d}, {{&(0x7f0000004300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000004580)=[{&(0x7f0000004380)=""/165, 0xa5}, {&(0x7f0000004440)=""/253, 0xfd}, {&(0x7f0000004540)=""/21, 0x15}], 0x3}, 0x6}, {{&(0x7f00000045c0)=@isdn, 0x80, &(0x7f0000004780)=[{&(0x7f0000004640)=""/162, 0xa2}, {&(0x7f0000004700)=""/78, 0x4e}], 0x2, &(0x7f00000047c0)=""/64, 0x40}, 0x8}, {{&(0x7f0000004800)=@ax25={{}, [@netrom, @netrom, @netrom, @remote, @rose, @null, @netrom]}, 0x80, &(0x7f0000004b40)=[{&(0x7f0000004880)}, {&(0x7f00000048c0)=""/32, 0x20}, {&(0x7f0000004900)=""/155, 0x9b}, {&(0x7f00000049c0)=""/170, 0xaa}, {&(0x7f0000004a80)=""/110, 0x6e}, {&(0x7f0000004b00)}], 0x6, &(0x7f0000004bc0)=""/9, 0x9}, 0x7}, {{&(0x7f0000004c00)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000006140)=[{&(0x7f0000004c80)=""/11, 0xb}, {&(0x7f0000004cc0)=""/243, 0xf3}, {&(0x7f0000004dc0)=""/97, 0x61}, {&(0x7f0000004e40)=""/36, 0x24}, {&(0x7f0000004e80)=""/4096, 0x1000}, {&(0x7f0000005e80)=""/140, 0x8c}, {&(0x7f0000005f40)=""/216, 0xd8}, {&(0x7f0000006040)=""/175, 0xaf}, {&(0x7f0000006100)=""/50, 0x32}], 0x9, &(0x7f0000006200)=""/158, 0x9e}, 0x2f}], 0x8, 0x140, 0x0) recvfrom$packet(r2, &(0x7f0000000200)=""/4096, 0x1000, 0x100, &(0x7f00000064c0)={0x11, 0x7, r3, 0x1, 0x8, 0x6, @random="b87645f58d89"}, 0x14) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) r5 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x1, 0x0) ioctl$SG_SET_DEBUG(r5, 0x227e, &(0x7f0000000040)=0x1) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) clone(0x0, &(0x7f00007d1fff), 0x0, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000000, 0x10, r4, 0x0) read(r0, &(0x7f0000000080)=""/100, 0x219) 14:19:24 executing program 4 (fault-call:4 fault-nth:4): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000001) 14:19:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x0, 0x4001}], 0x1, 0x2) 14:19:24 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) [ 330.167951] FAULT_INJECTION: forcing a failure. [ 330.167951] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 330.200446] CPU: 1 PID: 11620 Comm: syz-executor4 Not tainted 5.0.0-rc1+ #14 [ 330.207689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 14:19:25 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000000200)={0xf004, &(0x7f0000000140), 0x4, r3, 0x7}) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) [ 330.217063] Call Trace: [ 330.219683] dump_stack+0x1db/0x2d0 [ 330.223337] ? dump_stack_print_info.cold+0x20/0x20 [ 330.228386] ? is_bpf_text_address+0xd3/0x170 [ 330.232911] should_fail.cold+0xa/0x15 [ 330.236822] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 330.241959] ? arch_local_save_flags+0x50/0x50 [ 330.246578] ? lock_release+0xc40/0xc40 [ 330.250591] ? rcu_pm_notify+0xd0/0xd0 [ 330.254516] should_fail_alloc_page+0x50/0x60 [ 330.259061] __alloc_pages_nodemask+0x323/0xdc0 [ 330.263759] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 330.268809] ? __kmalloc_node+0x3d/0x70 [ 330.272909] ? rcu_read_lock_sched_held+0x110/0x130 [ 330.272927] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 330.272951] alloc_pages_current+0x107/0x210 [ 330.272972] push_pipe+0x3fc/0x7a0 [ 330.272998] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 330.273012] ? kernel_text_address+0x73/0xf0 [ 330.273027] ? __kernel_text_address+0xd/0x40 [ 330.273061] ? iov_iter_revert+0xaa0/0xaa0 [ 330.273087] ? save_stack+0xa9/0xd0 [ 330.273102] ? save_stack+0x45/0xd0 [ 330.273114] ? kasan_kmalloc+0xcf/0xe0 [ 330.273127] ? __kmalloc+0x15c/0x740 [ 330.273143] ? alloc_pipe_info+0x286/0x580 [ 330.273156] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 330.273171] ? iov_iter_pipe+0xba/0x2f0 [ 330.273193] default_file_splice_read+0x1b1/0xac0 [ 330.273210] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 330.273233] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 330.273249] ? iter_file_splice_write+0xfc0/0xfc0 [ 330.273266] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 330.273292] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 330.273307] ? fsnotify+0x4f5/0xed0 [ 330.273322] ? arch_local_save_flags+0x50/0x50 [ 330.273344] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 330.273358] ? __fsnotify_parent+0xe2/0x450 [ 330.273377] ? fsnotify_first_mark+0x350/0x350 [ 330.284097] ? init_wait_entry+0x1c0/0x1c0 [ 330.284122] ? avc_policy_seqno+0xd/0x70 [ 330.284136] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 330.284152] ? selinux_file_permission+0x92/0x550 [ 330.284176] ? security_file_permission+0x94/0x320 [ 330.284199] ? rw_verify_area+0x118/0x360 [ 330.284214] ? iter_file_splice_write+0xfc0/0xfc0 [ 330.284230] do_splice_to+0x12a/0x190 [ 330.334330] splice_direct_to_actor+0x31b/0x9d0 [ 330.334349] ? generic_pipe_buf_nosteal+0x10/0x10 [ 330.334370] ? do_splice_to+0x190/0x190 [ 330.334391] ? rw_verify_area+0x118/0x360 [ 330.354021] do_splice_direct+0x2c7/0x420 [ 330.354042] ? splice_direct_to_actor+0x9d0/0x9d0 [ 330.354076] ? rw_verify_area+0x118/0x360 [ 330.354095] do_sendfile+0x61a/0xe60 [ 330.354122] ? do_compat_pwritev64+0x1c0/0x1c0 [ 330.467743] ? fput+0x128/0x1a0 [ 330.471177] ? do_syscall_64+0x8c/0x800 [ 330.475177] ? do_syscall_64+0x8c/0x800 [ 330.479172] __x64_sys_sendfile64+0x1f8/0x240 [ 330.483784] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 330.488392] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 330.493176] do_syscall_64+0x1a3/0x800 [ 330.497087] ? syscall_return_slowpath+0x5f0/0x5f0 [ 330.502037] ? prepare_exit_to_usermode+0x232/0x3b0 [ 330.507098] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 330.511972] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 330.517182] RIP: 0033:0x457ec9 [ 330.520393] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 330.539311] RSP: 002b:00007ff6da2bec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 330.547038] RAX: ffffffffffffffda RBX: 00007ff6da2bec90 RCX: 0000000000457ec9 [ 330.554326] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 330.561628] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 14:19:25 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x0, &(0x7f0000000040)=0x2000009bbf) clock_gettime(0x0, &(0x7f0000003c80)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000003ac0)=[{{&(0x7f00000002c0)=@can, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000140)=""/29, 0x1d}, {&(0x7f0000000200)=""/50, 0x32}, {&(0x7f0000000440)=""/107, 0x6b}, {&(0x7f00000004c0)=""/215, 0xd7}, {&(0x7f0000000340)=""/60, 0x3c}, {&(0x7f00000005c0)=""/147, 0x93}, {&(0x7f0000000680)=""/41, 0x29}, {&(0x7f00000006c0)=""/31, 0x1f}, {&(0x7f0000000700)}, {&(0x7f0000000740)=""/182, 0xb6}], 0xa, &(0x7f0000000980)=""/156, 0x9c}, 0x8}, {{&(0x7f0000000800)=@caif, 0x80, &(0x7f0000001c40)=[{&(0x7f0000000a40)=""/161, 0xa1}, {&(0x7f0000000b00)=""/27, 0x1b}, {&(0x7f0000000b40)=""/4096, 0x1000}, {&(0x7f0000001b40)=""/203, 0xcb}], 0x4, &(0x7f0000001c80)=""/79, 0x4f}, 0x3}, {{&(0x7f0000001d00)=@caif=@util, 0x80, &(0x7f0000003140)=[{&(0x7f0000001d80)=""/132, 0x84}, {&(0x7f0000001e40)=""/111, 0x6f}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/218, 0xda}, {&(0x7f0000002fc0)=""/157, 0x9d}, {&(0x7f0000003080)=""/186, 0xba}], 0x6, &(0x7f00000031c0)=""/83, 0x53}, 0x400}, {{&(0x7f0000003240)=@can, 0x80, &(0x7f0000003400)=[{&(0x7f00000032c0)=""/53, 0x35}, {&(0x7f0000003300)=""/150, 0x96}, {&(0x7f00000033c0)=""/38, 0x26}], 0x3, &(0x7f0000003440)=""/84, 0x54}, 0x2c5b6532}, {{&(0x7f00000034c0)=@tipc, 0x80, &(0x7f0000003580)=[{&(0x7f0000003540)=""/28, 0x1c}], 0x1, &(0x7f00000035c0)=""/54, 0x36}, 0x10000}, {{&(0x7f0000003600)=@generic, 0x80, &(0x7f0000003780)=[{&(0x7f0000003680)=""/117, 0x75}, {&(0x7f0000003700)=""/78, 0x4e}], 0x2, &(0x7f00000037c0)=""/81, 0x51}}, {{&(0x7f0000003840)=@ax25={{0x3, @netrom}, [@netrom, @null, @remote, @null, @default, @bcast, @default, @bcast]}, 0x80, &(0x7f0000003980)=[{&(0x7f00000038c0)=""/174, 0xae}], 0x1, &(0x7f00000039c0)=""/199, 0xc7}, 0x76f}], 0x7, 0x40000120, &(0x7f0000003cc0)={r3, r4+30000000}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r5 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r5, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000380)=""/179, 0xffffffffffffff2b, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = getuid() syz_mount_image$iso9660(&(0x7f0000000700)='iso9660\x00', &(0x7f0000003d00)='./file0/f.le.\x00', 0x9, 0x2, &(0x7f0000003e00)=[{&(0x7f0000003d40)="e7ac29b7101640b12c3da905e62fc5ad40a628ae80b175c540a7238de8ec1bb7851e23e574348d365944bafecb0188363e465ae2c0", 0x35, 0xc0ce}, {&(0x7f0000003d80)="9383aa763f5e1ca2a73fee9856d573f2b0b1650ffffc89372c3a133bd45aba3c003a6e36b094e2cc08251d18d723122cdb808ce227ab4009192f43a2290c08880af605b6d3757d919d2b7908f610e0d409f839b937cccbc50ef52afcf1e6386bcfa1768c", 0x64, 0x9}], 0x200000, &(0x7f0000003e40)={[{@norock='norock'}, {@dmode={'dmode', 0x3d, 0x10000}}, {@nocompress='nocompress'}, {@map_normal='map=normal'}], [{@dont_hash='dont_hash'}, {@fsuuid={'fsuuid', 0x3d, {[0x33, 0x31, 0x34, 0x31, 0x66, 0x7f, 0x62, 0x77], 0x2d, [0x36, 0x38, 0x34, 0x77], 0x2d, [0x73, 0x77, 0x30, 0x31], 0x2d, [0x38, 0x61, 0x77, 0x61], 0x2d, [0x75, 0x37, 0x31, 0x32, 0x77, 0x61, 0x7d, 0x77]}}}, {@dont_measure='dont_measure'}, {@context={'context', 0x3d, 'system_u'}}, {@subj_type={'subj_type', 0x3d, 'msdos\x00'}}, {@fowner_eq={'fowner', 0x3d, r6}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r5, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r7, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r7, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$VIDIOC_QUERYBUF(r5, 0xc0585609, &(0x7f0000003f40)={0x8000, 0x3, 0x4, 0x0, {0x0, 0x2710}, {0x7, 0xc, 0x7ff, 0x7, 0x1, 0x3, "eb94fca7"}, 0x81, 0x4, @userptr, 0x4}) mkdirat(r7, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:25 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x0, 0x6400}], 0x1, 0x2) [ 330.568925] R10: 0000000080000001 R11: 0000000000000246 R12: 00007ff6da2bf6d4 [ 330.576214] R13: 00000000004c4cdc R14: 00000000004d85c0 R15: 0000000000000006 [ 330.602969] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=11620 comm=syz-executor4 14:19:25 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x23, &(0x7f00000001c0)=0x7, 0x4) bind(r1, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x62) r2 = dup(r0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000200)={0x0, 0x77, "2f72c409b8f0e3f191874d2d3dd3a729258e25493676fb39349f2fedbf0948335019ffd4fc588b299d66830751579e13ea841bd5b80e49ffe0d5c18f351cf9083d47ab1735be17c1b267c531c3d6294ffac85a0e386fa697462192a6b91308c2eaa898fe4b514ac54d8caa6c9f54e48c096ce0a4269d06"}, &(0x7f0000000180)=0x7f) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000300)={r3, 0x1}, &(0x7f0000000340)=0x8) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x2, 0x4e24}, 0xfffffffffffffe63) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x800, 0x0) connect$bt_l2cap(r2, &(0x7f0000000280)={0x1f, 0xffffffff, {0x4, 0x19a, 0x100, 0x1, 0x6, 0x507}, 0x9, 0x180e}, 0xe) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x6}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r4, 0x84, 0x23, &(0x7f0000000140)={r5}, 0x8) recvmmsg(r1, &(0x7f00000004c0)=[{{&(0x7f0000000400)=@ethernet={0x0, @dev}, 0x0, &(0x7f0000000480)}}], 0x6fdaec, 0x22, 0x0) 14:19:25 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x0, 0xff00}], 0x1, 0x2) 14:19:25 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000), 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:25 executing program 4 (fault-call:4 fault-nth:5): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000001) 14:19:25 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x0, 0x0) r2 = getpid() lsetxattr$security_ima(&(0x7f0000000200)='.//ile0\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f0000000300)=@v2={0x3, 0x2, 0x4, 0xbd2, 0x88, "69529e9dc80cf35a0109ccd705e650d5ac7e3f542a41b3fceec254181d0e25ce1a7c680d2846a5a7e67a144bebe0036c20ba5b01a76aa1e689406163cffb3d78afe9fb5ba81aecd951675108cc71e6eaa23a6bbd19ca3b1f6accb1fc2182a6ebf093e84ab6097af255e1b3ee2fc86af009c3f3e99bb92479d309eaf42bf34a1f954d56c8940b09ba"}, 0x92, 0x2) sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) epoll_create1(0x80000) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$SG_SET_DEBUG(r4, 0x227e, &(0x7f0000000140)=0x1) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:25 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = fcntl$dupfd(r0, 0x0, r0) socket$can_bcm(0x1d, 0x2, 0x2) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) keyctl$read(0xb, 0xfffffffffffffffd, &(0x7f0000000000)=""/4, 0xfc54) 14:19:25 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x0, 0x1000000}], 0x1, 0x2) [ 331.019016] FAULT_INJECTION: forcing a failure. [ 331.019016] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 331.080203] CPU: 0 PID: 11661 Comm: syz-executor4 Not tainted 5.0.0-rc1+ #14 [ 331.087442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 331.096814] Call Trace: [ 331.099431] dump_stack+0x1db/0x2d0 [ 331.103091] ? dump_stack_print_info.cold+0x20/0x20 [ 331.108132] ? is_bpf_text_address+0xd3/0x170 [ 331.112660] should_fail.cold+0xa/0x15 [ 331.116596] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 331.121723] ? arch_local_save_flags+0x50/0x50 [ 331.121741] ? lock_release+0xc40/0xc40 [ 331.121760] ? rcu_pm_notify+0xd0/0xd0 [ 331.121788] should_fail_alloc_page+0x50/0x60 [ 331.121806] __alloc_pages_nodemask+0x323/0xdc0 [ 331.130376] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 331.130407] ? __kmalloc_node+0x3d/0x70 [ 331.130429] ? rcu_read_lock_sched_held+0x110/0x130 [ 331.130446] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 331.163094] alloc_pages_current+0x107/0x210 [ 331.167501] push_pipe+0x3fc/0x7a0 [ 331.171133] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 331.176063] ? kernel_text_address+0x73/0xf0 [ 331.180469] ? __kernel_text_address+0xd/0x40 [ 331.184981] ? iov_iter_revert+0xaa0/0xaa0 [ 331.189341] ? save_stack+0xa9/0xd0 [ 331.192965] ? save_stack+0x45/0xd0 [ 331.196590] ? kasan_kmalloc+0xcf/0xe0 [ 331.200484] ? __kmalloc+0x15c/0x740 [ 331.204220] ? alloc_pipe_info+0x286/0x580 [ 331.208460] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 331.213473] ? iov_iter_pipe+0xba/0x2f0 [ 331.217449] default_file_splice_read+0x1b1/0xac0 [ 331.222293] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 331.227833] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 331.233107] ? iter_file_splice_write+0xfc0/0xfc0 [ 331.237948] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 331.243486] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 331.249093] ? fsnotify+0x4f5/0xed0 [ 331.252782] ? arch_local_save_flags+0x50/0x50 [ 331.257364] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 331.262911] ? __fsnotify_parent+0xe2/0x450 [ 331.267243] ? fsnotify_first_mark+0x350/0x350 [ 331.271823] ? init_wait_entry+0x1c0/0x1c0 [ 331.276099] ? avc_policy_seqno+0xd/0x70 [ 331.280169] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 331.285184] ? selinux_file_permission+0x92/0x550 [ 331.290042] ? security_file_permission+0x94/0x320 [ 331.294972] ? rw_verify_area+0x118/0x360 [ 331.299117] ? iter_file_splice_write+0xfc0/0xfc0 [ 331.303956] do_splice_to+0x12a/0x190 [ 331.307757] splice_direct_to_actor+0x31b/0x9d0 [ 331.312424] ? generic_pipe_buf_nosteal+0x10/0x10 [ 331.317381] ? do_splice_to+0x190/0x190 [ 331.321417] ? rw_verify_area+0x118/0x360 [ 331.325581] do_splice_direct+0x2c7/0x420 [ 331.329729] ? splice_direct_to_actor+0x9d0/0x9d0 [ 331.334628] ? rw_verify_area+0x118/0x360 [ 331.338775] do_sendfile+0x61a/0xe60 [ 331.342491] ? do_compat_pwritev64+0x1c0/0x1c0 [ 331.347075] ? fput+0x128/0x1a0 [ 331.350363] ? do_syscall_64+0x8c/0x800 [ 331.354345] ? do_syscall_64+0x8c/0x800 [ 331.358317] __x64_sys_sendfile64+0x1f8/0x240 [ 331.362809] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 331.367477] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 331.372234] do_syscall_64+0x1a3/0x800 [ 331.376120] ? syscall_return_slowpath+0x5f0/0x5f0 [ 331.381050] ? prepare_exit_to_usermode+0x232/0x3b0 [ 331.386067] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 331.390916] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 331.396110] RIP: 0033:0x457ec9 [ 331.399308] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 331.418204] RSP: 002b:00007ff6da2bec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 14:19:26 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xa42, 0x80300) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000080)={0x11, 0xc, r2, 0x1, 0x1, 0x6, @broadcast}, 0x14) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000100)=0xda9, 0x4) sendto(r0, &(0x7f0000000340)="7589f0da892457ee3604b3303d1176a13baaebcab9eba210a07246127b486e98e3029104796460b1dfef95b0368b0b19c338b1306db81cea8edfc66a6212607f01496a9963ef1a83caee01bd72e85c40dd287a0755ca6b801959badb1253ae3a85a47b0ec39b760f063d4756614fc1d3e68b9f4f32be2652ce67d2e776b433331ad58b9d70c0f258e00b9d56ff7ecb14e6050c70da00c5006b8cffd8f169f2861e2df3efe13056d1babf3dde7a2a1a5cc8cb207e10f61e215d2935a43c0db2cef01e23933caac8c3ea44870dd6b4e7e87ec42d4a8cfe2940ddd6a1b68a8b114bf5fc57a24b948eed855edf063898f64a0ce82678a3be37f9d56de9535406c2810de8f314a51ae300d351825ded003652d5ab0b30f7ced329324632f710076a9f79c3221e90ec03803b6ecd5595646214e391a3cfd74ca98d098d3fac9fccd6b0905b03f3c6a50eeef0e61cd07ad75b39267a304fb12bdde7b4d06e64a42aee0504ae42f36f13d5e3002975f648e632ec25aa10429d84a078914a28c47ae0b143f43b100790646f1f7bb25191ab9d0b210e18f5610749521e385a7dc15b6b946baa49a0b35b4c56947b57279e5b5e3d04baab408442f3ba124cc70dadeb8a564eb796fb7975859f50a8a41ebc9baf1ab48855b54d47884126e66d890d714fd57c5dec487bfb5d94c839d9bbe57e70dead6a26d44af14b53a620424cb3404a7e3961c7ff568f6345f6cc3a5c49be7e76a33e652acf88b3bbbe6f83bc49621654627eedc41393250fdc3f997f6aa3f4f8ba8184c8fc5fe9bd37ca8081077b72e93af80af9bf4a47f943df12bc25ca1f25fb5bc39fbe685aed03e20269fa1ceda0d1c31754b974081a14ec6801ab751acc29aff079fcde12237555463bf13eb77e16eeb6ae8aa7fe36806826fb5e4f86fa757ba66c7dc0ac4ffdfe411db3a40b1d0d6a79b1585122cc1d0c3a18f0aab8ac72942451f67ec6cc6fed353239f10a99c2a836b90320b803c04f931e6ffdad5d3dda56e62d379cd76eb87b8c9470cee2348913f2260e3ae0213183c4898c3d64bb826a5d227cc05e005538b1ac4e70f6fdda5e16b67a471c0d655e21c7dd5aa647058146104cad84a32002de9857704c66c162f866795076a503f69192fd49ffd327ac385012bc66edb2e14f0af6b53feeb6d8271391edd74396a986baa072bdf5221e829c7d8241cfb1c866112c8ca033e34fd845d84c5bc054646057fa523f757dcf484c8747314c5a1f5f11b3e0ba45edd10e09e9e2925fe4229bd155a1cc62a8928686d6518b3f0da7d39a2b26368bd07f9a3222ce9b3fe41b12988b004543879ac863842e0a81ee7b9ebc1a98bdb020d617c00953a9cd98632b7b2024f6be6cb8795688c131950a77579850aef05278eb5e7692a6bb52200a0d37327ceff14d7f75fa6f6058197caf451ff520a80e05231db86fd254da587cd70d0b8c74b1a8", 0x411, 0x0, 0x0, 0x0) close(r0) 14:19:26 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x8) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) [ 331.425906] RAX: ffffffffffffffda RBX: 00007ff6da2bec90 RCX: 0000000000457ec9 [ 331.433170] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 331.440433] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 331.447827] R10: 0000000080000001 R11: 0000000000000246 R12: 00007ff6da2bf6d4 [ 331.455132] R13: 00000000004c4cdc R14: 00000000004d85c0 R15: 0000000000000006 [ 331.467020] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=11661 comm=syz-executor4 14:19:26 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x0, 0x8000000}], 0x1, 0x2) 14:19:26 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f00000002c0)={0x7, 0x2000000013}) getdents64(r1, &(0x7f0000000100)=""/197, 0xc5) 14:19:26 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r3, &(0x7f0000000680)=""/179, 0x5c, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f00000003c0), 0x3, 0x0, &(0x7f0000000400), &(0x7f0000000440)=0x2, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r5, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', r3}, 0x10) write$binfmt_misc(r3, &(0x7f00000008c0)={'syz0', "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"}, 0x1004) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000480)={[], 0x6, 0x5, 0x5, 0x4, 0x1, r2}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r3, 0x50, &(0x7f0000000200)}, 0x10) mkdirat(r5, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r5, &(0x7f0000000500)='./file0\x00', 0x101) ptrace$peekuser(0x3, r2, 0x7) dup3(r5, r4, 0x80000) 14:19:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), 0x0) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) ioctl$SIOCAX25ADDUID(r2, 0x89e1, 0x0) io_setup(0x0, 0x0) r4 = memfd_create(&(0x7f0000000140)='t\bnu\xf7\xff\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x1b4, 0xfa00, {0x2, &(0x7f0000000000), 0x111, 0x3}}, 0x20) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 14:19:26 executing program 4 (fault-call:4 fault-nth:6): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000001) 14:19:26 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000), 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:26 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x0, 0x3f000000}], 0x1, 0x2) 14:19:26 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f00000002c0)={0x7, 0x2000000013}) getdents64(r1, &(0x7f0000000100)=""/197, 0xc5) [ 331.897414] FAULT_INJECTION: forcing a failure. [ 331.897414] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 331.955503] CPU: 1 PID: 11700 Comm: syz-executor4 Not tainted 5.0.0-rc1+ #14 [ 331.962758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 331.972120] Call Trace: [ 331.972148] dump_stack+0x1db/0x2d0 [ 331.972173] ? dump_stack_print_info.cold+0x20/0x20 [ 331.972195] ? is_bpf_text_address+0xd3/0x170 [ 331.972226] should_fail.cold+0xa/0x15 [ 331.978441] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 331.996935] ? arch_local_save_flags+0x50/0x50 [ 332.001555] ? lock_release+0xc40/0xc40 [ 332.005576] ? rcu_pm_notify+0xd0/0xd0 [ 332.009496] should_fail_alloc_page+0x50/0x60 [ 332.014030] __alloc_pages_nodemask+0x323/0xdc0 [ 332.018746] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 332.023965] ? __kmalloc_node+0x3d/0x70 [ 332.027965] ? rcu_read_lock_sched_held+0x110/0x130 [ 332.033007] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 332.038607] alloc_pages_current+0x107/0x210 [ 332.043058] push_pipe+0x3fc/0x7a0 [ 332.046632] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 332.051601] ? kernel_text_address+0x73/0xf0 14:19:26 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000140), &(0x7f0000000200)=0x4) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:26 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x0, 0x40000000}], 0x1, 0x2) [ 332.056031] ? __kernel_text_address+0xd/0x40 [ 332.060585] ? iov_iter_revert+0xaa0/0xaa0 [ 332.064857] ? save_stack+0xa9/0xd0 [ 332.068503] ? save_stack+0x45/0xd0 [ 332.072166] ? kasan_kmalloc+0xcf/0xe0 [ 332.076072] ? __kmalloc+0x15c/0x740 [ 332.079805] ? alloc_pipe_info+0x286/0x580 [ 332.084089] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 332.089126] ? iov_iter_pipe+0xba/0x2f0 [ 332.093127] default_file_splice_read+0x1b1/0xac0 [ 332.097994] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 332.103580] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 332.108880] ? iter_file_splice_write+0xfc0/0xfc0 [ 332.113743] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 332.119314] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 332.124871] ? fsnotify+0x4f5/0xed0 [ 332.128522] ? arch_local_save_flags+0x50/0x50 [ 332.133145] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 332.138701] ? __fsnotify_parent+0xe2/0x450 [ 332.143037] ? fsnotify_first_mark+0x350/0x350 [ 332.143061] ? init_wait_entry+0x1c0/0x1c0 [ 332.143086] ? avc_policy_seqno+0xd/0x70 [ 332.143099] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 332.143117] ? selinux_file_permission+0x92/0x550 [ 332.143139] ? security_file_permission+0x94/0x320 [ 332.143160] ? rw_verify_area+0x118/0x360 [ 332.143174] ? iter_file_splice_write+0xfc0/0xfc0 [ 332.143191] do_splice_to+0x12a/0x190 [ 332.143209] splice_direct_to_actor+0x31b/0x9d0 [ 332.188891] ? generic_pipe_buf_nosteal+0x10/0x10 [ 332.193759] ? do_splice_to+0x190/0x190 [ 332.197757] ? rw_verify_area+0x118/0x360 [ 332.201929] do_splice_direct+0x2c7/0x420 14:19:26 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) [ 332.206110] ? splice_direct_to_actor+0x9d0/0x9d0 [ 332.210995] ? rw_verify_area+0x118/0x360 [ 332.215165] do_sendfile+0x61a/0xe60 [ 332.218908] ? do_compat_pwritev64+0x1c0/0x1c0 [ 332.223530] ? fput+0x128/0x1a0 [ 332.226859] ? do_syscall_64+0x8c/0x800 [ 332.230857] ? do_syscall_64+0x8c/0x800 [ 332.234861] __x64_sys_sendfile64+0x1f8/0x240 [ 332.239380] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 332.243985] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 332.248770] do_syscall_64+0x1a3/0x800 [ 332.252679] ? syscall_return_slowpath+0x5f0/0x5f0 [ 332.257630] ? prepare_exit_to_usermode+0x232/0x3b0 [ 332.262675] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 332.267564] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 332.272768] RIP: 0033:0x457ec9 [ 332.275977] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 332.294885] RSP: 002b:00007ff6da2bec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 14:19:27 executing program 3: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) r1 = accept4$nfc_llcp(r0, &(0x7f0000000380), &(0x7f00000002c0)=0x60, 0x800) ioctl(r1, 0x8912, &(0x7f0000000340)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000600)='/dev/midi#\x00', 0x0, 0x100) read$FUSE(r2, &(0x7f0000000940), 0x1000) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) removexattr(&(0x7f0000001a80)='./file0\x00', &(0x7f0000001ac0)=@known='system.posix_acl_default\x00') epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) execveat(r4, &(0x7f0000000680)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000006c0)='\x00', &(0x7f0000000700)='/dev/midi#\x00', &(0x7f0000000740)='\x00', &(0x7f0000000780)='}system/\x00'], &(0x7f0000001a40)=[&(0x7f0000000800)='%\x00', &(0x7f0000000880)='yam0\x00', &(0x7f00000008c0)='trusted{\'}\xbf%\x00', &(0x7f0000001940)='/dev/net/tun\x00', &(0x7f0000001980)='*nodevkeyringvmnet0eth1\x00', &(0x7f00000019c0)='bdev\x00', &(0x7f0000001a00)='-[system\x00'], 0x800) r6 = mq_open(&(0x7f0000001b00)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000001b40)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f0000000240)={r7, 0x33}) connect$nfc_llcp(r1, &(0x7f0000000480)={0x27, 0x0, 0x3, 0x6, 0x4, 0x0, "55aee0e1fb6bbfb8a415025f09cf786900a3bb908f9b94301d00ccd5eabcca4f2c0e1366781183600f3140cf061788f901ffc40f7a3261874a3d63be743f5f", 0x16}, 0x75) mq_timedsend(r6, &(0x7f0000001bc0)="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", 0x118, 0x100000000001000, &(0x7f0000000100)={0x77359400}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) ioctl$sock_SIOCDELDLCI(r5, 0x8981, &(0x7f0000000440)={'yam0\x00', 0x100000001}) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f0000000080)=""/55) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b96d7, 0x2, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0xfffffffffffffd9d) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000001e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) [ 332.302604] RAX: ffffffffffffffda RBX: 00007ff6da2bec90 RCX: 0000000000457ec9 [ 332.309880] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 332.317155] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 332.324431] R10: 0000000080000001 R11: 0000000000000246 R12: 00007ff6da2bf6d4 [ 332.331709] R13: 00000000004c4cdc R14: 00000000004d85c0 R15: 0000000000000006 14:19:27 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f00000002c0)={0x7, 0x2000000013}) getdents64(r1, &(0x7f0000000100)=""/197, 0xc5) 14:19:27 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f00000002c0)=0x2) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect(r3, &(0x7f0000000200)=@rxrpc=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e21, 0x200, @mcast1, 0xfffffffffffffffd}}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x0, 0x40010000}], 0x1, 0x2) [ 332.510629] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=11700 comm=syz-executor4 14:19:27 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:27 executing program 4 (fault-call:4 fault-nth:7): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000001) 14:19:27 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f00000002c0)={0x7, 0x2000000013}) getdents64(r1, &(0x7f0000000100)=""/197, 0xc5) 14:19:27 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x0, 0x64000000}], 0x1, 0x2) 14:19:27 executing program 3: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) r1 = accept4$nfc_llcp(r0, &(0x7f0000000380), &(0x7f00000002c0)=0x60, 0x800) ioctl(r1, 0x8912, &(0x7f0000000340)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000600)='/dev/midi#\x00', 0x0, 0x100) read$FUSE(r2, &(0x7f0000000940), 0x1000) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) removexattr(&(0x7f0000001a80)='./file0\x00', &(0x7f0000001ac0)=@known='system.posix_acl_default\x00') epoll_create(0x1) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) execveat(r4, &(0x7f0000000680)='./file0\x00', &(0x7f00000007c0)=[&(0x7f00000006c0)='\x00', &(0x7f0000000700)='/dev/midi#\x00', &(0x7f0000000740)='\x00', &(0x7f0000000780)='}system/\x00'], &(0x7f0000001a40)=[&(0x7f0000000800)='%\x00', &(0x7f0000000880)='yam0\x00', &(0x7f00000008c0)='trusted{\'}\xbf%\x00', &(0x7f0000001940)='/dev/net/tun\x00', &(0x7f0000001980)='*nodevkeyringvmnet0eth1\x00', &(0x7f00000019c0)='bdev\x00', &(0x7f0000001a00)='-[system\x00'], 0x800) r6 = mq_open(&(0x7f0000001b00)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000001b40)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f0000000240)={r7, 0x33}) connect$nfc_llcp(r1, &(0x7f0000000480)={0x27, 0x0, 0x3, 0x6, 0x4, 0x0, "55aee0e1fb6bbfb8a415025f09cf786900a3bb908f9b94301d00ccd5eabcca4f2c0e1366781183600f3140cf061788f901ffc40f7a3261874a3d63be743f5f", 0x16}, 0x75) mq_timedsend(r6, &(0x7f0000001bc0)="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", 0x118, 0x100000000001000, &(0x7f0000000100)={0x77359400}) mq_timedsend(r6, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) ioctl$sock_SIOCDELDLCI(r5, 0x8981, &(0x7f0000000440)={'yam0\x00', 0x100000001}) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f0000000080)=""/55) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r5, &(0x7f0000000a00), 0x73c5d3417c1b96d7, 0x2, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0xfffffffffffffd9d) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000001e00)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b5a5208037801ce1d2edf1564df32f4d8561b6d867f3f42c418daa5f6019bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7de72ee5fe91f7de74b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2bc6cb1c52a88c07c3969c2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e7d000000000000008b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fc08007bf885c732fde933a0bdedba348ce812ce814f0f4414d87494608a9303fceec862caf2205b8cc43dd5ae9e2e539dec6e01000000a07cc3139c3eae9fe9fb5fcf7290be1f545f53b9a2800861d70e76f2806999f80618270e354c86e98dc7213a8e88b27f49b8bf5487f65396e5735e7f46dca0a6eb1049c05846166a8e41661a87a1f22378ac8f1e288325f4f70c231a2c0bc21b88501d6d50b911975f61e672398e1692212d453bf0ebdbd8af11b45d9187cf4f844b35c84933fb38bc03a95c9b5cab918a3ac8692a989deb23a6afaea70b94e25748c19cb3723032b71a81eee91579c15adfe2b98a8cdafae6452eafd991f9a759ac6d16ecd45fffb72fa012379f3ebcea541066c2026e8998d5976cdb5676a0e13ea6000000009c58eb4a79f554b5461032d48407e918783035c5224b970d89fc19c3b11ddf5af435cbe8e4c3f0d7"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) [ 332.855631] FAULT_INJECTION: forcing a failure. [ 332.855631] name fail_page_alloc, interval 1, probability 0, space 0, times 0 14:19:27 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f00000002c0)={0x7, 0x2000000013}) [ 332.987908] CPU: 0 PID: 11755 Comm: syz-executor4 Not tainted 5.0.0-rc1+ #14 [ 332.995160] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.004517] Call Trace: [ 333.007143] dump_stack+0x1db/0x2d0 [ 333.010814] ? dump_stack_print_info.cold+0x20/0x20 [ 333.010836] ? is_bpf_text_address+0xd3/0x170 [ 333.010866] should_fail.cold+0xa/0x15 [ 333.010888] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 333.010915] ? arch_local_save_flags+0x50/0x50 [ 333.010933] ? lock_release+0xc40/0xc40 [ 333.010954] ? rcu_pm_notify+0xd0/0xd0 [ 333.010984] should_fail_alloc_page+0x50/0x60 [ 333.011000] __alloc_pages_nodemask+0x323/0xdc0 [ 333.011026] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 333.011055] ? __kmalloc_node+0x3d/0x70 [ 333.011077] ? rcu_read_lock_sched_held+0x110/0x130 [ 333.011095] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 333.011125] alloc_pages_current+0x107/0x210 [ 333.011150] push_pipe+0x3fc/0x7a0 [ 333.011182] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 333.011215] ? kernel_text_address+0x73/0xf0 [ 333.011264] ? __kernel_text_address+0xd/0x40 [ 333.011288] ? iov_iter_revert+0xaa0/0xaa0 [ 333.011319] ? save_stack+0xa9/0xd0 [ 333.011346] ? save_stack+0x45/0xd0 [ 333.075292] ? kasan_kmalloc+0xcf/0xe0 [ 333.083732] ? __kmalloc+0x15c/0x740 [ 333.083748] ? alloc_pipe_info+0x286/0x580 [ 333.083764] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 333.083782] ? iov_iter_pipe+0xba/0x2f0 [ 333.083804] default_file_splice_read+0x1b1/0xac0 [ 333.129808] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 333.135367] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 333.140656] ? iter_file_splice_write+0xfc0/0xfc0 [ 333.145510] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 333.151087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 333.156636] ? fsnotify+0x4f5/0xed0 [ 333.160278] ? arch_local_save_flags+0x50/0x50 [ 333.164876] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 333.170427] ? __fsnotify_parent+0xe2/0x450 [ 333.174763] ? fsnotify_first_mark+0x350/0x350 [ 333.179358] ? init_wait_entry+0x1c0/0x1c0 [ 333.183616] ? avc_policy_seqno+0xd/0x70 [ 333.187685] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 333.192713] ? selinux_file_permission+0x92/0x550 [ 333.192739] ? security_file_permission+0x94/0x320 [ 333.192762] ? rw_verify_area+0x118/0x360 [ 333.192778] ? iter_file_splice_write+0xfc0/0xfc0 [ 333.192795] do_splice_to+0x12a/0x190 [ 333.192814] splice_direct_to_actor+0x31b/0x9d0 [ 333.192841] ? generic_pipe_buf_nosteal+0x10/0x10 [ 333.202598] ? do_splice_to+0x190/0x190 [ 333.202619] ? rw_verify_area+0x118/0x360 [ 333.202638] do_splice_direct+0x2c7/0x420 [ 333.202658] ? splice_direct_to_actor+0x9d0/0x9d0 [ 333.202683] ? rw_verify_area+0x118/0x360 [ 333.246173] do_sendfile+0x61a/0xe60 [ 333.249909] ? do_compat_pwritev64+0x1c0/0x1c0 [ 333.254508] ? fput+0x128/0x1a0 [ 333.257816] ? do_syscall_64+0x8c/0x800 [ 333.261800] ? do_syscall_64+0x8c/0x800 [ 333.265793] __x64_sys_sendfile64+0x1f8/0x240 [ 333.270312] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 333.274908] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 333.279703] do_syscall_64+0x1a3/0x800 [ 333.283621] ? syscall_return_slowpath+0x5f0/0x5f0 14:19:27 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0/f.le.\x00', 0xc04c0, 0x184) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) accept4$tipc(r3, 0x0, &(0x7f0000000140), 0x800) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r5, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r5, &(0x7f0000000040)='./file0\x00', 0x0) fremovexattr(r4, &(0x7f0000000240)=@random={'user.', 'msdos\x00'}) mkdirat(r5, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:28 executing program 0: syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$KVM_GET_ONE_REG(0xffffffffffffffff, 0x4010aeab, &(0x7f00000002c0)={0x7, 0x2000000013}) 14:19:28 executing program 2: pselect6(0x40, &(0x7f0000000080)={0x0, 0x7, 0x0, 0x0, 0x0, 0x1000000}, &(0x7f00000000c0)={0x0, 0x1}, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x4000000000000) ioctl(r0, 0x2000c2604110, &(0x7f0000000080)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) removexattr(0x0, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r2, 0x0, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r4 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r2, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r4, 0xc0206434, &(0x7f0000000140)={0x6a, 0x0, 0x10002, 0x811}) ioctl$DRM_IOCTL_SG_FREE(r4, 0x40106439, &(0x7f0000000280)={0x0, r5}) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r6, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r6, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r6, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r3, 0x7) [ 333.288580] ? prepare_exit_to_usermode+0x232/0x3b0 [ 333.293621] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 333.293648] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 333.293663] RIP: 0033:0x457ec9 [ 333.306885] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 333.325788] RSP: 002b:00007ff6da2bec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 333.325804] RAX: ffffffffffffffda RBX: 00007ff6da2bec90 RCX: 0000000000457ec9 [ 333.325814] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 333.325823] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 333.325833] R10: 0000000080000001 R11: 0000000000000246 R12: 00007ff6da2bf6d4 [ 333.325843] R13: 00000000004c4cdc R14: 00000000004d85c0 R15: 0000000000000006 [ 333.356055] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=11755 comm=syz-executor4 14:19:28 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x0, 0xfcffffff}], 0x1, 0x2) 14:19:28 executing program 0: syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$KVM_GET_ONE_REG(0xffffffffffffffff, 0x4010aeab, &(0x7f00000002c0)={0x7, 0x2000000013}) 14:19:28 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0/f.le.\x00', 0xc04c0, 0x184) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) accept4$tipc(r3, 0x0, &(0x7f0000000140), 0x800) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r5, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r5, &(0x7f0000000040)='./file0\x00', 0x0) fremovexattr(r4, &(0x7f0000000240)=@random={'user.', 'msdos\x00'}) mkdirat(r5, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:28 executing program 4 (fault-call:4 fault-nth:8): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000001) 14:19:28 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x0, 0xff000000}], 0x1, 0x2) [ 333.636004] FAULT_INJECTION: forcing a failure. [ 333.636004] name fail_page_alloc, interval 1, probability 0, space 0, times 0 14:19:28 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:28 executing program 0: syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$KVM_GET_ONE_REG(0xffffffffffffffff, 0x4010aeab, &(0x7f00000002c0)={0x7, 0x2000000013}) [ 333.743547] CPU: 1 PID: 11793 Comm: syz-executor4 Not tainted 5.0.0-rc1+ #14 [ 333.750783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.760144] Call Trace: [ 333.762751] dump_stack+0x1db/0x2d0 [ 333.766403] ? dump_stack_print_info.cold+0x20/0x20 [ 333.771431] ? is_bpf_text_address+0xd3/0x170 [ 333.775949] should_fail.cold+0xa/0x15 [ 333.779845] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 333.784981] ? arch_local_save_flags+0x50/0x50 [ 333.789578] ? lock_release+0xc40/0xc40 [ 333.793586] ? rcu_pm_notify+0xd0/0xd0 [ 333.797497] should_fail_alloc_page+0x50/0x60 [ 333.802005] __alloc_pages_nodemask+0x323/0xdc0 [ 333.806693] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 333.811734] ? __kmalloc_node+0x3d/0x70 [ 333.815740] ? rcu_read_lock_sched_held+0x110/0x130 [ 333.820769] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 333.826330] alloc_pages_current+0x107/0x210 [ 333.830790] push_pipe+0x3fc/0x7a0 [ 333.834349] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 333.839290] ? kernel_text_address+0x73/0xf0 14:19:28 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f00000002c0)={0x7, 0x2000000013}) 14:19:28 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x0, 0xfffffffc}], 0x1, 0x2) [ 333.843717] ? __kernel_text_address+0xd/0x40 [ 333.848241] ? iov_iter_revert+0xaa0/0xaa0 [ 333.852497] ? save_stack+0xa9/0xd0 [ 333.856135] ? save_stack+0x45/0xd0 [ 333.859771] ? kasan_kmalloc+0xcf/0xe0 [ 333.863672] ? __kmalloc+0x15c/0x740 [ 333.867399] ? alloc_pipe_info+0x286/0x580 [ 333.871647] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 333.876674] ? iov_iter_pipe+0xba/0x2f0 [ 333.880670] default_file_splice_read+0x1b1/0xac0 [ 333.885521] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 333.891092] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 333.896381] ? iter_file_splice_write+0xfc0/0xfc0 [ 333.901235] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 333.906794] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 333.912340] ? fsnotify+0x4f5/0xed0 [ 333.912359] ? arch_local_save_flags+0x50/0x50 [ 333.912380] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 333.912396] ? __fsnotify_parent+0xe2/0x450 [ 333.912415] ? fsnotify_first_mark+0x350/0x350 [ 333.912431] ? init_wait_entry+0x1c0/0x1c0 [ 333.912455] ? avc_policy_seqno+0xd/0x70 [ 333.912469] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 333.912487] ? selinux_file_permission+0x92/0x550 [ 333.912511] ? security_file_permission+0x94/0x320 [ 333.912531] ? rw_verify_area+0x118/0x360 [ 333.920913] ? iter_file_splice_write+0xfc0/0xfc0 [ 333.920931] do_splice_to+0x12a/0x190 [ 333.920952] splice_direct_to_actor+0x31b/0x9d0 [ 333.920970] ? generic_pipe_buf_nosteal+0x10/0x10 [ 333.921023] ? do_splice_to+0x190/0x190 [ 333.939673] ? rw_verify_area+0x118/0x360 [ 333.939694] do_splice_direct+0x2c7/0x420 [ 333.939715] ? splice_direct_to_actor+0x9d0/0x9d0 [ 333.939743] ? rw_verify_area+0x118/0x360 [ 333.939766] do_sendfile+0x61a/0xe60 [ 333.948840] ? do_compat_pwritev64+0x1c0/0x1c0 [ 333.948863] ? fput+0x128/0x1a0 [ 333.948882] ? do_syscall_64+0x8c/0x800 [ 333.948899] ? do_syscall_64+0x8c/0x800 [ 333.948922] __x64_sys_sendfile64+0x1f8/0x240 [ 334.026349] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 334.030949] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 334.035726] do_syscall_64+0x1a3/0x800 [ 334.039624] ? syscall_return_slowpath+0x5f0/0x5f0 14:19:28 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f00000002c0)={0x7, 0x2000000013}) [ 334.044604] ? prepare_exit_to_usermode+0x232/0x3b0 [ 334.049635] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 334.054504] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 334.059707] RIP: 0033:0x457ec9 [ 334.059726] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 334.059735] RSP: 002b:00007ff6da2bec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 14:19:28 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0/f.le.\x00', 0xc04c0, 0x184) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) accept4$tipc(r3, 0x0, &(0x7f0000000140), 0x800) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r5, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r5, &(0x7f0000000040)='./file0\x00', 0x0) fremovexattr(r4, &(0x7f0000000240)=@random={'user.', 'msdos\x00'}) mkdirat(r5, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) [ 334.059751] RAX: ffffffffffffffda RBX: 00007ff6da2bec90 RCX: 0000000000457ec9 [ 334.059759] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 334.059773] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 334.081854] R10: 0000000080000001 R11: 0000000000000246 R12: 00007ff6da2bf6d4 [ 334.081864] R13: 00000000004c4cdc R14: 00000000004d85c0 R15: 0000000000000006 [ 334.189061] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=11793 comm=syz-executor4 14:19:29 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:29 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f00000002c0)={0x7, 0x2000000013}) 14:19:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x0, 0x100000000000000}], 0x1, 0x2) 14:19:29 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:29 executing program 4 (fault-call:4 fault-nth:9): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000001) [ 334.413746] FAULT_INJECTION: forcing a failure. [ 334.413746] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 334.485685] CPU: 0 PID: 11832 Comm: syz-executor4 Not tainted 5.0.0-rc1+ #14 [ 334.492909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.492918] Call Trace: [ 334.492943] dump_stack+0x1db/0x2d0 [ 334.492968] ? dump_stack_print_info.cold+0x20/0x20 [ 334.513521] ? is_bpf_text_address+0xd3/0x170 [ 334.518055] should_fail.cold+0xa/0x15 [ 334.521961] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 334.527082] ? arch_local_save_flags+0x50/0x50 [ 334.527099] ? lock_release+0xc40/0xc40 [ 334.527117] ? rcu_pm_notify+0xd0/0xd0 [ 334.527155] should_fail_alloc_page+0x50/0x60 [ 334.544083] __alloc_pages_nodemask+0x323/0xdc0 [ 334.548768] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 334.553816] ? __kmalloc_node+0x3d/0x70 [ 334.557813] ? rcu_read_lock_sched_held+0x110/0x130 [ 334.562843] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 334.568401] alloc_pages_current+0x107/0x210 [ 334.572828] push_pipe+0x3fc/0x7a0 [ 334.572856] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 334.572872] ? kernel_text_address+0x73/0xf0 [ 334.572887] ? __kernel_text_address+0xd/0x40 [ 334.572927] ? iov_iter_revert+0xaa0/0xaa0 [ 334.581414] ? save_stack+0xa9/0xd0 [ 334.581431] ? save_stack+0x45/0xd0 [ 334.581447] ? kasan_kmalloc+0xcf/0xe0 [ 334.581462] ? __kmalloc+0x15c/0x740 [ 334.609407] ? alloc_pipe_info+0x286/0x580 [ 334.613685] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 334.618713] ? iov_iter_pipe+0xba/0x2f0 [ 334.622704] default_file_splice_read+0x1b1/0xac0 [ 334.627568] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 334.627595] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 334.627612] ? iter_file_splice_write+0xfc0/0xfc0 [ 334.643244] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 334.648804] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 334.654355] ? fsnotify+0x4f5/0xed0 [ 334.657990] ? arch_local_save_flags+0x50/0x50 [ 334.658012] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 334.658027] ? __fsnotify_parent+0xe2/0x450 [ 334.658044] ? fsnotify_first_mark+0x350/0x350 [ 334.677039] ? init_wait_entry+0x1c0/0x1c0 [ 334.681296] ? avc_policy_seqno+0xd/0x70 [ 334.685365] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 334.690394] ? selinux_file_permission+0x92/0x550 [ 334.695258] ? security_file_permission+0x94/0x320 [ 334.700215] ? rw_verify_area+0x118/0x360 [ 334.704377] ? iter_file_splice_write+0xfc0/0xfc0 [ 334.709231] do_splice_to+0x12a/0x190 [ 334.713048] splice_direct_to_actor+0x31b/0x9d0 [ 334.717729] ? generic_pipe_buf_nosteal+0x10/0x10 [ 334.722599] ? do_splice_to+0x190/0x190 [ 334.726599] ? rw_verify_area+0x118/0x360 [ 334.730761] do_splice_direct+0x2c7/0x420 14:19:29 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000140)={0x19, 0x0, 0x10003, 0x5}) ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0206434, &(0x7f0000000240)={0x8, 0x0, 0x10003, 0xfffffffffffffff9}) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000200)={0x7, r4}) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r5, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r5, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r5, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) [ 334.730782] ? splice_direct_to_actor+0x9d0/0x9d0 [ 334.730809] ? rw_verify_area+0x118/0x360 [ 334.730828] do_sendfile+0x61a/0xe60 [ 334.739816] ? do_compat_pwritev64+0x1c0/0x1c0 [ 334.739838] ? fput+0x128/0x1a0 [ 334.755617] ? do_syscall_64+0x8c/0x800 [ 334.759603] ? do_syscall_64+0x8c/0x800 [ 334.763595] __x64_sys_sendfile64+0x1f8/0x240 [ 334.768108] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 334.772705] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 334.777597] do_syscall_64+0x1a3/0x800 [ 334.781502] ? syscall_return_slowpath+0x5f0/0x5f0 [ 334.786458] ? prepare_exit_to_usermode+0x232/0x3b0 [ 334.791492] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 334.796356] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 334.801567] RIP: 0033:0x457ec9 [ 334.804779] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 334.823681] RSP: 002b:00007ff6da2bec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 334.831375] RAX: ffffffffffffffda RBX: 00007ff6da2bec90 RCX: 0000000000457ec9 [ 334.838648] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 334.845905] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 334.853162] R10: 0000000080000001 R11: 0000000000000246 R12: 00007ff6da2bf6d4 [ 334.860418] R13: 00000000004c4cdc R14: 00000000004d85c0 R15: 0000000000000006 [ 334.874784] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=11832 comm=syz-executor4 14:19:29 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x0, 0x800000000000000}], 0x1, 0x2) 14:19:29 executing program 0: r0 = syz_open_dev$dri(0x0, 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f00000002c0)={0x7, 0x2000000013}) 14:19:29 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = fcntl$dupfd(r0, 0x406, r0) dup(r3) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000240)=0xe8) sendmsg$nl_netfilter(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x410004}, 0xc, &(0x7f00000002c0)={&(0x7f00000008c0)={0x414, 0xe, 0x0, 0x304, 0x70bd27, 0x25dfdbfc, {0x2, 0x0, 0x8}, [@typed={0xd0, 0x2a, @binary="2d07dec69203ca6ce1cb01e91975ad363edf65ffebdfa7d219384be8f832fa2e3229b4481d14dbba513db5f7c2fdf153b9196bbd574d55fccac19ab5624a4a8b5392a804a331535d0406ce56313ed06f1c9fe918c0e9e5db3bb62d76eadcf62a32a7edd9571e41f5337e4f5aa6deaa3cc7d065c186d8a94d0bba3569e007049e6584ed8199e5e3652746a9a79749cdf2245493701b2ec627d697753c5cc93fc0fde04ff3abfb1a8f0cb4ba84c8cc8351991dd658881072e8d4e9be0aff6f5b7e238bf6504f4ae8b57ce0922c"}, @generic="614a5f81c04d303f34345570d7ebc8bef24a789f42c60f6f1237673c43482fb4b9ab501ee3cb315b73d6240f0af8107d79ed6e0b7dcd3f129b5dd09f4ee40bd1154df299dffe51a21177bbb9c07adc0e", @generic="4a8439fca2a3406d17821cac0511babb4d67ab29b08ecf72e7a3c60842f4afe622a3e7385a0c2c7abc6a82ecdb92ee7b9a51679b45d42ff31b9f94568962ebdb12123c42f4447fd73c449e876f3eac32f13a70ca26a54446d3bf77a79ee5dc6d693457be4ac86113bec94aa2af4d0f08ea09df14c03e5288fa41", @nested={0x1b8, 0x1e, [@generic="6519e24d574a509f2b9ea7dce8c0cf3e69a40a8221e8b29fa37f2733a033aa7212932e1aa5390766ad4941cd811bb9d7797724b9cbdc0fc6bd38a325da7375958b63fe478deaa456bd174a02c0bf9292e1c422febfba9a3f9d61d45a5335782517525216f6302341850c9ef95f897016f71cc0a1a1a030acd9fa2529ac5248380973ff9b57714871c055c03fe118dd4a91bc5c75b4aebf83e1303442c37024c4ca031bd8a4be21b9995aa1ffd804374f5041bd7718b80999cd412c553107279f30dc3514418dc74251dafdf2e4140e7dcbbf347698b5a167617b0e4f4b8577", @typed={0xc, 0x39, @u64=0x80000000}, @generic="2113942d03dfb80d8e3b3271c54421de2c808d7534a456b966af5c7227710cdb04bf43827cf78c04f6c61edef34d8dc44be82d5db08205640600dced3f64a77c73361f449e8b542ee227b0e6430081200e6d86bd00635a2d54d2eb024a0c0bc7c0c7874ee784a6b0c3451d4fcc474d658def811053b716f6e9e5cc3c0a62e32151c2727553af37d55ce8e1140550a9230d43f103eb8f2d99485568e1879ea8e15ec85a4abbc111021ccfaef3504586d4058b2a6d5a10a1c4fc669d364648d3d4fb2b551eac8fc41727"]}, @nested={0xac, 0x48, [@generic="06fb32ac3f7ef7427ee259f15712237781418dd514fa9487557c944edce07caa6f5cb5c9263800d955e9ca9d05", @generic="ab3e21eb11f8dcb9e78f47674c0def261c7e790a74298006a0b95fc0728309f06010b768f5a9a4a1f2feae507a8b2e822eafe8c774c0ecc3223a214d3bf38712391deb39bbc54aa54f532371c615e56c54a7765e0df6e8ef38cbfbc2dd", @typed={0x8, 0xe, @str='%{$\x00'}, @typed={0xc, 0x48, @u64=0xfffffffffffff800}, @typed={0x8, 0x6e, @uid=r4}]}]}, 0x414}, 0x1, 0x0, 0x0, 0x4000}, 0x4004) r5 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000140)={0x3, 0x5, 0x10001, 0x6, 0x9}) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r5, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$UI_SET_ABSBIT(r5, 0x40045567, 0x3) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r6, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r6, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r6, &(0x7f00000001c0)='.//ile0\x00', 0x0) r7 = semget$private(0x0, 0x6, 0x314) semctl$IPC_STAT(r7, 0x0, 0x2, &(0x7f0000000480)=""/20) ptrace$peekuser(0x3, r2, 0x7) 14:19:29 executing program 0: r0 = syz_open_dev$dri(0x0, 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f00000002c0)={0x7, 0x2000000013}) 14:19:29 executing program 4 (fault-call:4 fault-nth:10): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000001) 14:19:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x0, 0x3f00000000000000}], 0x1, 0x2) 14:19:29 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000200)=0xc) ioprio_get$uid(0x3, r4) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r5, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r5, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r5, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:29 executing program 0: r0 = syz_open_dev$dri(0x0, 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f00000002c0)={0x7, 0x2000000013}) 14:19:30 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = fcntl$dupfd(r0, 0x406, r0) dup(r3) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000240)=0xe8) sendmsg$nl_netfilter(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x410004}, 0xc, &(0x7f00000002c0)={&(0x7f00000008c0)={0x414, 0xe, 0x0, 0x304, 0x70bd27, 0x25dfdbfc, {0x2, 0x0, 0x8}, [@typed={0xd0, 0x2a, @binary="2d07dec69203ca6ce1cb01e91975ad363edf65ffebdfa7d219384be8f832fa2e3229b4481d14dbba513db5f7c2fdf153b9196bbd574d55fccac19ab5624a4a8b5392a804a331535d0406ce56313ed06f1c9fe918c0e9e5db3bb62d76eadcf62a32a7edd9571e41f5337e4f5aa6deaa3cc7d065c186d8a94d0bba3569e007049e6584ed8199e5e3652746a9a79749cdf2245493701b2ec627d697753c5cc93fc0fde04ff3abfb1a8f0cb4ba84c8cc8351991dd658881072e8d4e9be0aff6f5b7e238bf6504f4ae8b57ce0922c"}, @generic="614a5f81c04d303f34345570d7ebc8bef24a789f42c60f6f1237673c43482fb4b9ab501ee3cb315b73d6240f0af8107d79ed6e0b7dcd3f129b5dd09f4ee40bd1154df299dffe51a21177bbb9c07adc0e", @generic="4a8439fca2a3406d17821cac0511babb4d67ab29b08ecf72e7a3c60842f4afe622a3e7385a0c2c7abc6a82ecdb92ee7b9a51679b45d42ff31b9f94568962ebdb12123c42f4447fd73c449e876f3eac32f13a70ca26a54446d3bf77a79ee5dc6d693457be4ac86113bec94aa2af4d0f08ea09df14c03e5288fa41", @nested={0x1b8, 0x1e, [@generic="6519e24d574a509f2b9ea7dce8c0cf3e69a40a8221e8b29fa37f2733a033aa7212932e1aa5390766ad4941cd811bb9d7797724b9cbdc0fc6bd38a325da7375958b63fe478deaa456bd174a02c0bf9292e1c422febfba9a3f9d61d45a5335782517525216f6302341850c9ef95f897016f71cc0a1a1a030acd9fa2529ac5248380973ff9b57714871c055c03fe118dd4a91bc5c75b4aebf83e1303442c37024c4ca031bd8a4be21b9995aa1ffd804374f5041bd7718b80999cd412c553107279f30dc3514418dc74251dafdf2e4140e7dcbbf347698b5a167617b0e4f4b8577", @typed={0xc, 0x39, @u64=0x80000000}, @generic="2113942d03dfb80d8e3b3271c54421de2c808d7534a456b966af5c7227710cdb04bf43827cf78c04f6c61edef34d8dc44be82d5db08205640600dced3f64a77c73361f449e8b542ee227b0e6430081200e6d86bd00635a2d54d2eb024a0c0bc7c0c7874ee784a6b0c3451d4fcc474d658def811053b716f6e9e5cc3c0a62e32151c2727553af37d55ce8e1140550a9230d43f103eb8f2d99485568e1879ea8e15ec85a4abbc111021ccfaef3504586d4058b2a6d5a10a1c4fc669d364648d3d4fb2b551eac8fc41727"]}, @nested={0xac, 0x48, [@generic="06fb32ac3f7ef7427ee259f15712237781418dd514fa9487557c944edce07caa6f5cb5c9263800d955e9ca9d05", @generic="ab3e21eb11f8dcb9e78f47674c0def261c7e790a74298006a0b95fc0728309f06010b768f5a9a4a1f2feae507a8b2e822eafe8c774c0ecc3223a214d3bf38712391deb39bbc54aa54f532371c615e56c54a7765e0df6e8ef38cbfbc2dd", @typed={0x8, 0xe, @str='%{$\x00'}, @typed={0xc, 0x48, @u64=0xfffffffffffff800}, @typed={0x8, 0x6e, @uid=r4}]}]}, 0x414}, 0x1, 0x0, 0x0, 0x4000}, 0x4004) r5 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000140)={0x3, 0x5, 0x10001, 0x6, 0x9}) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r5, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$UI_SET_ABSBIT(r5, 0x40045567, 0x3) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r6, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r6, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r6, &(0x7f00000001c0)='.//ile0\x00', 0x0) r7 = semget$private(0x0, 0x6, 0x314) semctl$IPC_STAT(r7, 0x0, 0x2, &(0x7f0000000480)=""/20) ptrace$peekuser(0x3, r2, 0x7) 14:19:30 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000001) 14:19:30 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f00000002c0)={0x7, 0x2000000013}) [ 335.546974] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=11888 comm=syz-executor4 14:19:30 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:30 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x0, 0x4000000000000000}], 0x1, 0x2) 14:19:30 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f00000002c0)={0x7, 0x2000000013}) 14:19:30 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000), 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:30 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x200000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x10000) ioctl(r1, 0x0, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r4 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r4, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r5, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r5, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r5, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r3, 0x7) 14:19:30 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000002) 14:19:30 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f00000002c0)={0x7, 0x2000000013}) [ 335.943745] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=11911 comm=syz-executor4 14:19:30 executing program 0: syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r0 = dup(0xffffffffffffffff) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f00000002c0)={0x7, 0x2000000013}) 14:19:30 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x0, 0x4001000000000000}], 0x1, 0x2) 14:19:30 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r5, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r5, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r5, &(0x7f00000001c0)='.//ile0\x00', 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r5, 0x50, &(0x7f0000000200)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r2, r4, 0x0, 0x6, &(0x7f0000000140)='msdos\x00', r6}, 0x30) ptrace$peekuser(0x3, r2, 0x7) 14:19:30 executing program 0: syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r0 = dup(0xffffffffffffffff) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f00000002c0)={0x7, 0x2000000013}) 14:19:30 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000003) [ 336.305989] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=11936 comm=syz-executor4 14:19:31 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:31 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x200000, 0x0) ioctl$TCXONC(r2, 0x540a, 0x10000) ioctl(r1, 0x0, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r4 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r4, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r5, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r5, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r5, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r3, 0x7) 14:19:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x0, 0x6400000000000000}], 0x1, 0x2) 14:19:31 executing program 0: syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r0 = dup(0xffffffffffffffff) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f00000002c0)={0x7, 0x2000000013}) 14:19:31 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x200400, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000240)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xdc67eb152f1dbbe8}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r2, 0x14, 0x0, 0x25dfdbff, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24000800}, 0x8000) fchdir(r0) removexattr(0x0, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r3, 0x0, 0x0) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r5 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r3, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r5, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x24) ioctl$KVM_ASSIGN_SET_MSIX_NR(r6, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r6, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r6, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r4, 0x7) 14:19:31 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000004) 14:19:31 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) dup(r0) ioctl$KVM_GET_ONE_REG(0xffffffffffffffff, 0x4010aeab, &(0x7f00000002c0)={0x7, 0x2000000013}) [ 336.798239] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=11950 comm=syz-executor4 14:19:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x0, 0xfcffffff00000000}], 0x1, 0x2) 14:19:31 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:31 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) dup(r0) ioctl$KVM_GET_ONE_REG(0xffffffffffffffff, 0x4010aeab, &(0x7f00000002c0)={0x7, 0x2000000013}) 14:19:31 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000005) 14:19:31 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='.\x05\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ioctl$KDMKTONE(r4, 0x4b30, 0x1) ptrace$peekuser(0x3, r2, 0x7) 14:19:32 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1, 0x0, 0xff00000000000000}], 0x1, 0x2) 14:19:32 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) dup(r0) ioctl$KVM_GET_ONE_REG(0xffffffffffffffff, 0x4010aeab, &(0x7f00000002c0)={0x7, 0x2000000013}) 14:19:32 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x2, 0x3, @thr={&(0x7f0000000200)="c0a2fc5e601cf8d5f7cd2792cdf3f296002557e8ae8a00c3eda7f82b9113bf88ffafef61142eb20c9ac344beb02c9e59512f179a9b4c70b87f550902991e316c58a5972167ee76b3685274806068c517292d1a47086793191daa4d5b", &(0x7f00000008c0)="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"}}, &(0x7f00000002c0)) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) [ 337.310272] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=11979 comm=syz-executor4 14:19:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1}], 0x2, 0x2) 14:19:32 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, 0x0) 14:19:32 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000006) 14:19:32 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) bind$inet(r0, &(0x7f0000000780)={0x2, 0x0, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 337.828019] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=12014 comm=syz-executor4 14:19:32 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:32 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, 0x0) 14:19:32 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) r3 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x4, 0x200) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x80000000, 0x1, [0x2]}, &(0x7f0000000300)=0xa) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000380)={r4, 0x7, 0x10, 0x10001, 0xd8}, &(0x7f00000003c0)=0x18) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r5 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r5, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r6, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r6, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r6, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1}], 0x8, 0x2) 14:19:32 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000007) 14:19:32 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, 0x0) 14:19:32 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1}], 0xf, 0x2) [ 338.219606] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=12033 comm=syz-executor4 14:19:33 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:33 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f00000002c0)={0x0, 0x2000000013}) 14:19:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1}], 0x500, 0x2) 14:19:33 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000008) [ 338.626886] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=12065 comm=syz-executor4 14:19:33 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) bind$inet(r0, &(0x7f0000000780)={0x2, 0x0, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:33 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f00000002c0)={0x0, 0x2000000013}) 14:19:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xffffffff, 0x40000) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) 14:19:33 executing program 2: setxattr$trusted_overlay_redirect(&(0x7f0000000140)='./file1\x00', &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000240)='./file1\x00', 0x8, 0x2) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:33 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000009) 14:19:33 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f00000002c0)={0x0, 0x2000000013}) [ 339.025247] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=12080 comm=syz-executor4 14:19:33 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x5, 0x84000) ioctl$sock_inet6_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f00000000c0)) 14:19:33 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) sendfile(r0, r0, &(0x7f0000000140), 0x0) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(r2, r2, 0x7, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:34 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:34 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x8000000a) 14:19:34 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f00000002c0)={0x7}) 14:19:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) 14:19:34 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f00000002c0)={0x7}) 14:19:34 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r3, 0xc008551a, &(0x7f0000000200)={0x2, 0x1c, [0x4, 0x4, 0x80, 0x8000, 0x0, 0x7fff, 0x2]}) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) [ 339.495967] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=12105 comm=syz-executor4 14:19:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)) r0 = syz_open_dev$amidi(&(0x7f0000000480)='/dev/amidi#\x00', 0x6, 0x40000) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x101000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x0, 0x280) getsockopt$inet6_tcp_int(r2, 0x6, 0x22, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x40000000000c00, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x24) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vsock\x00', 0x9, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000580)={0xff}, 0x4) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000240)={0x0, @dev, @loopback}, &(0x7f0000000280)=0xc) getresuid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in=@local, @in=@multicast1, 0x4e22, 0x4e, 0x4e23, 0x92b8, 0xa, 0x20, 0x20, 0x3c, r5, r6}, {0x0, 0xffff, 0x6, 0xa32, 0x6, 0x7f, 0x4c, 0x101}, {0x84, 0x3ae, 0x568b, 0xe217}, 0x1, 0x6e6bb5, 0x2, 0x1, 0x2, 0x3}, {{@in6, 0x4d2, 0x7f}, 0xa, @in6=@mcast1, 0x3503, 0x4, 0x0, 0x9, 0x45, 0x40, 0xfffffffffffffffb}}, 0xe8) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f00000000c0)=0x7, 0x4) poll(&(0x7f0000000080)=[{r3}], 0x1, 0x2) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18, 0x71, 0x400001, {{0x5, 0x78, 0x6}, 0xfffffffffffffc01}}, 0x18) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000100)=0x7, 0x4) 14:19:34 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f00000002c0)={0x7}) 14:19:34 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x8000000b) [ 339.820205] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=12131 comm=syz-executor4 14:19:34 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:34 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='.//ile0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000240)="eb3c906d6b66732e66617400020401000200027400f8", 0xffffffffffffffd0}], 0xfffffffffffffffe, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, &(0x7f0000000140)=0x8, 0x4) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x16}, 0xfffffffffffffffa, 0x0, 0x0, 0xf, 0x31, 0x9}, &(0x7f00000002c0)=0x20) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f0000000380)=""/159) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) sched_setattr(r2, &(0x7f0000000200)={0x30, 0x3, 0x1, 0x6, 0x320, 0x1c0, 0x1, 0x3}, 0x0) 14:19:34 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:35 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x1000040000, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r2, 0x400}], 0x1, 0x9) r3 = fcntl$dupfd(r0, 0x406, r0) bind$rose(r3, &(0x7f0000000140)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @default}, 0x1c) r4 = dup3(r0, r0, 0x80000) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000180)) getsockname$tipc(r4, &(0x7f00000000c0)=@name, &(0x7f0000000100)=0x10) 14:19:35 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x8000000c) 14:19:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) fsync(r1) 14:19:35 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x8000000d) 14:19:35 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x4, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f00000000c0)={0x200}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000100)) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000140)=0x9, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = fcntl$getown(r1, 0x9) wait4(r3, &(0x7f0000000180), 0xb, &(0x7f00000001c0)) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r2}], 0x1, 0x100000002) 14:19:35 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x8000000e) 14:19:35 executing program 5: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) 14:19:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x3, 0x8000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) 14:19:35 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:35 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) r1 = creat(&(0x7f0000000140)='.//ile0\x00', 0xd8) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000200)) fchdir(r0) removexattr(0x0, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r2, 0x0, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r4 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r2, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r4, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r6, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r6, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r6, &(0x7f00000001c0)='.//ile0\x00', 0x0) write$P9_RFSYNC(r5, &(0x7f0000000240)={0x7, 0x33, 0x2}, 0x7) ptrace$peekuser(0x3, r3, 0x7) 14:19:35 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x8000000f) 14:19:35 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:35 executing program 0 (fault-call:2 fault-nth:0): r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f00000002c0)={0x7, 0x2000000013}) 14:19:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x10000, 0x0) sendto$unix(r2, &(0x7f0000000300)="062349a49c1cbcfb733364c97757bc05be5769deafff105f75a594da387c4ca9aafb657613acee4dd181650c2488c5ca8023ec77ef21183787b854735dc3ac64bba9240358434a65db1b82c9e9966054689ebbafacfb5f9e9f016a284a976acf916e31ae6e48f04b9c0ad95ed5a2078d96aaf57b626e755217018ed86bab1ad860c85e228de74e66b9927ec52e0f61c757116990c741de2e7ad5596d8b343c9199d0c7f7f4d75030e94d5b92d21ebf89510e4b2761a26502013736e97182adf791bf89f4b3d3df57341b2c5802e472312c7a104047b1e9c49317ef20ac695d64863b7cc1cfb43a3c8366d5aba664db2fda1bd863488f79593d1655e20a84c37281d7931ee5838b6ba78b9b609cbfcef0452a57c40feb0eef4574404542bd883c036db69a364f40eb337cd87f1fed4e757ff709611a667b43ded161581057407cf545dc4641ff135a56de76f047bcd39cd464f037611b285445fb99a072c17f721ff8a98b4925e7415a44c47d7dd92e41440080407341400a032a4ff9c83227ab682694c53e76223719eeb38272d485bcf6f90189f5da21b87d564a0d90533c708da56fbf9c1ced7ac2c55117c2024e3162e6f5be0fa36141dc8de1c002e15934f0bae77f74eed19fa9c43766681e656dffa63a979586463901044750dd12024b153e718ba3222b43f0a3a7fa96c2c588cc552bd543ac7be125f2f8ffa2aff1fde52c153b9ba38a2cb7f7c373b61dcb49ab648226faba88c56a18981e36f18e08e7f08f25d0c60627197d2e44b802034035aaab11b64a7c0e040c191fc20124dc4950f04d0d15b9b43f319585195461635a5904c841efb1a713662e1daa46c8dac01e088c541d169c87a9c510f82ec63dc988d6588b59845de6ee1ffdf9c982d83daa7793ed628e128b693773828efda7ce549e84e756aeaaef6e6111461e3840661afd5acc4040fcd3001f33a3f1a8a50f49541bbafcbb8d7b2ded9cae2dd1e0a09394640700effd4cb6ecb6630a6fefdfe5354aedea41e8a0379da31283f7c6365ec8c77ee3ec00cc80c976603fda5a5c7ecf39cd8150a5194a10322fd2545f59944d20ac94dd652f8185ca1d6238420c305476dd00a58c63ede034f664155c09355836fad912bce097709b02a823bb83f831d7d7ba8b993e099edaae16678a7cb26c7ac5f1870075d9b7bf839d30fef721b338dc876ef6ca9514a00addc6e33bed77ea4bcc5b5932afc6cadc78370e0418e31878630c5c10c8ef07cd806bcaaa7f230da8cc45b8d9be6d3eeb483f01cf470b92fa68a66de3edc247cbc30af2edaa9bdf83fab10488655ea8cd19bb0da457515e75f49485f86da091f42263c79db9d59d40a23d15d13faa6a75dd6f16e020d407a5470af3289bb0b5e98bb6d81673ab73c110215ad654ba1077973fedbf38e7bda2a09c6a56168d5aca9cb067ffcb3d6c55bafb136a6a61d3347d04b7454f525cc30ed6baf3104287ac779728fcf3b0c965af9f4f509b5349535cd1140244cceebc411313c128e74dae05f438f9f484d4f902fd7b3ce503349d749f33e0a887b02741d3acf36dd85a6f749b162a0c5d4edb67b326ed8d09cabdd5277247be1472a5d491c571cbcefcbc6b811fff933eb3df7e8a25da3f0ca80ad1c1a0755590da5824db49c5f2dd303f0f258852bf9418a7b31ce69e7873db9c2c27644cf273dcce35a1c56ab68309ef95f37c2bade4a57c8c901b2fbd7d98c0bb602c50731260f7c5ff2403f03ca434f7b5acc058b4c16a3459965c5f0e3243e633842cb4f792c96fba11c93865012eb0d7a608bd92b3fde29c706a7649304b7241bfb053e6f8681047774058061000055da54bd9b3595db20c2270dfc7a6921c67760e313e9db3a6984086ee3f66cc4a220872cb0c4ad1a941e0948b9e478d886050b7c92e51564aa817c54d173207f2d3f8c72dc8344404a7022d7838f6bda7b6a7477f833a4f81f31714cec1ff2ed23130a7a0f40e4cb791725ce267d0a5df260418306b156e6a18c82e791abbbe715c3d52e1d056cbdf2550227cb261ce700d1caa05f8719f16aae77bb2197db962106252c4dcbea82a8fd47431815f8227a4f7940ec65c0888e9a1e31ec54a192b860bac7381ba2d3c7ed9e2712f28ed73f985f4cbebae2a10a13c831ea7daf54ed8202fc8947b8c7a73427728e1331aeabe7bfd5a1c08a8926895dd0b073e52ae39de7986f0279aa52519b6ebc27ced701c3ec61fe159a167a534bd2195b03148f47ee9b9a4ffadd5016e9441feb7fd0c38e2415989aeeb6e1398f621e568e43df05f1cf435830b525e138127204bb00ca919481a8a8c421bbf9a127000e56d54d0b29bf748e8eaeed044b36817155c00e73475738eb04f60cb529a443016d6991820f99c0565186be655ad32adb82f5ea53ce6da91f7989e8b18bdfbd721d56a8738290754d4d9533c9874847cd652e0d45720673681933aef01a0422d3dcb0347a38bd2c2a5db93aec3e1f0c7cf1cdaccfb613d4dd9df088543ccc0a26f3712fb4b4589e4926247f63fb5f6fa43071cb32513a2a563b12e3fddf9fa31d1c80d66e929e200989539ad97525aa4c8fab3db8a528be6e7ed9ac9290af38ff773a31cdc977ae04b8efafe0294cc54d89664cc2132e14b6e6e68e7caa7fa422d68d5b2419fd40c879087de7e0f405131db25fda1b303ed9d9453c99e6b883721510eb1f4f3fc74e73f4e3d307ad9169201d5cadee4d995fb8f822f5732f3cee4607e0859ff81be605a91405fdd398cbd9e37eacfe927ed5cafc083aca2c565b5aa03566c69af0ed6fc3fa1b991f6f194c98c11cfb7ad42a355cc6b50663684aba984117bf81475823925ad4be30713d21df1075fd3f6e7300ff35bdd3cfbac854178181edc319419b80458a7bf7e2270df442fa5503efa84a80d2e72f2ce74b4a6177f05e9ef614e8d4003b40e7b5ab3f86d05fbf8ef3f09217fda91b617a5bdf380be87fdd34513246b73ac9b391b7c6a6c2811a782290a5c2f3781213ba64a266f85fce9c75cd8e9e1ab5ef3882d5d172650b09bbbdcb519f91cbb89177ea4df15037627a42a8743b96d808a2e0524916d4c7813d556154fe583fa510f8a47daf553b49789d843d190f0c49830aacbf0986149b3882fa9ce6d2a3681c3a270fa8f9606c41fabf9ae0dd305d3c31015c1531c9f87f43b50f1bbd9b42991db5fe8993fadc6ff952c9225111fb87e4be0ab90b886ef87c5c5e205774890131dea6c351101fbd95bff9cf648090feab3dbe3e6b4fef96e282cb7441d16a296a0f8da677d58ada512d3d7e5a5a2f66fa5c6947b6f9f6d1f71f5887c41a3f73cb925b7401091cdba941a9ccf42bc827ee7c197c07b1fc44bad241ca9ae3f6d3da8528f66b86e9a8c148c51526fed781c7fad67da94989f8e2a0d0629bea459245af66b7e107a929b5472eec6916f162ddf7857ba9f56010e8c17220de37773192578c7ae4ae4f3f420e4104de717c7a5e820aca7178695e2f847abb85b98bedb5d13a0a2d9011ebf0fc031adeb3977d2f47d95f7304a09b1bc3f4d78ac3f8d0ae462237347109bfbdb7b9f2eeb548d3f23dd34b37724875cfb25aec27c44128762ab5fb4e9b707ade71f57226555811cd0bc215604fb28e9350bc01fa2ebce75a05ddf3a531ead0744256b59feae0c942b6984ec363405ef4868a043360cd87b1a4e4ba6f767b4e2a2aa1a36c825aa0a0fd617be9fe488b5eaa40df7ad7fb72e032839afde58505864652874506ebe8fae8897be0b09ac9410bd997fc561bbecd026c4e6e07e8800dcb74e09decd20b3d8536370790869d1a575f1c8584886bbead3f915429c294621b08396ba7eb18f968fe5f0bff1661dfe7d1348cf09536df00e8f31a4004df2bbe12856174e21ec397539f15375bdfa7428b94e687550f577d392996e57ee343900f9baf8376d922f76cf70eb5be5f1112b6022293d631887fed388670fad609fcdb59f861575bd525244c0fe9c403757b68c8159e618248ccb4bb85dc81ad3e2e419942475aedf8a61b1fcd9db12e95736e0450d283fe8f31302c49afc349b1cdb8db262ef8b235bc5df032ce6ee79a885af917e5838c8f57b0c29c09bbde3b4869a5500bd6a6b0ae70feeaed7c679851caa468af3055f8789ef1417b9aebf68e7a33f22bbd061b365a134864d9df9f5653390add509d9d98f93730146c2fdec41453484dac66d7c8293743507e8d66b3e5932d627bc5ae225f69e5f597e7ba950cf83354725d31b57e924ca438f77ffc10be7fb70737be2a4f44a6be611116d63ef4abd7ea32f6ecf8e31ef6f657a4c5b0ddc326c50930bf6241954de4f06d52278483af0e34b3833a6ea0ffcf1a5a74b86103845f1d3d0f3f51ec21c5c50f7886378bad0b90da122c37c02677ad7132f5cc6d3b27f9341aed5f90c75d6ee64f764cc999b6863c628c67ae8215930c1ca9d0af67476eecfba79c8bb3494d698ffa814e70074098416d21125e984f2ef75a53d41cf320ac9e922620c5cdf0b9ef175a9f4978730c90c7625491da8f727092bd94bfb36eaaffe0b989b3a3040a4109cfbb557e018aff14e32578afbada2f939f2b43c08ca96b63172cd85604c3c93b2aaa195b76be279e402a70cee8e3943d094e4f133f6f9df3dc9a252446c2e4ecbe9b51b244bce45146d52d5b8b6865f2b479244398d0267e5d1ce19b6872acff2c85be3fbe723f1e7e40bbbfc4e83e96a48518e5dd35ac8654aeb5cefad87d0a19d5f59312a480ae448937f17d179b1d6cbee0ac630e134bc31d4f19cb3d70cea54fd4145ae09111ec154f266e819c51a8e09fdb3ef6199b12e899581f8fd766a24206b31c941137b7765fc6beb8c258001fb002501d5d0cf30da3fbc67d60909c9b2efaebd6c7ae5fc3d1f4537417f3682d134807b44cbd010227eb8c5d3b5bb8dc9d71e92b08f01387f8ab3d8c554a21a54ed20d594bc1b0ece156db0333d4f3aaf1fa813b2a5a4e04a94ffe568e7da3d9ea6f43ff4d28efbbb55cb5776dc82f250b552e65b9b13c316404b3ad162de78bebef4fedb62b916b415d3a4f8cb94b02259b2b61095dc1ad8b6f021c58402c8f0173dde0d198f463e8936a59e536ca08f7761792a43ec2f8d7ad4ee6e93b79d0ed2d513ce3d54502ea490843468fc934a913a35006f66aca13a6be80ee5e81cc04ed551a52e2b73a0a4f83c0b920e547eed48eb230884c02b7b3b28448387a269123e02bc36313d93c24c6374ef9d3bd2b40dc624984dd2975417d09733cfdd7c3283ef6b4174f271140daa2ea64cd01d399746a30b46b8317bae7a8f70c0b2013fc5ee4d2957bd6d13604bd86e69891bc9f7a4ec66cd40f752085d26d97a9009e12971fcd408b13c299f9ed6de90ced525d7bd4c6bf8d818644df361a1b6ceed87a002e46733affe4680f04a6d5e93d09ed7a4f02a9411a0b0c2759d31bd49ed2b23486c4208aaa039022db5782ea35da8822058f11b37532d186fe86fe85191c36e5b59680c8e82d2e6033c3a7c6cb9331da459e3aba725e65b17e460b08fd7841f3c9de54134c557c196b801ae4400bc35f8428d13362e9cf27c2576da60e3dcc0a3b388526f1c1a28c3f8e620e6fb9a3c870ca07fc5bcaa94c5154abb8c4599e5eefbe0ca21c33307efdc8187cc1fc1e18d008a02c8e4d7fd2770483455cdd029f9e0553acf4eb274abf1f994e01e33080602c8a1bdbad9ffec705870648940cacc75bb96a780b4b9df662fa32c80b79e95ece2d046d18260e01d0d60620256a11c891c7b1a57d1", 0x1000, 0x80, 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) [ 341.211503] selinux_nlmsg_perm: 3 callbacks suppressed [ 341.211519] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=12195 comm=syz-executor4 [ 341.217251] FAULT_INJECTION: forcing a failure. [ 341.217251] name failslab, interval 1, probability 0, space 0, times 0 [ 341.347300] CPU: 0 PID: 12200 Comm: syz-executor0 Not tainted 5.0.0-rc1+ #14 [ 341.354530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.354538] Call Trace: [ 341.354577] dump_stack+0x1db/0x2d0 [ 341.354598] ? dump_stack_print_info.cold+0x20/0x20 [ 341.354617] ? ___might_sleep+0x1e7/0x310 [ 341.354644] should_fail.cold+0xa/0x15 [ 341.354665] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 341.354688] ? ___might_sleep+0x1e7/0x310 [ 341.354706] ? arch_local_save_flags+0x50/0x50 14:19:36 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)={0x7}) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x3}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f00000002c0)={0x80, 0x2, 0x7, 0x1, r4}, 0xffffffffffffff5a) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r5, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r5, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r5, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) [ 341.354727] ? lock_release+0xc40/0xc40 [ 341.383317] __should_failslab+0x121/0x190 [ 341.383339] should_failslab+0x9/0x14 [ 341.383357] kmem_cache_alloc_trace+0x2d1/0x760 [ 341.383376] ? drm_modeset_backoff+0x810/0x810 [ 341.383401] drm_atomic_state_alloc+0xb7/0x120 [ 341.392638] set_property_atomic+0xbc/0x330 [ 341.392658] ? wait_for_completion+0x810/0x810 [ 341.392679] ? drm_object_property_get_value+0x180/0x180 [ 341.392715] ? mutex_unlock+0xd/0x10 [ 341.392733] ? __drm_mode_object_find+0xb7/0x210 [ 341.401303] drm_mode_obj_set_property_ioctl+0x43f/0x780 [ 341.401327] ? drm_mode_obj_find_prop_id+0x140/0x140 [ 341.401344] ? drm_dev_unregister+0x480/0x480 [ 341.401368] drm_connector_property_set_ioctl+0x1b5/0x2c0 [ 341.409373] ? lock_acquire+0x1db/0x570 [ 341.409394] ? drm_connector_set_obj_prop+0x1a0/0x1a0 [ 341.409409] ? rcu_sync_dtor+0x170/0x170 [ 341.409426] ? drm_lease_owner+0x45/0x60 [ 341.409445] ? drm_is_current_master+0x5c/0x140 [ 341.418685] drm_ioctl_kernel+0x278/0x340 [ 341.418703] ? drm_connector_set_obj_prop+0x1a0/0x1a0 [ 341.418721] ? drm_setversion+0x8c0/0x8c0 [ 341.501919] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 341.501938] ? _copy_from_user+0xdd/0x150 [ 341.501961] drm_ioctl+0x592/0xb50 [ 341.501978] ? drm_connector_set_obj_prop+0x1a0/0x1a0 [ 341.502001] ? drm_version+0x3d0/0x3d0 [ 341.511691] ? arch_local_save_flags+0x50/0x50 [ 341.511709] ? __fget+0x499/0x710 [ 341.511735] ? __might_sleep+0x95/0x190 [ 341.511754] ? drm_version+0x3d0/0x3d0 [ 341.511772] do_vfs_ioctl+0x107b/0x17d0 [ 341.544211] ? selinux_file_ioctl+0x511/0x720 [ 341.548725] ? selinux_file_ioctl+0x125/0x720 [ 341.553235] ? ioctl_preallocate+0x2f0/0x2f0 [ 341.557654] ? selinux_file_mprotect+0x620/0x620 [ 341.562423] ? __fget_light+0x2db/0x420 [ 341.566416] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 341.571967] ? fput+0x128/0x1a0 [ 341.575262] ? do_syscall_64+0x8c/0x800 [ 341.579257] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 341.584813] ? security_file_ioctl+0x93/0xc0 [ 341.589256] ksys_ioctl+0xab/0xd0 [ 341.592739] __x64_sys_ioctl+0x73/0xb0 14:19:36 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x101000, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000200)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) removexattr(0x0, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r2, 0x0, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r4 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r2, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r4, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r5, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r5, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r5, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r3, 0x7) [ 341.596637] do_syscall_64+0x1a3/0x800 [ 341.600536] ? syscall_return_slowpath+0x5f0/0x5f0 [ 341.605500] ? prepare_exit_to_usermode+0x232/0x3b0 [ 341.610535] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 341.615418] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 341.620614] RIP: 0033:0x457ec9 [ 341.623818] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:19:36 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x843) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) [ 341.642725] RSP: 002b:00007fb1b9ea5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 341.650444] RAX: ffffffffffffffda RBX: 00007fb1b9ea5c90 RCX: 0000000000457ec9 [ 341.657724] RDX: 00000000200002c0 RSI: 000000004010aeab RDI: 0000000000000004 [ 341.664999] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 341.672280] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb1b9ea66d4 [ 341.679571] R13: 00000000004c0c01 R14: 00000000004d2668 R15: 0000000000000005 14:19:36 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x80) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) [ 341.800663] [ 341.802335] ================================================ [ 341.808120] WARNING: lock held when returning to user space! [ 341.813914] 5.0.0-rc1+ #14 Not tainted [ 341.817811] ------------------------------------------------ [ 341.823604] syz-executor0/12200 is leaving the kernel with locks still held! [ 341.830788] 1 lock held by syz-executor0/12200: [ 341.835454] #0: 00000000778c86ed (crtc_ww_class_acquire){+.+.}, at: set_property_atomic+0xb4/0x330 [ 341.836254] kobject: 'loop2' (000000005ea5b0d8): kobject_uevent_env 14:19:36 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mq_open(&(0x7f00000000c0)='/dev/ptmx\x00', 0x81, 0x86111f8e2773ff9b, &(0x7f0000000100)={0x101, 0x2, 0x3f, 0x81, 0x4, 0x0, 0xfff, 0x7}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) 14:19:36 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000010) [ 341.859799] kobject: 'loop2' (000000005ea5b0d8): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 341.868329] kobject: 'vet' (000000005cb0e6b0): kobject_add_internal: parent: 'net', set: 'devices' [ 341.897967] kobject: 'vet' (000000005cb0e6b0): kobject_uevent_env 14:19:36 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:36 executing program 0 (fault-call:2 fault-nth:1): r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f00000002c0)={0x7, 0x2000000013}) [ 341.905900] kobject: 'vet' (000000005cb0e6b0): fill_kobj_path: path = '/devices/virtual/net/vet' [ 341.918354] kobject: 'queues' (0000000003933458): kobject_add_internal: parent: 'vet', set: '' [ 341.923046] kobject: 'loop4' (0000000057d6f79a): kobject_uevent_env [ 341.935855] kobject: 'queues' (0000000003933458): kobject_uevent_env [ 341.943013] kobject: 'queues' (0000000003933458): kobject_uevent_env: filter function caused the event to drop! 14:19:36 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getsockopt$inet6_udp_int(r3, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000200)=0x4) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) [ 341.958189] kobject: 'rx-0' (0000000001f10a4a): kobject_add_internal: parent: 'queues', set: 'queues' [ 341.968270] kobject: 'loop4' (0000000057d6f79a): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 341.982767] FAULT_INJECTION: forcing a failure. [ 341.982767] name failslab, interval 1, probability 0, space 0, times 0 [ 341.984293] kobject: 'rx-0' (0000000001f10a4a): kobject_uevent_env [ 342.003375] kobject: 'rx-0' (0000000001f10a4a): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 342.005664] kobject: 'loop5' (000000006fab86f3): kobject_uevent_env [ 342.021664] CPU: 1 PID: 12233 Comm: syz-executor0 Not tainted 5.0.0-rc1+ #14 [ 342.024822] kobject: 'tx-0' (0000000011421ac9): kobject_add_internal: parent: 'queues', set: 'queues' [ 342.029043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 342.029051] Call Trace: [ 342.029084] dump_stack+0x1db/0x2d0 [ 342.029102] ? dump_stack_print_info.cold+0x20/0x20 [ 342.043647] kobject: 'tx-0' (0000000011421ac9): kobject_uevent_env [ 342.047808] ? save_stack+0xa9/0xd0 [ 342.047831] should_fail.cold+0xa/0x15 [ 342.047848] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 342.050520] kobject: 'tx-0' (0000000011421ac9): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 342.054038] ? lock_acquire+0x1db/0x570 [ 342.054066] ? ___might_sleep+0x1e7/0x310 [ 342.054082] ? arch_local_save_flags+0x50/0x50 [ 342.054098] ? lock_acquire+0x1db/0x570 [ 342.054115] __should_failslab+0x121/0x190 [ 342.061292] kobject: 'batman_adv' (000000005bd0ae96): kobject_add_internal: parent: 'vet', set: '' [ 342.065446] should_failslab+0x9/0x14 [ 342.065461] __kmalloc+0x2dc/0x740 [ 342.065478] ? drm_atomic_state_alloc+0xb7/0x120 [ 342.065493] ? drm_atomic_state_init+0x176/0x3c0 [ 342.065509] drm_atomic_state_init+0x176/0x3c0 [ 342.065525] ? __drm_atomic_state_free+0xf0/0xf0 [ 342.065539] ? drm_modeset_backoff+0x810/0x810 [ 342.065568] drm_atomic_state_alloc+0xcf/0x120 [ 342.065585] set_property_atomic+0xbc/0x330 [ 342.065600] ? wait_for_completion+0x810/0x810 [ 342.065618] ? drm_object_property_get_value+0x180/0x180 [ 342.065639] ? mutex_unlock+0xd/0x10 [ 342.104985] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=12227 comm=syz-executor4 [ 342.109110] ? __drm_mode_object_find+0xb7/0x210 [ 342.109131] drm_mode_obj_set_property_ioctl+0x43f/0x780 [ 342.109149] ? drm_mode_obj_find_prop_id+0x140/0x140 [ 342.152795] kobject: 'tx-1' (00000000f7ce1303): kobject_add_internal: parent: 'queues', set: 'queues' [ 342.155001] ? drm_dev_unregister+0x480/0x480 [ 342.155025] drm_connector_property_set_ioctl+0x1b5/0x2c0 [ 342.160308] kobject: 'tx-1' (00000000f7ce1303): kobject_uevent_env [ 342.163907] ? lock_acquire+0x1db/0x570 [ 342.163925] ? drm_connector_set_obj_prop+0x1a0/0x1a0 [ 342.163939] ? rcu_sync_dtor+0x170/0x170 [ 342.163955] ? drm_lease_owner+0x45/0x60 [ 342.163973] ? drm_is_current_master+0x5c/0x140 [ 342.163992] drm_ioctl_kernel+0x278/0x340 [ 342.172340] kobject: 'tx-1' (00000000f7ce1303): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-1' [ 342.173142] ? drm_connector_set_obj_prop+0x1a0/0x1a0 [ 342.187926] kobject: 'rx-1' (000000000f319fed): kobject_add_internal: parent: 'queues', set: 'queues' [ 342.190184] ? drm_setversion+0x8c0/0x8c0 [ 342.190205] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 342.196240] kobject: 'rx-1' (000000000f319fed): kobject_uevent_env [ 342.200730] ? _copy_from_user+0xdd/0x150 [ 342.200750] drm_ioctl+0x592/0xb50 [ 342.212837] kobject: 'rx-1' (000000000f319fed): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-1' [ 342.214577] ? drm_connector_set_obj_prop+0x1a0/0x1a0 [ 342.214597] ? drm_version+0x3d0/0x3d0 [ 342.225194] kobject: 'loop5' (000000006fab86f3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 342.226443] ? proc_cwd_link+0x1d0/0x1d0 [ 342.226464] ? arch_local_save_flags+0x50/0x50 [ 342.226481] ? __fget+0x499/0x710 [ 342.260313] kobject: 'loop0' (0000000057383183): kobject_uevent_env [ 342.262591] ? __might_sleep+0x95/0x190 [ 342.262609] ? drm_version+0x3d0/0x3d0 [ 342.262624] do_vfs_ioctl+0x107b/0x17d0 14:19:37 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:37 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x801000000b) 14:19:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x400, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x800, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f00000000c0)) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) 14:19:37 executing program 0 (fault-call:2 fault-nth:2): r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f00000002c0)={0x7, 0x2000000013}) [ 342.262642] ? selinux_file_ioctl+0x511/0x720 [ 342.262657] ? selinux_file_ioctl+0x125/0x720 [ 342.274168] kobject: 'loop0' (0000000057383183): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 342.277192] ? ioctl_preallocate+0x2f0/0x2f0 [ 342.277207] ? selinux_file_mprotect+0x620/0x620 [ 342.277223] ? __fget_light+0x2db/0x420 [ 342.290912] kobject: 'loop1' (00000000de8e11f6): kobject_uevent_env [ 342.293202] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 342.293219] ? fput+0x128/0x1a0 [ 342.293237] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 342.293267] ? security_file_ioctl+0x93/0xc0 [ 342.293281] ksys_ioctl+0xab/0xd0 [ 342.293294] __x64_sys_ioctl+0x73/0xb0 [ 342.293310] do_syscall_64+0x1a3/0x800 [ 342.293325] ? syscall_return_slowpath+0x5f0/0x5f0 [ 342.293354] ? prepare_exit_to_usermode+0x232/0x3b0 [ 342.293368] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 342.293402] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 342.293428] RIP: 0033:0x457ec9 [ 342.293458] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 342.293469] RSP: 002b:00007fb1b9ea5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 342.299611] kobject: 'loop1' (00000000de8e11f6): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 342.301156] RAX: ffffffffffffffda RBX: 00007fb1b9ea5c90 RCX: 0000000000457ec9 [ 342.301166] RDX: 00000000200002c0 RSI: 000000004010aeab RDI: 0000000000000004 [ 342.301174] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 342.301186] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb1b9ea66d4 [ 342.319255] kobject: 'loop2' (000000005ea5b0d8): kobject_uevent_env [ 342.320273] R13: 00000000004c0c01 R14: 00000000004d2668 R15: 0000000000000005 [ 342.383289] FAULT_INJECTION: forcing a failure. [ 342.383289] name failslab, interval 1, probability 0, space 0, times 0 [ 342.420831] kobject: 'loop2' (000000005ea5b0d8): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 342.430074] CPU: 1 PID: 12241 Comm: syz-executor0 Not tainted 5.0.0-rc1+ #14 [ 342.437058] kobject: 'tx-1' (00000000f7ce1303): kobject_cleanup, parent 0000000003933458 [ 342.438276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 342.443226] kobject: 'tx-1' (00000000f7ce1303): auto cleanup 'remove' event [ 342.448282] Call Trace: [ 342.448305] dump_stack+0x1db/0x2d0 [ 342.448322] ? dump_stack_print_info.cold+0x20/0x20 [ 342.448344] ? do_syscall_64+0x1a3/0x800 [ 342.451616] kobject: 'tx-1' (00000000f7ce1303): kobject_uevent_env [ 342.470416] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 342.470435] ? save_stack+0xa9/0xd0 [ 342.470455] should_fail.cold+0xa/0x15 [ 342.470472] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 342.470487] ? lock_acquire+0x1db/0x570 [ 342.470507] ? ___might_sleep+0x1e7/0x310 [ 342.470524] ? arch_local_save_flags+0x50/0x50 [ 342.481778] kobject: 'loop5' (000000006fab86f3): kobject_uevent_env [ 342.487750] ? trace_hardirqs_on+0xbd/0x310 [ 342.487771] __should_failslab+0x121/0x190 [ 342.487790] should_failslab+0x9/0x14 [ 342.487804] __kmalloc+0x2dc/0x740 [ 342.487822] ? drm_atomic_state_alloc+0xb7/0x120 [ 342.498222] kobject: 'loop5' (000000006fab86f3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 342.502346] ? drm_atomic_state_init+0x212/0x3c0 [ 342.502363] drm_atomic_state_init+0x212/0x3c0 [ 342.502378] ? __drm_atomic_state_free+0xf0/0xf0 [ 342.502393] ? drm_modeset_backoff+0x810/0x810 [ 342.502410] drm_atomic_state_alloc+0xcf/0x120 [ 342.510121] kobject: 'loop2' (000000005ea5b0d8): kobject_uevent_env [ 342.516951] set_property_atomic+0xbc/0x330 [ 342.516968] ? wait_for_completion+0x810/0x810 [ 342.516985] ? drm_object_property_get_value+0x180/0x180 [ 342.517008] ? mutex_unlock+0xd/0x10 [ 342.517024] ? __drm_mode_object_find+0xb7/0x210 [ 342.517042] drm_mode_obj_set_property_ioctl+0x43f/0x780 [ 342.526174] kobject: 'tx-1' (00000000f7ce1303): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-1' [ 342.530699] ? drm_mode_obj_find_prop_id+0x140/0x140 [ 342.530715] ? drm_dev_unregister+0x480/0x480 [ 342.530735] drm_connector_property_set_ioctl+0x1b5/0x2c0 14:19:37 executing program 0 (fault-call:2 fault-nth:3): r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f00000002c0)={0x7, 0x2000000013}) 14:19:37 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f00000002c0)={0x7, 0x2000000013}) 14:19:37 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x2, &(0x7f00000002c0)={0x7, 0x2000000013}) 14:19:37 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 342.546262] kobject: 'loop2' (000000005ea5b0d8): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 342.551332] ? lock_acquire+0x1db/0x570 [ 342.551351] ? drm_connector_set_obj_prop+0x1a0/0x1a0 [ 342.551365] ? rcu_sync_dtor+0x170/0x170 [ 342.551383] ? drm_lease_owner+0x45/0x60 [ 342.566003] kobject: 'tx-1' (00000000f7ce1303): auto cleanup kobject_del [ 342.566785] ? drm_is_current_master+0x5c/0x140 [ 342.566806] drm_ioctl_kernel+0x278/0x340 [ 342.566824] ? drm_connector_set_obj_prop+0x1a0/0x1a0 [ 342.578076] kobject: 'loop2' (000000005ea5b0d8): kobject_uevent_env [ 342.583254] ? drm_setversion+0x8c0/0x8c0 [ 342.583274] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 342.583289] ? _copy_from_user+0xdd/0x150 [ 342.583306] drm_ioctl+0x592/0xb50 [ 342.583321] ? drm_connector_set_obj_prop+0x1a0/0x1a0 [ 342.583342] ? drm_version+0x3d0/0x3d0 [ 342.583360] ? proc_cwd_link+0x1d0/0x1d0 [ 342.589214] kobject: 'tx-1' (00000000f7ce1303): calling ktype release [ 342.589611] ? arch_local_save_flags+0x50/0x50 [ 342.594924] kobject: 'loop2' (000000005ea5b0d8): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 342.598677] ? __fget+0x499/0x710 [ 342.598697] ? __might_sleep+0x95/0x190 [ 342.598713] ? drm_version+0x3d0/0x3d0 [ 342.598745] do_vfs_ioctl+0x107b/0x17d0 [ 342.608025] kobject: 'tx-1': free name [ 342.610408] ? selinux_file_ioctl+0x511/0x720 [ 342.610422] ? selinux_file_ioctl+0x125/0x720 [ 342.610438] ? ioctl_preallocate+0x2f0/0x2f0 [ 342.610456] ? selinux_file_mprotect+0x620/0x620 [ 342.614794] kobject: 'loop3' (0000000088a8e4c2): kobject_uevent_env [ 342.617964] ? __fget_light+0x2db/0x420 [ 342.617984] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 342.618000] ? fput+0x128/0x1a0 [ 342.618020] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 342.626072] kobject: 'loop3' (0000000088a8e4c2): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 342.627077] ? security_file_ioctl+0x93/0xc0 [ 342.627095] ksys_ioctl+0xab/0xd0 [ 342.627112] __x64_sys_ioctl+0x73/0xb0 [ 342.627131] do_syscall_64+0x1a3/0x800 [ 342.631778] kobject: 'loop0' (0000000057383183): kobject_uevent_env [ 342.635847] ? syscall_return_slowpath+0x5f0/0x5f0 [ 342.635864] ? prepare_exit_to_usermode+0x232/0x3b0 [ 342.635883] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 342.635905] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 342.635916] RIP: 0033:0x457ec9 [ 342.635932] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 342.635943] RSP: 002b:00007fb1b9ea5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 342.645520] kobject: 'loop0' (0000000057383183): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 342.646672] RAX: ffffffffffffffda RBX: 00007fb1b9ea5c90 RCX: 0000000000457ec9 [ 342.646682] RDX: 00000000200002c0 RSI: 000000004010aeab RDI: 0000000000000004 [ 342.646691] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 342.646700] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb1b9ea66d4 [ 342.646709] R13: 00000000004c0c01 R14: 00000000004d2668 R15: 0000000000000005 [ 342.672711] Unknown ioctl 21531 [ 343.055156] kobject: 'rx-1' (000000000f319fed): kobject_cleanup, parent 0000000003933458 [ 343.055228] kobject: 'loop2' (000000005ea5b0d8): kobject_uevent_env [ 343.063819] kobject: 'rx-1' (000000000f319fed): auto cleanup 'remove' event [ 343.073943] kobject: 'loop2' (000000005ea5b0d8): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 343.077342] kobject: 'rx-1' (000000000f319fed): kobject_uevent_env [ 343.093063] kobject: 'rx-1' (000000000f319fed): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-1' [ 343.099517] kobject: 'loop1' (00000000de8e11f6): kobject_uevent_env [ 343.112106] kobject: 'rx-1' (000000000f319fed): auto cleanup kobject_del [ 343.112728] kobject: 'loop1' (00000000de8e11f6): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 343.118980] kobject: 'rx-1' (000000000f319fed): calling ktype release [ 343.118986] kobject: 'rx-1': free name [ 343.139717] kobject: 'loop2' (000000005ea5b0d8): kobject_uevent_env [ 343.140568] kobject: 'batman_adv' (000000005bd0ae96): kobject_uevent_env [ 343.146190] kobject: 'loop2' (000000005ea5b0d8): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 343.167490] kobject: 'batman_adv' (000000005bd0ae96): kobject_uevent_env: filter function caused the event to drop! [ 343.178501] kobject: 'batman_adv' (000000005bd0ae96): kobject_cleanup, parent (null) [ 343.197752] kobject: 'batman_adv' (000000005bd0ae96): calling ktype release [ 343.216327] kobject: (000000005bd0ae96): dynamic_kobj_release [ 343.222682] kobject: 'batman_adv': free name [ 343.237617] Unknown ioctl 21531 [ 343.242815] kobject: 'rx-0' (0000000001f10a4a): kobject_cleanup, parent 0000000003933458 [ 343.256809] kobject: 'rx-0' (0000000001f10a4a): auto cleanup 'remove' event [ 343.266881] kobject: 'rx-0' (0000000001f10a4a): kobject_uevent_env [ 343.273629] kobject: 'rx-0' (0000000001f10a4a): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 343.284449] kobject: 'rx-0' (0000000001f10a4a): auto cleanup kobject_del [ 343.291447] kobject: 'rx-0' (0000000001f10a4a): calling ktype release [ 343.298443] kobject: 'rx-0': free name [ 343.302730] kobject: 'tx-0' (0000000011421ac9): kobject_cleanup, parent 0000000003933458 [ 343.311087] kobject: 'tx-0' (0000000011421ac9): auto cleanup 'remove' event [ 343.318397] kobject: 'tx-0' (0000000011421ac9): kobject_uevent_env [ 343.324890] kobject: 'tx-0' (0000000011421ac9): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 343.335400] kobject: 'tx-0' (0000000011421ac9): auto cleanup kobject_del [ 343.342359] kobject: 'tx-0' (0000000011421ac9): calling ktype release [ 343.348961] kobject: 'tx-0': free name [ 343.352917] kobject: 'queues' (0000000003933458): kobject_cleanup, parent (null) [ 343.361320] kobject: 'queues' (0000000003933458): calling ktype release [ 343.368133] kobject: 'queues' (0000000003933458): kset_release [ 343.374132] kobject: 'queues': free name [ 343.378414] kobject: 'vet' (000000005cb0e6b0): kobject_uevent_env [ 343.384723] kobject: 'vet' (000000005cb0e6b0): fill_kobj_path: path = '/devices/virtual/net/vet' [ 343.403977] kobject: 'loop5' (000000006fab86f3): kobject_uevent_env 14:19:38 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000012) 14:19:38 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4b47, &(0x7f00000002c0)={0x7, 0x2000000013}) 14:19:38 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x3) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x2, 0x0) ioctl$TIOCGSOFTCAR(r3, 0x5419, &(0x7f0000000200)) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000480)='./file0\x00', 0xe800, 0x1, &(0x7f00000004c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r4 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r4, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='/dev/zero\x00', r4}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) r6 = getpgrp(r2) kcmp$KCMP_EPOLL_TFD(r2, r6, 0x7, r5, &(0x7f0000000440)={r4, r4, 0x3}) ioctl$DRM_IOCTL_SG_FREE(r4, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getsockopt$bt_hci(r3, 0x0, 0x0, &(0x7f0000000380)=""/186, &(0x7f0000000240)=0xba) ioctl$KVM_ASSIGN_SET_MSIX_NR(r7, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r7, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r7, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:38 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x2, &(0x7f00000002c0)={0x7, 0x2000000013}) 14:19:38 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4) ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f00000000c0)={0x5, [0x2, 0x8, 0x6, 0x5, 0xed28]}) [ 343.410495] kobject: 'loop5' (000000006fab86f3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 343.434848] kobject: 'vet' (000000005cb0e6b0): kobject_cleanup, parent (null) [ 343.443156] kobject: 'vet' (000000005cb0e6b0): calling ktype release [ 343.449691] kobject: 'vet': free name 14:19:38 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x2, &(0x7f00000002c0)={0x7, 0x2000000013}) [ 343.479719] kobject: 'loop4' (0000000057d6f79a): kobject_uevent_env [ 343.497506] kobject: 'loop4' (0000000057d6f79a): fill_kobj_path: path = '/devices/virtual/block/loop4' 14:19:38 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4b49, &(0x7f00000002c0)={0x7, 0x2000000013}) 14:19:38 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) mq_notify(r1, &(0x7f0000000300)={0x0, 0x32, 0x1, @tid=r2}) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/attr/fscreate\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x50, &(0x7f00000000c0)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)=r3, 0x4) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000000)=0x24) fsetxattr$trusted_overlay_opaque(r4, &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) poll(&(0x7f0000000080)=[{r5}], 0x1, 0x2) [ 343.536743] kobject: 'loop2' (000000005ea5b0d8): kobject_uevent_env [ 343.544395] kobject: 'vet' (00000000ce9121f4): kobject_add_internal: parent: 'net', set: 'devices' [ 343.560300] kobject: 'loop2' (000000005ea5b0d8): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 343.574738] kobject: 'vet' (00000000ce9121f4): kobject_uevent_env 14:19:38 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x2, &(0x7f00000002c0)={0x7, 0x2000000013}) [ 343.581962] kobject: 'loop3' (0000000088a8e4c2): kobject_uevent_env [ 343.592236] kobject: 'loop3' (0000000088a8e4c2): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 343.602507] kobject: 'vet' (00000000ce9121f4): fill_kobj_path: path = '/devices/virtual/net/vet' [ 343.614724] kobject: 'loop0' (0000000057383183): kobject_uevent_env [ 343.621935] kobject: 'loop0' (0000000057383183): fill_kobj_path: path = '/devices/virtual/block/loop0' 14:19:38 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x541b, &(0x7f00000002c0)={0x7, 0x2000000013}) 14:19:38 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 343.644523] kobject: 'queues' (00000000ffc11158): kobject_add_internal: parent: 'vet', set: '' [ 343.666936] kobject: 'loop5' (000000006fab86f3): kobject_uevent_env [ 343.678465] kobject: 'queues' (00000000ffc11158): kobject_uevent_env 14:19:38 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) dup(r0) [ 343.689501] kobject: 'loop5' (000000006fab86f3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 343.701838] kobject: 'queues' (00000000ffc11158): kobject_uevent_env: filter function caused the event to drop! [ 343.717155] kobject: 'loop3' (0000000088a8e4c2): kobject_uevent_env [ 343.724160] kobject: 'loop3' (0000000088a8e4c2): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 343.733991] kobject: 'rx-0' (0000000038bd4541): kobject_add_internal: parent: 'queues', set: 'queues' [ 343.745172] kobject: 'loop0' (0000000057383183): kobject_uevent_env [ 343.751767] kobject: 'rx-0' (0000000038bd4541): kobject_uevent_env [ 343.758576] kobject: 'loop0' (0000000057383183): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 343.771668] kobject: 'rx-0' (0000000038bd4541): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 343.781385] kobject: 'loop2' (000000005ea5b0d8): kobject_uevent_env [ 343.790854] kobject: 'loop2' (000000005ea5b0d8): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 343.791769] kobject: 'tx-0' (00000000b0155482): kobject_add_internal: parent: 'queues', set: 'queues' [ 343.808878] kobject: 'loop1' (00000000de8e11f6): kobject_uevent_env [ 343.810799] kobject: 'tx-0' (00000000b0155482): kobject_uevent_env [ 343.817448] kobject: 'loop1' (00000000de8e11f6): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 343.823030] kobject: 'tx-0' (00000000b0155482): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 343.836311] kobject: 'loop0' (0000000057383183): kobject_uevent_env [ 343.843820] kobject: 'batman_adv' (00000000354b691d): kobject_add_internal: parent: 'vet', set: '' [ 343.849408] kobject: 'loop0' (0000000057383183): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 343.859356] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=12292 comm=syz-executor4 [ 343.878774] kobject: 'loop2' (000000005ea5b0d8): kobject_uevent_env [ 343.889063] kobject: 'loop2' (000000005ea5b0d8): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 343.915048] kobject: 'tx-1' (000000001e8fbab0): kobject_add_internal: parent: 'queues', set: 'queues' [ 343.929326] kobject: 'tx-1' (000000001e8fbab0): kobject_uevent_env [ 343.948084] kobject: 'tx-1' (000000001e8fbab0): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-1' [ 343.964268] kobject: 'rx-1' (00000000ba9d999b): kobject_add_internal: parent: 'queues', set: 'queues' [ 343.974718] kobject: 'rx-1' (00000000ba9d999b): kobject_uevent_env [ 343.985652] kobject: 'rx-1' (00000000ba9d999b): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-1' [ 343.996708] kobject: 'tx-1' (000000001e8fbab0): kobject_cleanup, parent 00000000ffc11158 [ 344.005189] kobject: 'tx-1' (000000001e8fbab0): auto cleanup 'remove' event [ 344.012597] kobject: 'tx-1' (000000001e8fbab0): kobject_uevent_env [ 344.018919] kobject: 'tx-1' (000000001e8fbab0): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-1' [ 344.029316] kobject: 'tx-1' (000000001e8fbab0): auto cleanup kobject_del [ 344.036216] kobject: 'tx-1' (000000001e8fbab0): calling ktype release [ 344.042831] kobject: 'tx-1': free name [ 344.046990] kobject: 'rx-1' (00000000ba9d999b): kobject_cleanup, parent 00000000ffc11158 [ 344.055258] kobject: 'rx-1' (00000000ba9d999b): auto cleanup 'remove' event [ 344.062535] kobject: 'rx-1' (00000000ba9d999b): kobject_uevent_env [ 344.068881] kobject: 'rx-1' (00000000ba9d999b): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-1' [ 344.079166] kobject: 'rx-1' (00000000ba9d999b): auto cleanup kobject_del [ 344.086034] kobject: 'rx-1' (00000000ba9d999b): calling ktype release [ 344.092636] kobject: 'rx-1': free name [ 344.097359] kobject: 'batman_adv' (00000000354b691d): kobject_uevent_env [ 344.104275] kobject: 'batman_adv' (00000000354b691d): kobject_uevent_env: filter function caused the event to drop! [ 344.114909] kobject: 'batman_adv' (00000000354b691d): kobject_cleanup, parent (null) [ 344.123713] kobject: 'batman_adv' (00000000354b691d): calling ktype release [ 344.130818] kobject: (00000000354b691d): dynamic_kobj_release [ 344.136733] kobject: 'batman_adv': free name [ 344.141278] kobject: 'rx-0' (0000000038bd4541): kobject_cleanup, parent 00000000ffc11158 [ 344.149557] kobject: 'rx-0' (0000000038bd4541): auto cleanup 'remove' event [ 344.156800] kobject: 'rx-0' (0000000038bd4541): kobject_uevent_env [ 344.163181] kobject: 'rx-0' (0000000038bd4541): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 344.173285] kobject: 'rx-0' (0000000038bd4541): auto cleanup kobject_del [ 344.180159] kobject: 'rx-0' (0000000038bd4541): calling ktype release [ 344.186776] kobject: 'rx-0': free name [ 344.190706] kobject: 'tx-0' (00000000b0155482): kobject_cleanup, parent 00000000ffc11158 [ 344.198995] kobject: 'tx-0' (00000000b0155482): auto cleanup 'remove' event [ 344.206144] kobject: 'tx-0' (00000000b0155482): kobject_uevent_env [ 344.212582] kobject: 'tx-0' (00000000b0155482): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 344.222739] kobject: 'tx-0' (00000000b0155482): auto cleanup kobject_del [ 344.229612] kobject: 'tx-0' (00000000b0155482): calling ktype release [ 344.236243] kobject: 'tx-0': free name [ 344.240139] kobject: 'queues' (00000000ffc11158): kobject_cleanup, parent (null) [ 344.248600] kobject: 'queues' (00000000ffc11158): calling ktype release [ 344.255379] kobject: 'queues' (00000000ffc11158): kset_release [ 344.261357] kobject: 'queues': free name [ 344.265795] kobject: 'vet' (00000000ce9121f4): kobject_uevent_env [ 344.272107] kobject: 'vet' (00000000ce9121f4): fill_kobj_path: path = '/devices/virtual/net/vet' 14:19:39 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000025) 14:19:39 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x5421, &(0x7f00000002c0)={0x7, 0x2000000013}) 14:19:39 executing program 3: syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) 14:19:39 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x408001, 0x0) ioctl$KVM_X86_SET_MCE(r1, 0x4040ae9e, &(0x7f0000000200)={0xc00000000000000, 0x0, 0x100000000, 0x1, 0xf}) fchdir(r0) removexattr(0x0, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r2, 0x0, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000140)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r4 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x800, 0x0, &(0x7f0000000240)="d23acef8f6e85224401c40859004cd0b620ab2284055de45431158b1", &(0x7f0000000440)="5ff243516d25f63608b875be66949e343e4467f01b973a6ef46efe143387613065aea356ca1c307ffea3c74b73f3d20a2ca0d8b8dd6d053ffb9efa086e03fe140b634400fd3dd9c427a3c81fceedb73751aa07ab639dad6c4aa191a83768958fbad1504443ca31ce1d729a856fe6a4bfcdf844fe3af4f70ecb744cf90945d7b25382724245af62c64f51d623811ddea49cd5c68de37f3df86cdb1c2371df7d1c313c96e930ee77c611cdcc1e168849", 0x1c, 0xaf}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r4, 0xc0a85352, &(0x7f0000000380)={{0x3, 0xffffffff}, 'port0\x00', 0x20, 0x4, 0xd61, 0x9, 0x0, 0x6, 0x81, 0x0, 0x0, 0x3f}) pread64(r2, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) write$uinput_user_dev(r4, &(0x7f00000008c0)={'syz1\x00', {0x6, 0x5, 0xffff, 0x3}, 0x42, [0xd4, 0x0, 0x9, 0x100000001, 0x7, 0x4, 0x9, 0x3ff, 0x3cf5d3f4, 0x1, 0x1, 0x2, 0x9, 0x5, 0x77, 0x0, 0x3ff, 0x200, 0xff, 0x9, 0x61, 0x7, 0x42, 0x4, 0x0, 0x5, 0x7, 0xd8, 0x3, 0x10000, 0x5, 0xe1, 0x5, 0x4, 0x6, 0x0, 0x8001, 0x9, 0x1, 0xfffffffffffffffd, 0x1000, 0x80, 0x55, 0x6, 0x4, 0xfa4, 0x8, 0x401, 0xff, 0xfc, 0x4, 0x3f, 0x1, 0x81, 0x2, 0x0, 0x1, 0x6, 0x35a, 0x200, 0x6, 0x2, 0x40, 0x5], [0x8, 0x0, 0x3f68, 0x5, 0x3ff, 0x5, 0x7, 0x1000, 0x4, 0x4, 0x330, 0x1, 0xa, 0x2b, 0x10000, 0x10001, 0x7, 0x8, 0x2, 0x5, 0x7, 0x5, 0x1, 0x1, 0x0, 0xffffffffffffffc0, 0x20, 0x6, 0x40, 0xdd5, 0xfffffffffffffffb, 0x101, 0x3, 0x933a, 0x1, 0x1, 0x3, 0x4, 0x2, 0x22b0, 0x40, 0x6, 0x5537468c, 0x0, 0x0, 0x8, 0x1, 0xfffffffffffffffa, 0xfffffffffffff001, 0x1, 0x39b, 0xfff, 0x8, 0x5, 0x3, 0x8001, 0x8001, 0x4, 0x92, 0x3, 0x9, 0x43, 0x5, 0x920], [0x10000, 0x0, 0x8, 0x333a, 0xbd55, 0x1, 0x1f1, 0x5, 0x9, 0x7, 0x80000000, 0x5, 0x5, 0x702f4ea1, 0x100, 0x41cdae05, 0xa5f, 0x9, 0xd1e, 0xf06c, 0x8, 0x7, 0x4, 0xff0, 0xffffffff, 0x200, 0x80000000, 0x0, 0xb1, 0x3, 0xffffffffffffffff, 0x1, 0x1ff, 0x8000, 0x101, 0x4, 0xbe, 0xeb55, 0x5, 0xfff, 0x1, 0x7, 0x0, 0x48000, 0x3, 0x401, 0xfffffffffffffffe, 0x1ff, 0xc9bf, 0xff, 0xff, 0xfffffffffffffff9, 0x9, 0x3, 0x23, 0x6, 0x2, 0x7fffffff, 0xfffffffffffffbff, 0x8, 0x2, 0x7, 0xfffffffffffffff7, 0xc5], [0x400, 0x7c, 0x0, 0x7, 0x1f, 0x800, 0x3, 0x7, 0x4, 0x1000, 0x400, 0x7, 0x1, 0x1, 0xfff, 0x3, 0x5c8, 0xc3e6, 0xff, 0x3, 0x0, 0xffff, 0x8, 0x80000000, 0x5, 0x89, 0xfffffffffffffffd, 0x9, 0x9, 0xfffffffffffffffc, 0x0, 0xfb, 0x3, 0x3f, 0x4, 0x100000000, 0x0, 0x5f, 0x2, 0x3, 0xf92, 0xff, 0x5, 0x7, 0x400, 0x7, 0x6, 0x7, 0x4, 0x80000000, 0x3, 0x1000, 0x7, 0x401, 0xff, 0x400, 0x6, 0x0, 0x3, 0xb7, 0x0, 0x642, 0xff, 0x2123]}, 0x45c) ioctl$DRM_IOCTL_SG_FREE(r4, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r5, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r5, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r5, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r3, 0x7) 14:19:39 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x9, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f00000000c0), &(0x7f0000000100)=0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x862) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) [ 344.312254] kobject: 'vet' (00000000ce9121f4): kobject_cleanup, parent (null) [ 344.320466] kobject: 'vet' (00000000ce9121f4): calling ktype release [ 344.327066] kobject: 'vet': free name 14:19:39 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x5450, &(0x7f00000002c0)={0x7, 0x2000000013}) [ 344.354346] kobject: 'loop4' (0000000057d6f79a): kobject_uevent_env [ 344.366202] kobject: 'loop4' (0000000057d6f79a): fill_kobj_path: path = '/devices/virtual/block/loop4' 14:19:39 executing program 3: syz_open_dev$dri(0x0, 0x1, 0x0) 14:19:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_TSC(0x1a, 0x1) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20004) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000000)=0x51b) poll(&(0x7f0000000040), 0x2000000000000053, 0x608) [ 344.404201] kobject: 'vet' (000000000225341c): kobject_add_internal: parent: 'net', set: 'devices' [ 344.413817] kobject: 'loop2' (000000005ea5b0d8): kobject_uevent_env [ 344.438400] kobject: 'loop2' (000000005ea5b0d8): fill_kobj_path: path = '/devices/virtual/block/loop2' 14:19:39 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) r3 = add_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f00000002c0)="0b232be83127c525d92c4c59e3fe6b86e98bbfcfb5ee68a7b96cb5d23632dc0abb93247e710d480c031179cbc8030f7a32e0496894b610139ce099e41a60fed7ad7206ad59e4981918a4d55784ecd96abeede26cd98e2c2af8967e1ef29fddb1f95a9d0c06ed8b930b64c0a997940212", 0x70, 0xfffffffffffffffc) keyctl$clear(0x7, r3) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r4 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x200, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x6, 0x1, &(0x7f0000000380), 0x4) ioctl$KVM_GET_NESTED_STATE(r5, 0xc080aebe, &(0x7f00000008c0)={0x0, 0x0, 0x2080}) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r4, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r6, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r6, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r6, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) [ 344.458703] kobject: 'vet' (000000000225341c): kobject_uevent_env [ 344.465456] kobject: 'loop0' (0000000057383183): kobject_uevent_env [ 344.479379] kobject: 'loop0' (0000000057383183): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 344.483518] kobject: 'vet' (000000000225341c): fill_kobj_path: path = '/devices/virtual/net/vet' [ 344.498585] kobject: 'queues' (000000003bf80274): kobject_add_internal: parent: 'vet', set: '' 14:19:39 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x5451, &(0x7f00000002c0)={0x7, 0x2000000013}) 14:19:39 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:39 executing program 3: syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) [ 344.524484] kobject: 'loop3' (0000000088a8e4c2): kobject_uevent_env [ 344.546460] kobject: 'queues' (000000003bf80274): kobject_uevent_env [ 344.552627] kobject: 'loop3' (0000000088a8e4c2): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 344.582856] kobject: 'loop5' (000000006fab86f3): kobject_uevent_env [ 344.585327] kobject: 'queues' (000000003bf80274): kobject_uevent_env: filter function caused the event to drop! [ 344.595116] kobject: 'loop5' (000000006fab86f3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 344.625485] kobject: 'loop0' (0000000057383183): kobject_uevent_env [ 344.635717] kobject: 'loop0' (0000000057383183): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 344.651253] kobject: 'loop1' (00000000de8e11f6): kobject_uevent_env [ 344.658796] kobject: 'loop1' (00000000de8e11f6): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 344.662167] kobject: 'rx-0' (000000005d4ad000): kobject_add_internal: parent: 'queues', set: 'queues' [ 344.671583] kobject: 'loop2' (000000005ea5b0d8): kobject_uevent_env [ 344.690709] kobject: 'rx-0' (000000005d4ad000): kobject_uevent_env [ 344.692743] kobject: 'loop2' (000000005ea5b0d8): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 344.697215] kobject: 'rx-0' (000000005d4ad000): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 344.710741] kobject: 'loop3' (0000000088a8e4c2): kobject_uevent_env [ 344.716919] kobject: 'tx-0' (00000000da9b6873): kobject_add_internal: parent: 'queues', set: 'queues' [ 344.723825] kobject: 'loop3' (0000000088a8e4c2): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 344.733536] kobject: 'tx-0' (00000000da9b6873): kobject_uevent_env [ 344.746304] kobject: 'loop2' (000000005ea5b0d8): kobject_uevent_env [ 344.748814] kobject: 'tx-0' (00000000da9b6873): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 344.755453] kobject: 'loop2' (000000005ea5b0d8): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 344.766269] kobject: 'batman_adv' (00000000644f2674): kobject_add_internal: parent: 'vet', set: '' [ 344.779106] kobject: 'loop3' (0000000088a8e4c2): kobject_uevent_env [ 344.789530] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=12335 comm=syz-executor4 [ 344.794475] kobject: 'loop3' (0000000088a8e4c2): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 344.819868] kobject: 'loop0' (0000000057383183): kobject_uevent_env [ 344.828954] kobject: 'loop0' (0000000057383183): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 344.835463] kobject: 'tx-1' (0000000022680981): kobject_add_internal: parent: 'queues', set: 'queues' [ 344.840928] kobject: 'loop2' (000000005ea5b0d8): kobject_uevent_env [ 344.849596] kobject: 'tx-1' (0000000022680981): kobject_uevent_env [ 344.857365] kobject: 'loop2' (000000005ea5b0d8): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 344.861366] kobject: 'tx-1' (0000000022680981): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-1' [ 344.871760] kobject: 'loop5' (000000006fab86f3): kobject_uevent_env [ 344.880850] kobject: 'rx-1' (000000009b7ed90f): kobject_add_internal: parent: 'queues', set: 'queues' [ 344.897603] kobject: 'rx-1' (000000009b7ed90f): kobject_uevent_env [ 344.904257] kobject: 'rx-1' (000000009b7ed90f): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-1' [ 344.909861] kobject: 'loop5' (000000006fab86f3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 344.924130] kobject: 'tx-1' (0000000022680981): kobject_cleanup, parent 000000003bf80274 [ 344.949143] kobject: 'tx-1' (0000000022680981): auto cleanup 'remove' event [ 344.958460] kobject: 'tx-1' (0000000022680981): kobject_uevent_env [ 344.981238] kobject: 'tx-1' (0000000022680981): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-1' [ 345.004070] kobject: 'tx-1' (0000000022680981): auto cleanup kobject_del [ 345.011507] kobject: 'tx-1' (0000000022680981): calling ktype release [ 345.018903] kobject: 'tx-1': free name [ 345.023340] kobject: 'rx-1' (000000009b7ed90f): kobject_cleanup, parent 000000003bf80274 [ 345.032120] kobject: 'rx-1' (000000009b7ed90f): auto cleanup 'remove' event [ 345.039379] kobject: 'rx-1' (000000009b7ed90f): kobject_uevent_env [ 345.045957] kobject: 'rx-1' (000000009b7ed90f): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-1' [ 345.056253] kobject: 'rx-1' (000000009b7ed90f): auto cleanup kobject_del [ 345.063163] kobject: 'rx-1' (000000009b7ed90f): calling ktype release [ 345.069737] kobject: 'rx-1': free name [ 345.074630] kobject: 'batman_adv' (00000000644f2674): kobject_uevent_env [ 345.081474] kobject: 'batman_adv' (00000000644f2674): kobject_uevent_env: filter function caused the event to drop! [ 345.092267] kobject: 'batman_adv' (00000000644f2674): kobject_cleanup, parent (null) [ 345.101022] kobject: 'batman_adv' (00000000644f2674): calling ktype release [ 345.108187] kobject: (00000000644f2674): dynamic_kobj_release [ 345.114106] kobject: 'batman_adv': free name [ 345.118655] kobject: 'rx-0' (000000005d4ad000): kobject_cleanup, parent 000000003bf80274 [ 345.126937] kobject: 'rx-0' (000000005d4ad000): auto cleanup 'remove' event [ 345.134186] kobject: 'rx-0' (000000005d4ad000): kobject_uevent_env [ 345.140507] kobject: 'rx-0' (000000005d4ad000): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 345.150662] kobject: 'rx-0' (000000005d4ad000): auto cleanup kobject_del [ 345.157543] kobject: 'rx-0' (000000005d4ad000): calling ktype release [ 345.164285] kobject: 'rx-0': free name [ 345.168194] kobject: 'tx-0' (00000000da9b6873): kobject_cleanup, parent 000000003bf80274 [ 345.176450] kobject: 'tx-0' (00000000da9b6873): auto cleanup 'remove' event [ 345.183602] kobject: 'tx-0' (00000000da9b6873): kobject_uevent_env [ 345.189935] kobject: 'tx-0' (00000000da9b6873): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 345.200086] kobject: 'tx-0' (00000000da9b6873): auto cleanup kobject_del [ 345.207001] kobject: 'tx-0' (00000000da9b6873): calling ktype release [ 345.213665] kobject: 'tx-0': free name [ 345.217572] kobject: 'queues' (000000003bf80274): kobject_cleanup, parent (null) [ 345.225996] kobject: 'queues' (000000003bf80274): calling ktype release [ 345.233024] kobject: 'queues' (000000003bf80274): kset_release [ 345.239019] kobject: 'queues': free name [ 345.243507] kobject: 'vet' (000000000225341c): kobject_uevent_env [ 345.249761] kobject: 'vet' (000000000225341c): fill_kobj_path: path = '/devices/virtual/net/vet' 14:19:40 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000035) 14:19:40 executing program 3: syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) 14:19:40 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:40 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x5452, &(0x7f00000002c0)={0x7, 0x2000000013}) 14:19:40 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000240)={0x4, &(0x7f0000000100)="14cf622c3f5f59397f94de808f03ba70d454d33280734dd49f4f5f97982fe44265bcf8c2df15cc52be989ad9dcfe8503cf2fe35062038661d299022ce03f91a795da29b91a59069dd7babfac4fc5937d9a629f23"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r2}], 0x1, 0x2) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f00000001c0)={&(0x7f0000000040)=[0x3, 0x100000001], 0x2, 0x8, 0x1, 0x7fffffff, 0xbb5, 0x8, {0xfff, 0x9, 0x2, 0x3, 0x0, 0x3, 0x101, 0x9, 0xffffffffffffffff, 0x100000001, 0x6, 0x6, 0x0, 0x0, "52da200496460366219563f1ea8bd80f971b7f16fe08bf885960840e48ea94d0"}}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000180)={0x3b, 0x202, 0xfffffffffffff801, 0x1f, 0x0}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000300)={r3, 0x199}, &(0x7f0000000340)=0x8) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) [ 345.312358] kobject: 'vet' (000000000225341c): kobject_cleanup, parent (null) [ 345.320536] kobject: 'vet' (000000000225341c): calling ktype release [ 345.327159] kobject: 'vet': free name 14:19:40 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 345.357122] kobject: 'loop4' (0000000057d6f79a): kobject_uevent_env [ 345.367063] kobject: 'loop4' (0000000057d6f79a): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 345.393375] kobject: 'vet' (00000000c622e7db): kobject_add_internal: parent: 'net', set: 'devices' 14:19:40 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x5460, &(0x7f00000002c0)={0x7, 0x2000000013}) 14:19:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r2}], 0x1, 0x2) fcntl$setstatus(r0, 0x4, 0x2400) 14:19:40 executing program 3: syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) [ 345.422692] kobject: 'loop2' (000000005ea5b0d8): kobject_uevent_env [ 345.429137] kobject: 'loop2' (000000005ea5b0d8): fill_kobj_path: path = '/devices/virtual/block/loop2' 14:19:40 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x102000003) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) [ 345.463406] kobject: 'vet' (00000000c622e7db): kobject_uevent_env [ 345.467670] kobject: 'loop1' (00000000de8e11f6): kobject_uevent_env [ 345.494232] kobject: 'vet' (00000000c622e7db): fill_kobj_path: path = '/devices/virtual/net/vet' [ 345.503877] kobject: 'loop1' (00000000de8e11f6): fill_kobj_path: path = '/devices/virtual/block/loop1' 14:19:40 executing program 3: syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) 14:19:40 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x40049409, &(0x7f00000002c0)={0x7, 0x2000000013}) [ 345.511452] kobject: 'queues' (0000000045c3d424): kobject_add_internal: parent: 'vet', set: '' [ 345.537736] kobject: 'loop2' (000000005ea5b0d8): kobject_uevent_env [ 345.543749] kobject: 'queues' (0000000045c3d424): kobject_uevent_env [ 345.558747] kobject: 'loop2' (000000005ea5b0d8): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 345.574539] kobject: 'queues' (0000000045c3d424): kobject_uevent_env: filter function caused the event to drop! [ 345.595045] kobject: 'loop5' (000000006fab86f3): kobject_uevent_env [ 345.610222] kobject: 'loop5' (000000006fab86f3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 345.623787] kobject: 'rx-0' (000000003950d522): kobject_add_internal: parent: 'queues', set: 'queues' [ 345.627770] kobject: 'loop0' (0000000057383183): kobject_uevent_env [ 345.637304] kobject: 'rx-0' (000000003950d522): kobject_uevent_env [ 345.639709] kobject: 'loop0' (0000000057383183): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 345.646211] kobject: 'rx-0' (000000003950d522): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 345.659000] kobject: 'loop3' (0000000088a8e4c2): kobject_uevent_env [ 345.665841] kobject: 'tx-0' (0000000015c2a610): kobject_add_internal: parent: 'queues', set: 'queues' [ 345.672995] kobject: 'loop3' (0000000088a8e4c2): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 345.681796] kobject: 'tx-0' (0000000015c2a610): kobject_uevent_env [ 345.694370] kobject: 'loop3' (0000000088a8e4c2): kobject_uevent_env [ 345.697799] kobject: 'tx-0' (0000000015c2a610): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 345.704241] kobject: 'loop3' (0000000088a8e4c2): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 345.714878] kobject: 'batman_adv' (000000003ee21663): kobject_add_internal: parent: 'vet', set: '' [ 345.726929] kobject: 'loop0' (0000000057383183): kobject_uevent_env [ 345.734075] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=12380 comm=syz-executor4 [ 345.740147] kobject: 'loop0' (0000000057383183): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 345.760653] kobject: 'tx-1' (0000000065e07dd8): kobject_add_internal: parent: 'queues', set: 'queues' [ 345.763033] kobject: 'loop3' (0000000088a8e4c2): kobject_uevent_env [ 345.778896] kobject: 'tx-1' (0000000065e07dd8): kobject_uevent_env [ 345.780478] kobject: 'loop3' (0000000088a8e4c2): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 345.796391] kobject: 'loop0' (0000000057383183): kobject_uevent_env [ 345.799466] kobject: 'tx-1' (0000000065e07dd8): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-1' [ 345.802875] kobject: 'loop0' (0000000057383183): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 345.813488] kobject: 'rx-1' (00000000506beb87): kobject_add_internal: parent: 'queues', set: 'queues' [ 345.840506] kobject: 'rx-1' (00000000506beb87): kobject_uevent_env [ 345.851012] kobject: 'rx-1' (00000000506beb87): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-1' [ 345.894431] kobject: 'tx-1' (0000000065e07dd8): kobject_cleanup, parent 0000000045c3d424 [ 345.907461] kobject: 'tx-1' (0000000065e07dd8): auto cleanup 'remove' event [ 345.917442] kobject: 'loop5' (000000006fab86f3): kobject_uevent_env [ 345.926595] kobject: 'tx-1' (0000000065e07dd8): kobject_uevent_env [ 345.927526] kobject: 'loop5' (000000006fab86f3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 345.939365] kobject: 'tx-1' (0000000065e07dd8): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-1' [ 345.954924] kobject: 'tx-1' (0000000065e07dd8): auto cleanup kobject_del [ 345.961990] kobject: 'tx-1' (0000000065e07dd8): calling ktype release [ 345.968925] kobject: 'tx-1': free name [ 345.973159] kobject: 'rx-1' (00000000506beb87): kobject_cleanup, parent 0000000045c3d424 [ 345.981436] kobject: 'rx-1' (00000000506beb87): auto cleanup 'remove' event [ 345.988841] kobject: 'rx-1' (00000000506beb87): kobject_uevent_env [ 345.995398] kobject: 'rx-1' (00000000506beb87): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-1' [ 346.005575] kobject: 'rx-1' (00000000506beb87): auto cleanup kobject_del [ 346.012477] kobject: 'rx-1' (00000000506beb87): calling ktype release [ 346.019062] kobject: 'rx-1': free name [ 346.024267] kobject: 'batman_adv' (000000003ee21663): kobject_uevent_env [ 346.031127] kobject: 'batman_adv' (000000003ee21663): kobject_uevent_env: filter function caused the event to drop! [ 346.041770] kobject: 'batman_adv' (000000003ee21663): kobject_cleanup, parent (null) [ 346.050582] kobject: 'batman_adv' (000000003ee21663): calling ktype release [ 346.058054] kobject: (000000003ee21663): dynamic_kobj_release [ 346.063988] kobject: 'batman_adv': free name [ 346.068563] kobject: 'rx-0' (000000003950d522): kobject_cleanup, parent 0000000045c3d424 [ 346.077007] kobject: 'rx-0' (000000003950d522): auto cleanup 'remove' event [ 346.084162] kobject: 'rx-0' (000000003950d522): kobject_uevent_env [ 346.090501] kobject: 'rx-0' (000000003950d522): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 346.100698] kobject: 'rx-0' (000000003950d522): auto cleanup kobject_del [ 346.107686] kobject: 'rx-0' (000000003950d522): calling ktype release [ 346.114313] kobject: 'rx-0': free name [ 346.118227] kobject: 'tx-0' (0000000015c2a610): kobject_cleanup, parent 0000000045c3d424 [ 346.126495] kobject: 'tx-0' (0000000015c2a610): auto cleanup 'remove' event [ 346.133617] kobject: 'tx-0' (0000000015c2a610): kobject_uevent_env [ 346.140062] kobject: 'tx-0' (0000000015c2a610): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 346.150192] kobject: 'tx-0' (0000000015c2a610): auto cleanup kobject_del [ 346.157187] kobject: 'tx-0' (0000000015c2a610): calling ktype release [ 346.163809] kobject: 'tx-0': free name [ 346.167706] kobject: 'queues' (0000000045c3d424): kobject_cleanup, parent (null) [ 346.176130] kobject: 'queues' (0000000045c3d424): calling ktype release [ 346.183287] kobject: 'queues' (0000000045c3d424): kset_release [ 346.189281] kobject: 'queues': free name [ 346.193843] kobject: 'vet' (00000000c622e7db): kobject_uevent_env [ 346.200095] kobject: 'vet' (00000000c622e7db): fill_kobj_path: path = '/devices/virtual/net/vet' 14:19:41 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000063) 14:19:41 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() listxattr(&(0x7f0000000140)='.//ile0\x00', &(0x7f0000000200)=""/33, 0x21) sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) accept4$vsock_stream(r3, &(0x7f00000002c0)={0x28, 0x0, 0x2710, @reserved}, 0x10, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) connect$pptp(r4, &(0x7f0000000240)={0x18, 0x2, {0x3, @remote}}, 0x1e) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:41 executing program 3: syz_open_dev$dri(0x0, 0x0, 0x0) 14:19:41 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x40086602, &(0x7f00000002c0)={0x7, 0x2000000013}) 14:19:41 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000100)=ANY=[@ANYRES32=0x0, @ANYBLOB="34000000aacda997d0626ac01f09c492b801d3f8fe53f2bd99730d6b45c5e228a4087ed86669260b9c1d211c8c23d28d4249584273601bdd"], &(0x7f0000000140)=0x3c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000180)=ANY=[@ANYRES32=r2, @ANYBLOB="06005200f1a808ae40bfb39b768bb87bf1a83f7d67a39e1b429a253f7157e99624cfb4b292716841c238a97f4ec616ae1d0e07e94b3db6f3163f85e1437c479ee84e3bad94000000000000"], 0x5a) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCEXCL(r3, 0x540c) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000200)=0x24) poll(&(0x7f0000000080)=[{r3}], 0x1, 0x2) 14:19:41 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 346.242158] kobject: 'vet' (00000000c622e7db): kobject_cleanup, parent (null) [ 346.250680] kobject: 'vet' (00000000c622e7db): calling ktype release [ 346.257269] kobject: 'vet': free name [ 346.271068] kobject: 'loop1' (00000000de8e11f6): kobject_uevent_env 14:19:41 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000035) [ 346.306388] kobject: 'loop1' (00000000de8e11f6): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 346.328602] kobject: 'vet' (0000000021b014bf): kobject_add_internal: parent: 'net', set: 'devices' [ 346.346310] kobject: 'loop4' (0000000057d6f79a): kobject_uevent_env 14:19:41 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) 14:19:41 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x40087602, &(0x7f00000002c0)={0x7, 0x2000000013}) [ 346.369470] kobject: 'loop4' (0000000057d6f79a): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 346.383279] kobject: 'vet' (0000000021b014bf): kobject_uevent_env [ 346.404980] kobject: 'loop2' (000000005ea5b0d8): kobject_uevent_env 14:19:41 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) tee(r0, r1, 0xffffffffffffffc1, 0xa) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) [ 346.410110] kobject: 'vet' (0000000021b014bf): fill_kobj_path: path = '/devices/virtual/net/vet' [ 346.411421] kobject: 'loop2' (000000005ea5b0d8): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 346.428896] kobject: 'loop2' (000000005ea5b0d8): kobject_uevent_env [ 346.448473] kobject: 'loop2' (000000005ea5b0d8): fill_kobj_path: path = '/devices/virtual/block/loop2' 14:19:41 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aec9, &(0x7f00000002c0)={0x7, 0x2000000013}) [ 346.461713] kobject: 'queues' (000000006beae482): kobject_add_internal: parent: 'vet', set: '' [ 346.473784] kobject: 'queues' (000000006beae482): kobject_uevent_env [ 346.478764] kobject: 'loop3' (0000000088a8e4c2): kobject_uevent_env [ 346.480589] kobject: 'queues' (000000006beae482): kobject_uevent_env: filter function caused the event to drop! [ 346.498081] kobject: 'rx-0' (0000000015c0c9d7): kobject_add_internal: parent: 'queues', set: 'queues' [ 346.508680] kobject: 'rx-0' (0000000015c0c9d7): kobject_uevent_env 14:19:41 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4020940d, &(0x7f00000002c0)={0x7, 0x2000000013}) [ 346.514162] kobject: 'loop3' (0000000088a8e4c2): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 346.515673] kobject: 'rx-0' (0000000015c0c9d7): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 346.535081] kobject: 'tx-0' (00000000cb9bfc94): kobject_add_internal: parent: 'queues', set: 'queues' [ 346.545127] kobject: 'tx-0' (00000000cb9bfc94): kobject_uevent_env [ 346.546743] kobject: 'loop5' (000000006fab86f3): kobject_uevent_env [ 346.551699] kobject: 'tx-0' (00000000cb9bfc94): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 346.569664] kobject: 'batman_adv' (00000000e7448f97): kobject_add_internal: parent: 'vet', set: '' [ 346.574933] kobject: 'loop5' (000000006fab86f3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 346.580889] kobject: 'vet' (00000000d941ee23): kobject_add_internal: parent: 'net', set: 'devices' [ 346.601949] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=12428 comm=syz-executor4 [ 346.606447] kobject: 'loop0' (0000000057383183): kobject_uevent_env [ 346.619168] kobject: 'vet' (00000000d941ee23): kobject_uevent_env [ 346.628252] kobject: 'vet' (00000000d941ee23): fill_kobj_path: path = '/devices/virtual/net/vet' [ 346.633119] kobject: 'loop0' (0000000057383183): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 346.637680] kobject: 'queues' (00000000b98cca20): kobject_add_internal: parent: 'vet', set: '' [ 346.656693] kobject: 'queues' (00000000b98cca20): kobject_uevent_env [ 346.658860] kobject: 'loop0' (0000000057383183): kobject_uevent_env [ 346.664350] kobject: 'queues' (00000000b98cca20): kobject_uevent_env: filter function caused the event to drop! [ 346.674712] kobject: 'loop0' (0000000057383183): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 346.680379] kobject: 'rx-0' (00000000eded441f): kobject_add_internal: parent: 'queues', set: 'queues' [ 346.699247] kobject: 'rx-0' (00000000eded441f): kobject_uevent_env [ 346.701256] kobject: 'loop0' (0000000057383183): kobject_uevent_env [ 346.706318] kobject: 'rx-0' (00000000eded441f): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 346.714874] kobject: 'loop0' (0000000057383183): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 346.722689] kobject: 'tx-0' (0000000069f69b38): kobject_add_internal: parent: 'queues', set: 'queues' [ 346.732244] kobject: 'loop0' (0000000057383183): kobject_uevent_env [ 346.741705] kobject: 'tx-0' (0000000069f69b38): kobject_uevent_env [ 346.750651] kobject: 'loop0' (0000000057383183): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 346.754370] kobject: 'tx-0' (0000000069f69b38): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 346.784295] kobject: 'batman_adv' (00000000e1dbc7ce): kobject_add_internal: parent: 'vet', set: '' [ 346.805043] kobject: 'tx-1' (00000000aae12f45): kobject_add_internal: parent: 'queues', set: 'queues' [ 346.805110] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=12441 comm=syz-executor3 [ 346.824068] kobject: 'tx-1' (00000000aae12f45): kobject_uevent_env [ 346.841276] kobject: 'tx-1' (00000000aae12f45): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-1' [ 346.851801] kobject: 'rx-1' (000000002b721070): kobject_add_internal: parent: 'queues', set: 'queues' [ 346.868976] kobject: 'rx-1' (000000002b721070): kobject_uevent_env [ 346.875752] kobject: 'rx-1' (000000002b721070): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-1' [ 346.886401] kobject: 'tx-1' (00000000aae12f45): kobject_cleanup, parent 000000006beae482 [ 346.894750] kobject: 'tx-1' (00000000aae12f45): auto cleanup 'remove' event [ 346.901933] kobject: 'tx-1' (00000000aae12f45): kobject_uevent_env [ 346.908520] kobject: 'tx-1' (00000000aae12f45): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-1' [ 346.918820] kobject: 'tx-1' (00000000aae12f45): auto cleanup kobject_del [ 346.925779] kobject: 'tx-1' (00000000aae12f45): calling ktype release [ 346.932391] kobject: 'tx-1': free name [ 346.936412] kobject: 'rx-1' (000000002b721070): kobject_cleanup, parent 000000006beae482 [ 346.944687] kobject: 'rx-1' (000000002b721070): auto cleanup 'remove' event [ 346.951789] kobject: 'rx-1' (000000002b721070): kobject_uevent_env [ 346.958200] kobject: 'rx-1' (000000002b721070): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-1' [ 346.968311] kobject: 'rx-1' (000000002b721070): auto cleanup kobject_del [ 346.975198] kobject: 'rx-1' (000000002b721070): calling ktype release [ 346.981777] kobject: 'rx-1': free name [ 346.987861] kobject: 'batman_adv' (00000000e7448f97): kobject_uevent_env [ 346.994752] kobject: 'batman_adv' (00000000e7448f97): kobject_uevent_env: filter function caused the event to drop! [ 347.005400] kobject: 'batman_adv' (00000000e7448f97): kobject_cleanup, parent (null) [ 347.014220] kobject: 'batman_adv' (00000000e7448f97): calling ktype release [ 347.017792] kobject: 'loop5' (000000006fab86f3): kobject_uevent_env [ 347.021395] kobject: (00000000e7448f97): dynamic_kobj_release [ 347.034204] kobject: 'batman_adv': free name [ 347.037991] kobject: 'loop5' (000000006fab86f3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 347.049976] kobject: 'rx-0' (0000000015c0c9d7): kobject_cleanup, parent 000000006beae482 [ 347.058695] kobject: 'rx-0' (0000000015c0c9d7): auto cleanup 'remove' event [ 347.066223] kobject: 'rx-0' (0000000015c0c9d7): kobject_uevent_env [ 347.072916] kobject: 'rx-0' (0000000015c0c9d7): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 347.083329] kobject: 'rx-0' (0000000015c0c9d7): auto cleanup kobject_del [ 347.090280] kobject: 'rx-0' (0000000015c0c9d7): calling ktype release [ 347.097153] kobject: 'rx-0': free name [ 347.101160] kobject: 'tx-0' (00000000cb9bfc94): kobject_cleanup, parent 000000006beae482 [ 347.111289] kobject: 'tx-0' (00000000cb9bfc94): auto cleanup 'remove' event [ 347.117544] kobject: 'loop1' (00000000de8e11f6): kobject_uevent_env [ 347.118755] kobject: 'tx-0' (00000000cb9bfc94): kobject_uevent_env [ 347.129201] kobject: 'loop1' (00000000de8e11f6): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 347.131335] kobject: 'tx-0' (00000000cb9bfc94): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 347.151360] kobject: 'tx-0' (00000000cb9bfc94): auto cleanup kobject_del [ 347.158518] kobject: 'tx-0' (00000000cb9bfc94): calling ktype release [ 347.165256] kobject: 'tx-0': free name [ 347.169156] kobject: 'queues' (000000006beae482): kobject_cleanup, parent (null) [ 347.177638] kobject: 'queues' (000000006beae482): calling ktype release [ 347.184413] kobject: 'queues' (000000006beae482): kset_release [ 347.190453] kobject: 'queues': free name [ 347.194881] kobject: 'vet' (0000000021b014bf): kobject_uevent_env [ 347.201120] kobject: 'vet' (0000000021b014bf): fill_kobj_path: path = '/devices/virtual/net/vet' [ 347.211226] kobject: 'batman_adv' (00000000e1dbc7ce): kobject_uevent_env [ 347.218097] kobject: 'batman_adv' (00000000e1dbc7ce): kobject_uevent_env: filter function caused the event to drop! [ 347.228715] kobject: 'batman_adv' (00000000e1dbc7ce): kobject_cleanup, parent (null) [ 347.237512] kobject: 'batman_adv' (00000000e1dbc7ce): calling ktype release [ 347.244648] kobject: (00000000e1dbc7ce): dynamic_kobj_release [ 347.250527] kobject: 'batman_adv': free name [ 347.255273] kobject: 'rx-0' (00000000eded441f): kobject_cleanup, parent 00000000b98cca20 [ 347.263531] kobject: 'rx-0' (00000000eded441f): auto cleanup 'remove' event [ 347.270635] kobject: 'rx-0' (00000000eded441f): kobject_uevent_env [ 347.276997] kobject: 'rx-0' (00000000eded441f): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 347.287111] kobject: 'rx-0' (00000000eded441f): auto cleanup kobject_del [ 347.294013] kobject: 'rx-0' (00000000eded441f): calling ktype release [ 347.300625] kobject: 'rx-0': free name [ 347.304575] kobject: 'tx-0' (0000000069f69b38): kobject_cleanup, parent 00000000b98cca20 [ 347.313129] kobject: 'tx-0' (0000000069f69b38): auto cleanup 'remove' event [ 347.320218] kobject: 'tx-0' (0000000069f69b38): kobject_uevent_env [ 347.326591] kobject: 'tx-0' (0000000069f69b38): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 347.336907] kobject: 'tx-0' (0000000069f69b38): auto cleanup kobject_del [ 347.343826] kobject: 'tx-0' (0000000069f69b38): calling ktype release [ 347.350402] kobject: 'tx-0': free name [ 347.354325] kobject: 'queues' (00000000b98cca20): kobject_cleanup, parent (null) [ 347.362761] kobject: 'queues' (00000000b98cca20): calling ktype release 14:19:42 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x8000008b) 14:19:42 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@dev, @in=@loopback}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xe8) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r4 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r4, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r5, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r5, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r5, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:42 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x80086601, &(0x7f00000002c0)={0x7, 0x2000000013}) 14:19:42 executing program 5: r0 = accept$ax25(0xffffffffffffffff, &(0x7f00000000c0)={{0x3, @null}, [@default, @rose, @rose, @rose, @bcast, @rose, @null, @bcast]}, &(0x7f0000000040)=0x48) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) dup2(r0, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000000)=0x24) poll(&(0x7f0000000080)=[{r3}], 0x1, 0x2) 14:19:42 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 347.369600] kobject: 'queues' (00000000b98cca20): kset_release [ 347.375620] kobject: 'queues': free name [ 347.379893] kobject: 'vet' (00000000d941ee23): kobject_uevent_env [ 347.386169] kobject: 'vet' (00000000d941ee23): fill_kobj_path: path = '/devices/virtual/net/vet' [ 347.395284] kobject: 'vet' (0000000021b014bf): kobject_cleanup, parent (null) [ 347.404433] kobject: 'vet' (0000000021b014bf): calling ktype release [ 347.410923] kobject: 'vet': free name [ 347.433191] kobject: 'loop4' (0000000057d6f79a): kobject_uevent_env [ 347.439668] kobject: 'loop4' (0000000057d6f79a): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 347.448854] kobject: 'vet' (0000000026317c0f): kobject_add_internal: parent: 'net', set: 'devices' [ 347.468493] kobject: 'vet' (0000000026317c0f): kobject_uevent_env 14:19:42 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x80087601, &(0x7f00000002c0)={0x7, 0x2000000013}) [ 347.478497] kobject: 'vet' (0000000026317c0f): fill_kobj_path: path = '/devices/virtual/net/vet' [ 347.500056] kobject: 'loop2' (000000005ea5b0d8): kobject_uevent_env [ 347.508096] kobject: 'loop2' (000000005ea5b0d8): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 347.510151] kobject: 'queues' (0000000000702440): kobject_add_internal: parent: 'vet', set: '' [ 347.540825] kobject: 'loop0' (0000000057383183): kobject_uevent_env [ 347.549776] kobject: 'loop0' (0000000057383183): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 347.569934] kobject: 'loop2' (000000005ea5b0d8): kobject_uevent_env [ 347.577452] kobject: 'loop2' (000000005ea5b0d8): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 347.590472] kobject: 'loop0' (0000000057383183): kobject_uevent_env [ 347.593752] kobject: 'queues' (0000000000702440): kobject_uevent_env [ 347.597647] kobject: 'loop0' (0000000057383183): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 347.608931] kobject: 'queues' (0000000000702440): kobject_uevent_env: filter function caused the event to drop! [ 347.624475] kobject: 'loop2' (000000005ea5b0d8): kobject_uevent_env [ 347.626037] kobject: 'rx-0' (00000000bd4fa373): kobject_add_internal: parent: 'queues', set: 'queues' [ 347.638984] kobject: 'loop2' (000000005ea5b0d8): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 347.640717] kobject: 'rx-0' (00000000bd4fa373): kobject_uevent_env [ 347.656297] kobject: 'rx-0' (00000000bd4fa373): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 347.675468] kobject: 'tx-0' (0000000092411055): kobject_add_internal: parent: 'queues', set: 'queues' [ 347.685150] kobject: 'tx-0' (0000000092411055): kobject_uevent_env [ 347.691635] kobject: 'tx-0' (0000000092411055): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 347.702781] kobject: 'batman_adv' (00000000295b95d1): kobject_add_internal: parent: 'vet', set: '' [ 347.712904] kobject: 'vet' (00000000d941ee23): kobject_cleanup, parent (null) [ 347.724216] kobject: 'tx-1' (00000000f9c5d3f8): kobject_add_internal: parent: 'queues', set: 'queues' [ 347.732415] kobject: 'vet' (00000000d941ee23): calling ktype release [ 347.734109] kobject: 'tx-1' (00000000f9c5d3f8): kobject_uevent_env [ 347.742567] kobject: 'vet': free name [ 347.746699] kobject: 'tx-1' (00000000f9c5d3f8): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-1' [ 347.765432] kobject: 'rx-1' (00000000eb8c5777): kobject_add_internal: parent: 'queues', set: 'queues' [ 347.774819] kobject: 'loop5' (000000006fab86f3): kobject_uevent_env [ 347.774852] kobject: 'loop5' (000000006fab86f3): fill_kobj_path: path = '/devices/virtual/block/loop5' 14:19:42 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000035) 14:19:42 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0xc0045878, &(0x7f00000002c0)={0x7, 0x2000000013}) 14:19:42 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SG_SET_COMMAND_Q(r3, 0x2271, &(0x7f0000000140)) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r4, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:42 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$caif_stream(0x25, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000140)=0x24) open(&(0x7f0000000040)='./file0\x00', 0x400, 0x1c1) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) [ 347.781994] kobject: 'rx-1' (00000000eb8c5777): kobject_uevent_env [ 347.819144] kobject: 'loop3' (0000000088a8e4c2): kobject_uevent_env [ 347.839769] kobject: 'rx-1' (00000000eb8c5777): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-1' [ 347.844026] kobject: 'loop3' (0000000088a8e4c2): fill_kobj_path: path = '/devices/virtual/block/loop3' 14:19:42 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0xc0045878, &(0x7f00000002c0)={0x7, 0x2000000013}) [ 347.867592] kobject: 'loop2' (000000005ea5b0d8): kobject_uevent_env [ 347.874641] kobject: 'loop2' (000000005ea5b0d8): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 347.885437] kobject: 'tx-1' (00000000f9c5d3f8): kobject_cleanup, parent 0000000000702440 [ 347.893807] kobject: 'loop0' (0000000057383183): kobject_uevent_env [ 347.908406] kobject: 'loop0' (0000000057383183): fill_kobj_path: path = '/devices/virtual/block/loop0' 14:19:42 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000480)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@mcast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000740)={{{@in=@local, @in=@dev={0xac, 0x14, 0x14, 0xb}, 0x4e20, 0x200, 0x4e24, 0x5, 0x0, 0x20, 0x20, 0x7f, r4, r5}, {0x9bec, 0x7, 0x4, 0x8, 0x7f, 0x22, 0x5, 0x8000}, {0x153, 0x100, 0x2, 0xfffffffffffffff9}, 0x7f, 0x6e6bb1, 0x0, 0x0, 0x3, 0x3}, {{@in=@loopback, 0x4d6}, 0xa, @in6=@local, 0x3507, 0x1, 0x3, 0x0, 0xeb, 0x2, 0x3f}}, 0xe8) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r6, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r6, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r6, &(0x7f00000001c0)='.//ile0\x00', 0x0) syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x2, 0x2) ptrace$peekuser(0x3, r2, 0x7) [ 347.930680] kobject: 'tx-1' (00000000f9c5d3f8): auto cleanup 'remove' event [ 347.944695] kobject: 'tx-1' (00000000f9c5d3f8): kobject_uevent_env [ 347.951722] kobject: 'loop2' (000000005ea5b0d8): kobject_uevent_env [ 347.962302] kobject: 'tx-1' (00000000f9c5d3f8): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-1' [ 347.965626] kobject: 'loop2' (000000005ea5b0d8): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 347.996871] kobject: 'tx-1' (00000000f9c5d3f8): auto cleanup kobject_del [ 348.008850] kobject: 'loop0' (0000000057383183): kobject_uevent_env [ 348.015278] kobject: 'tx-1' (00000000f9c5d3f8): calling ktype release [ 348.015286] kobject: 'tx-1': free name [ 348.026875] kobject: 'rx-1' (00000000eb8c5777): kobject_cleanup, parent 0000000000702440 [ 348.029737] kobject: 'loop0' (0000000057383183): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 348.049346] kobject: 'loop2' (000000005ea5b0d8): kobject_uevent_env [ 348.057301] kobject: 'loop2' (000000005ea5b0d8): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 348.058575] kobject: 'rx-1' (00000000eb8c5777): auto cleanup 'remove' event [ 348.070796] kobject: 'loop2' (000000005ea5b0d8): kobject_uevent_env [ 348.081484] kobject: 'loop2' (000000005ea5b0d8): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 348.094477] kobject: 'rx-1' (00000000eb8c5777): kobject_uevent_env [ 348.101107] kobject: 'rx-1' (00000000eb8c5777): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-1' [ 348.112429] kobject: 'rx-1' (00000000eb8c5777): auto cleanup kobject_del [ 348.119369] kobject: 'rx-1' (00000000eb8c5777): calling ktype release [ 348.126126] kobject: 'rx-1': free name [ 348.130487] kobject: 'vet' (000000005afb31f3): kobject_add_internal: parent: 'net', set: 'devices' [ 348.140658] kobject: 'vet' (000000005afb31f3): kobject_uevent_env [ 348.147162] kobject: 'vet' (000000005afb31f3): fill_kobj_path: path = '/devices/virtual/net/vet' [ 348.156860] kobject: 'queues' (00000000a0cf7e0e): kobject_add_internal: parent: 'vet', set: '' [ 348.166293] kobject: 'queues' (00000000a0cf7e0e): kobject_uevent_env [ 348.172843] kobject: 'queues' (00000000a0cf7e0e): kobject_uevent_env: filter function caused the event to drop! [ 348.183247] kobject: 'rx-0' (00000000b47746b5): kobject_add_internal: parent: 'queues', set: 'queues' [ 348.192821] kobject: 'rx-0' (00000000b47746b5): kobject_uevent_env [ 348.199152] kobject: 'rx-0' (00000000b47746b5): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 348.209321] kobject: 'tx-0' (0000000090a8735f): kobject_add_internal: parent: 'queues', set: 'queues' [ 348.218809] kobject: 'tx-0' (0000000090a8735f): kobject_uevent_env [ 348.225186] kobject: 'tx-0' (0000000090a8735f): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 348.235936] kobject: 'batman_adv' (000000002c52a734): kobject_add_internal: parent: 'vet', set: '' [ 348.252558] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=12499 comm=syz-executor3 [ 348.266795] kobject: 'batman_adv' (00000000295b95d1): kobject_uevent_env [ 348.272282] caif:caif_disconnect_client(): nothing to disconnect [ 348.279634] kobject: 'batman_adv' (00000000295b95d1): kobject_uevent_env: filter function caused the event to drop! [ 348.292160] kobject: 'loop1' (00000000de8e11f6): kobject_uevent_env [ 348.298606] kobject: 'loop1' (00000000de8e11f6): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 348.302184] kobject: 'batman_adv' (00000000295b95d1): kobject_cleanup, parent (null) [ 348.322109] kobject: 'batman_adv' (00000000295b95d1): calling ktype release [ 348.322672] caif:caif_disconnect_client(): nothing to disconnect [ 348.332107] kobject: (00000000295b95d1): dynamic_kobj_release [ 348.341454] kobject: 'batman_adv': free name [ 348.346458] kobject: 'rx-0' (00000000bd4fa373): kobject_cleanup, parent 0000000000702440 [ 348.354866] kobject: 'rx-0' (00000000bd4fa373): auto cleanup 'remove' event [ 348.361964] kobject: 'rx-0' (00000000bd4fa373): kobject_uevent_env [ 348.369397] kobject: 'rx-0' (00000000bd4fa373): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 348.379678] kobject: 'rx-0' (00000000bd4fa373): auto cleanup kobject_del [ 348.381634] kobject: 'loop5' (000000006fab86f3): kobject_uevent_env [ 348.386664] kobject: 'rx-0' (00000000bd4fa373): calling ktype release [ 348.398830] kobject: 'loop5' (000000006fab86f3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 348.399732] kobject: 'rx-0': free name [ 348.413142] kobject: 'tx-0' (0000000092411055): kobject_cleanup, parent 0000000000702440 [ 348.421374] kobject: 'tx-0' (0000000092411055): auto cleanup 'remove' event [ 348.428535] kobject: 'tx-0' (0000000092411055): kobject_uevent_env [ 348.434917] kobject: 'tx-0' (0000000092411055): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 348.445143] kobject: 'tx-0' (0000000092411055): auto cleanup kobject_del [ 348.452099] kobject: 'tx-0' (0000000092411055): calling ktype release [ 348.458682] kobject: 'tx-0': free name [ 348.462632] kobject: 'queues' (0000000000702440): kobject_cleanup, parent (null) [ 348.471029] kobject: 'queues' (0000000000702440): calling ktype release [ 348.477821] kobject: 'queues' (0000000000702440): kset_release [ 348.483833] kobject: 'queues': free name [ 348.488139] kobject: 'vet' (0000000026317c0f): kobject_uevent_env [ 348.494425] kobject: 'vet' (0000000026317c0f): fill_kobj_path: path = '/devices/virtual/net/vet' [ 348.504596] kobject: 'batman_adv' (000000002c52a734): kobject_uevent_env [ 348.511452] kobject: 'batman_adv' (000000002c52a734): kobject_uevent_env: filter function caused the event to drop! [ 348.522158] kobject: 'batman_adv' (000000002c52a734): kobject_cleanup, parent (null) [ 348.530908] kobject: 'batman_adv' (000000002c52a734): calling ktype release [ 348.538074] kobject: (000000002c52a734): dynamic_kobj_release [ 348.543992] kobject: 'batman_adv': free name [ 348.548585] kobject: 'rx-0' (00000000b47746b5): kobject_cleanup, parent 00000000a0cf7e0e [ 348.556877] kobject: 'rx-0' (00000000b47746b5): auto cleanup 'remove' event [ 348.564672] kobject: 'rx-0' (00000000b47746b5): kobject_uevent_env [ 348.571820] kobject: 'rx-0' (00000000b47746b5): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 348.582006] kobject: 'rx-0' (00000000b47746b5): auto cleanup kobject_del [ 348.588898] kobject: 'rx-0' (00000000b47746b5): calling ktype release [ 348.595591] kobject: 'rx-0': free name [ 348.599516] kobject: 'tx-0' (0000000090a8735f): kobject_cleanup, parent 00000000a0cf7e0e [ 348.607775] kobject: 'tx-0' (0000000090a8735f): auto cleanup 'remove' event [ 348.614899] kobject: 'tx-0' (0000000090a8735f): kobject_uevent_env [ 348.621228] kobject: 'tx-0' (0000000090a8735f): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 348.631354] kobject: 'tx-0' (0000000090a8735f): auto cleanup kobject_del [ 348.638256] kobject: 'tx-0' (0000000090a8735f): calling ktype release [ 348.644878] kobject: 'tx-0': free name [ 348.648770] kobject: 'queues' (00000000a0cf7e0e): kobject_cleanup, parent (null) [ 348.657189] kobject: 'queues' (00000000a0cf7e0e): calling ktype release [ 348.663974] kobject: 'queues' (00000000a0cf7e0e): kset_release [ 348.669938] kobject: 'queues': free name [ 348.674332] kobject: 'vet' (000000005afb31f3): kobject_uevent_env 14:19:43 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000300) 14:19:43 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0xc0189436, &(0x7f00000002c0)={0x7, 0x2000000013}) 14:19:43 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = fcntl$dupfd(r0, 0x0, r1) ioctl$VIDIOC_S_CROP(r3, 0x4014563c, &(0x7f00000000c0)={0xf, {0x8, 0x3, 0x5e39, 0xfff}}) r4 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000680)=""/179, 0xfffffdf1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r4, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r5, 0x4008ae73, &(0x7f00000004c0)={0x4, 0x9}) mkdirat(r5, &(0x7f0000000040)='./file0\x00', 0x0) recvmsg$kcm(r5, &(0x7f0000000300)={&(0x7f0000000200)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000380)=""/219, 0xdb}], 0x1, &(0x7f00000002c0)=""/41, 0x29}, 0x0) bind$packet(r4, &(0x7f0000000480)={0x11, 0x1f, r6, 0x1, 0xfff, 0x6, @remote}, 0x14) mkdirat(r5, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r2, 0x7) 14:19:43 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0xa02) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) bind$inet(r0, &(0x7f0000000780)={0x2, 0x200000000004e23, @multicast1}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet(r0, 0x0, &(0x7f0000000300)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) getresgid(&(0x7f0000000380), &(0x7f0000000480), &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000140)=0x7fff) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xa}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 14:19:43 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x200000, 0x0) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000100)=0x7ff, &(0x7f0000000180)=0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x440000000000, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)=0x24) poll(&(0x7f0000000080)=[{r2}], 0x1, 0x2) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000001c0)={0x1, [0x8]}, &(0x7f0000000200)=0x6) [ 348.680581] kobject: 'vet' (000000005afb31f3): fill_kobj_path: path = '/devices/virtual/net/vet' [ 348.689813] kobject: 'vet' (0000000026317c0f): kobject_cleanup, parent (null) [ 348.698075] kobject: 'vet' (0000000026317c0f): calling ktype release [ 348.705786] kobject: 'vet': free name [ 348.712441] kobject: 'vet' (000000005afb31f3): kobject_cleanup, parent (null) [ 348.720620] kobject: 'vet' (000000005afb31f3): calling ktype release [ 348.747311] kobject: 'vet': free name [ 348.749324] kobject: 'loop4' (0000000057d6f79a): kobject_uevent_env [ 348.764863] kobject: 'loop4' (0000000057d6f79a): fill_kobj_path: path = '/devices/virtual/block/loop4' 14:19:43 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000035) 14:19:43 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0xc020660b, &(0x7f00000002c0)={0x7, 0x2000000013}) [ 348.786568] kobject: 'vet' (000000003324534e): kobject_add_internal: parent: 'net', set: 'devices' [ 348.805199] kobject: 'loop2' (000000005ea5b0d8): kobject_uevent_env [ 348.842417] kobject: 'loop2' (000000005ea5b0d8): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 348.848937] kobject: 'vet' (000000003324534e): kobject_uevent_env [ 348.870904] kobject: 'loop2' (000000005ea5b0d8): kobject_uevent_env [ 348.871913] kobject: 'vet' (000000003324534e): fill_kobj_path: path = '/devices/virtual/net/vet' [ 348.877868] kobject: 'loop2' (000000005ea5b0d8): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 348.891356] kobject: 'queues' (000000002e659493): kobject_add_internal: parent: 'vet', set: '' [ 348.898794] kobject: 'loop3' (0000000088a8e4c2): kobject_uevent_env [ 348.921617] kobject: 'queues' (000000002e659493): kobject_uevent_env [ 348.921838] kobject: 'loop3' (0000000088a8e4c2): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 348.931056] kobject: 'queues' (000000002e659493): kobject_uevent_env: filter function caused the event to drop! [ 348.948944] kobject: 'rx-0' (00000000890b162e): kobject_add_internal: parent: 'queues', set: 'queues' [ 348.949964] kobject: 'loop0' (0000000057383183): kobject_uevent_env [ 348.961557] kobject: 'rx-0' (00000000890b162e): kobject_uevent_env [ 348.966423] kobject: 'loop0' (0000000057383183): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 348.971317] kobject: 'rx-0' (00000000890b162e): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 348.981230] kobject: 'loop5' (000000006fab86f3): kobject_uevent_env [ 348.996255] kobject: 'tx-0' (00000000ec2512f6): kobject_add_internal: parent: 'queues', set: 'queues' [ 348.997490] kobject: 'loop5' (000000006fab86f3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 349.008163] kobject: 'tx-0' (00000000ec2512f6): kobject_uevent_env [ 349.018133] kobject: 'loop0' (0000000057383183): kobject_uevent_env [ 349.030219] kobject: 'loop0' (0000000057383183): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 349.040107] kobject: 'tx-0' (00000000ec2512f6): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 349.051926] kobject: 'batman_adv' (0000000035fd30a0): kobject_add_internal: parent: 'vet', set: '' [ 349.066952] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=12532 comm=syz-executor4 [ 349.067282] kobject: 'vet' (000000008558117c): kobject_add_internal: parent: 'net', set: 'devices' 14:19:43 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f00000002c0)={0x7ffff, 0x2000000013}) 14:19:43 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x0, 0x0) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000380)="96aafb4fdba997e6031bf632e1e0ed041950bca193d759d8b191badb24ff20e2fe349d02417bfd94d1f66b9a178624d54afd78344eecc1966ed407c271bc488a4f620ad79b9699c43e5dd9a85093068f3bb21bbf11d3a4d5f7811e20e0f8de74a2c10ee276c401f023236f2f008d0cce7c738d8c6cdec807bf4556166cd92a75ae3da2de79da0093219f2472bdf8133f01406a9e0feff1d74e3382e73f78", 0x9e, 0xfffffffffffffffc) keyctl$assume_authority(0x10, r2) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)=0x2) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6eb) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/zero\x00', 0x0, 0x0) ioctl$DRM_IOCTL_VERSION(r4, 0xc0406400, &(0x7f00000005c0)={0x4, 0x9, 0x2, 0xaa, &(0x7f0000000500)=""/170, 0xc2, &(0x7f0000000740)=""/194, 0xea, &(0x7f00000008c0)=""/234}) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r4, &(0x7f0000000a00)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f00000009c0)={&(0x7f0000000840)={0x1c, r5, 0x2, 0x70bd2c, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x48010) r6 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pread64(r1, &(0x7f0000000a40)=""/179, 0xb3, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r6, 0x40106439, &(0x7f0000000280)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r7, 0x4008ae73, &(0x7f00000000c0)={0x4, 0x9}) mkdirat(r7, &(0x7f0000000040)='./file0\x00', 0x0) mkdirat(r7, &(0x7f00000001c0)='.//ile0\x00', 0x0) ptrace$peekuser(0x3, r3, 0x7) r8 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r7, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000440)={&(0x7f0000000300)={0x24, r8, 0x10, 0x70bd2b, 0x25dfdbff, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x7f}}, ["", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000014}, 0x800) 14:19:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x24) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000ffe000/0x2000)=nil, 0x2000}, 0x3}) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x2) [ 349.093376] kobject: 'vet' (000000008558117c): kobject_uevent_env [ 349.099813] kobject: 'vet' (000000008558117c): fill_kobj_path: path = '/devices/virtual/net/vet' [ 349.112507] kobject: 'queues' (00000000b3018ff1): kobject_add_internal: parent: 'vet', set: '' [ 349.123128] kobject: 'queues' (00000000b3018ff1): kobject_uevent_env 14:19:43 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f00000002c0)={0x7, 0x2000000002}) [ 349.143398] kobject: 'queues' (00000000b3018ff1): kobject_uevent_env: filter function caused the event to drop! [ 349.155978] kobject: 'loop2' (000000005ea5b0d8): kobject_uevent_env [ 349.163881] kobject: 'loop2' (000000005ea5b0d8): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 349.173831] kobject: 'rx-0' (00000000d962cda2): kobject_add_internal: parent: 'queues', set: 'queues' [ 349.184286] kobject: 'rx-0' (00000000d962cda2): kobject_uevent_env 14:19:44 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) removexattr(0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000004c0)) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc0605345, &(0x7f0000000340)) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000100)) sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl(r2, 0x8, 0x0) r3 = socket$inet6(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r3, &(0x7f00000016c0), 0x3ffffffffffffed, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000005880)='attr/keycreate\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$ASHMEM_SET_SIZE(r2, 0x40087703, 0x2) getsockname$packet(r4, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000005c0)=0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000800)={'veth1_to_bond\x00', r5}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{&(0x7f0000003540)=""/187, 0xbb}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{&(0x7f0000003980)=@ipx, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}, {&(0x7f0000005b80)=""/23, 0x17}], 0x2, &(0x7f0000005c40)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000006c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000006ec0)=[{&(0x7f0000006e40)=""/103, 0x67}], 0x1, &(0x7f0000006f00)=""/245, 0xf5}}], 0x4, 0x0, 0x0) sysfs$2(0x2, 0x3, &(0x7f0000000500)=""/92) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r7, 0x117, 0x1, &(0x7f0000ff8000), 0x0) ioctl$BLKRAGET(r2, 0x1263, &(0x7f0000000000)) ioctl$FS_IOC_FSSETXATTR(r6, 0x401c5820, &(0x7f0000000440)={0x8, 0xc5c, 0x5, 0x80000000}) accept$alg(r7, 0x0, 0x0) [ 349.191268] kobject: 'loop0' (0000000057383183): kobject_uevent_env [ 349.199106] kobject: 'loop0' (0000000057383183): fill_kobj_path: path = '/dev