et(r5, &(0x7f0000000240)={0x11, 0x0, r13}, 0x14) getsockname$packet(r5, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r4, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r14, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r14, 0x1, 0x0, 0x6, @dev={[], 0x23}}, 0x14) getsockname$packet(r2, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r1, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r15, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) r16 = accept4$bt_l2cap(r1, 0x0, &(0x7f0000000000), 0x80000) ioctl(r16, 0x0, &(0x7f0000000040)="304b058718d9db028bab06429cad88a744ccebaefbddee416353fff58951c2b9aeeafebcc5b63a0eeb1672e4dfe6c3fcadaa8bc482655c93e433dd345cdfc2a7965bb13ad901d731e49b321649c88aa2d22a3760a02054c548a889ba04e18272597065e3a9fcdb42cb72b0fa119b9796ae291dcead57decc7e7b78122533c10bc9f1f11e634557b4195078f36d32e64b6dcd3e4666764ce0eb8739267c29cf62838135a526f99babd556ea7fd23cb4d5f7fd89a02d965de6f4afebf8be0814939dd409b3b4bec9a3fec3ab5441376c2355e295bf6faaf2b6080dd65e2e125aca95d9") setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x15000000000000, 0x485, 0x6, 0x0) [ 464.319453][T21201] 9pnet_virtio: no channels available for device syz 06:39:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0xff7f0000, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:34 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=virtio,', {[{@cache_fscache='cache=fscache'}]}}) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180), 0x2000) r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000300)=0x30b) r3 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x7, 0x10080) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f0000000280)=[0x7ff]) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000040)={'bridge0\x00', 0x5}) 06:39:34 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x20000, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) ioctl$SIOCRSGL2CALL(r0, 0x89e5, &(0x7f0000000000)) listxattr(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) unlink(&(0x7f0000000040)='./file0/file0\x00') 06:39:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x1) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) listxattr(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) 06:39:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0xffff0300, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 464.498625][T21221] 9pnet_virtio: no channels available for device syz [ 464.534429][T21221] 9pnet_virtio: no channels available for device syz 06:39:34 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000100)=0xc) process_vm_writev(r0, &(0x7f00000014c0)=[{&(0x7f0000000240)=""/214, 0xd6}, {&(0x7f0000000180)=""/84, 0x54}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/253, 0xfd}, {&(0x7f0000001440)=""/118, 0x76}], 0x5, &(0x7f0000001840)=[{&(0x7f0000001540)=""/243, 0xf3}, {&(0x7f0000001640)=""/180, 0xb4}, {&(0x7f0000001700)=""/66, 0x42}, {&(0x7f0000001780)=""/148, 0x94}], 0x4, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) listxattr(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) chdir(&(0x7f0000001880)='./file0\x00') 06:39:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0xffffa888, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 464.603054][T21215] 9pnet_virtio: no channels available for device syz [ 464.648090][T21230] 9pnet_virtio: no channels available for device syz 06:39:34 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) ioctl(r0, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$RTC_WIE_ON(r0, 0x700f) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") write$P9_RATTACH(r1, &(0x7f00000003c0)={0x14, 0x69, 0x2, {0x8, 0x4, 0x2}}, 0x14) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7472616e733d76697274696faea89a9a345cb114c8365b294440a82c"]) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f00000000c0)=0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x404a00, 0x100) getsockname$unix(r2, &(0x7f0000000300), &(0x7f0000000380)=0x6e) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180), 0x100) 06:39:34 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x1ff) r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000080)=0x5) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000180)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$afs(&(0x7f00000000c0)='afs\x00', &(0x7f0000000100)='./file0\x00', 0x67ba, 0x0, &(0x7f0000000140), 0x800, &(0x7f0000000340)={[{@dyn='dyn'}, {@flock_write='flock=write'}, {@dyn='dyn'}], [{@euid_eq={'euid', 0x3d, r1}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'syz1\x00'}}, {@uid_lt={'uid<', r2}}, {@subj_role={'subj_role', 0x3d, '${security'}}, {@context={'context', 0x3d, 'unconfined_u'}}]}) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) ioctl$RTC_UIE_ON(r4, 0x7003) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000440)={0x2, 0x3, 0xfffffff8, 0x1, 0xd95c}) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x12000800}, 0xc, &(0x7f0000000600)={&(0x7f00000004c0)={0x140, 0x3, 0x1, 0x400, 0x70bd2c, 0x25dfdbfe, {0x7, 0x0, 0x8}, [@CTA_MARK={0x8, 0x8, 0x8}, @CTA_TUPLE_MASTER={0x24, 0xe, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @multicast1}}}]}, @CTA_HELP={0x10, 0x5, {0x9, 0x1, 'snmp\x00'}}, @CTA_LABELS={0xc, 0x16, [0x6, 0x1]}, @CTA_STATUS={0x8, 0x3, 0x3007}, @CTA_STATUS={0x8, 0x3, 0x2000}, @CTA_PROTOINFO={0x18, 0x4, @CTA_PROTOINFO_TCP={0x14, 0x1, [@CTA_PROTOINFO_TCP_WSCALE_REPLY={0x5, 0x3, 0x80}, @CTA_PROTOINFO_TCP_WSCALE_ORIGINAL={0x5, 0x2, 0x1}]}}, @CTA_NAT_DST={0xb4, 0xd, [@CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_PROTO={0x4c, 0x3, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e24}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e20}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e20}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}]}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @empty}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @mcast1}, @CTA_NAT_V4_MINIP={0x8, 0x1, @multicast2}, @CTA_NAT_PROTO={0x1c, 0x3, [@CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e22}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e24}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}]}, @CTA_NAT_V4_MINIP={0x8, 0x1, @remote}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}]}, @CTA_MARK_MASK={0x8, 0x15, 0x4}]}, 0x140}, 0x1, 0x0, 0x0, 0x4000010}, 0x20000000) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000680)='/dev/vcsa\x00', 0x40000, 0x0) sendmsg$IPCTNL_MSG_CT_GET_DYING(r5, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x48100}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x14, 0x6, 0x1, 0x400, 0x70bd25, 0x25dfdbff, {0x1, 0x0, 0x4}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x4000080) r6 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000800)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r4, &(0x7f0000000900)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x228000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000840)={0x44, r6, 0x800, 0x70bd2b, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @ipv4={[], [], @empty}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'tunl0\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000084}, 0x4000024) r7 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000940)={0x0, 0x0}) statx(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x1000, 0x0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000ac0)={r8, r9, r3}, 0xc) ioctl$VIDIOC_S_EXT_CTRLS(r5, 0xc0205648, &(0x7f0000000b40)={0x980000, 0x2, 0xfffffff9, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)={0x990af4, 0x0, [], @value64=0x7}}) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000c00)=@mangle={'mangle\x00', 0x1f, 0x6, 0x490, 0x160, 0x240, 0x98, 0x240, 0x240, 0x3f8, 0x3f8, 0x3f8, 0x3f8, 0x3f8, 0x6, &(0x7f0000000b80), {[{{@uncond, 0x0, 0x70, 0x98}, @inet=@TOS={0x28, 'TOS\x00', 0x0, {0x6a, 0x2}}}, {{@uncond, 0x0, 0x98, 0xc8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0xb}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x7, 0x66, @multicast2, 0x4e21}}}, {{@ip={@remote, @broadcast, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_team\x00', {0xff}, {}, 0x8, 0x3, 0x79}, 0x0, 0xb8, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0x4}}, @common=@socket0={{0x20, 'socket\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@local, @dev={0xac, 0x14, 0x14, 0x1a}, 0xffffffff, 0xffffff00, 'ipvlan0\x00', 'caif0\x00', {}, {}, 0x5c, 0x2, 0x25}, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0x4}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0x8}}]}, @ECN={0x28, 'ECN\x00', 0x0, {0x0, 0x6, 0x1}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev={[], 0x27}, 0x100, 0x7, [0x1a, 0x8, 0x8, 0x3c, 0x3d, 0x2e, 0x2, 0x37, 0x2d, 0x24, 0x1e, 0x2b, 0x19, 0x1d, 0x37, 0x40], 0x0, 0x7, 0x3}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4f0) r11 = socket$pppl2tp(0x18, 0x1, 0x1) pwrite64(r11, &(0x7f0000001100)="d1676e9c8f20be442cb079909c65348a089d7c104c81594f1520b7c906fb683994574047b00f1507482aeb4d5713a5cc578be0171da45ced45c7c72aeddeeedf6bc8e70c978e21c53683d1b7dcedad6236dd74ea24d5769c835765ce7f5f", 0x5e, 0x81) r12 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000001180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000011c0)={0x0, 0x0}, &(0x7f0000001200)=0xc) write$FUSE_CREATE_OPEN(r12, &(0x7f0000001240)={0xa0, 0xfffffffffffffff5, 0x7, {{0x4, 0x3, 0x9, 0x10001, 0xff, 0x401, {0x5, 0x8, 0x90000000, 0x5, 0x100, 0x2, 0x0, 0x7fff, 0x100, 0xfffffff8, 0x7fff, r13, 0x0, 0x8, 0xc962}}, {0x0, 0x10}}}, 0xa0) r14 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000001300)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$NBD_SET_BLKSIZE(r14, 0xab01, 0x6) open_by_handle_at(r0, &(0x7f0000001340)={0x25, 0x2, "b08a22d9f06f730a29866588248def9ba654302c9a35937e462b16822d"}, 0x4004) r15 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001380)='/dev/btrfs-control\x00', 0x1, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r15, 0xc018643a, &(0x7f00000013c0)={0x0, 0x80000000, 0x1d}) 06:39:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) listxattr(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) ioctl(r0, 0x1, &(0x7f0000000100)="ffe0f5") r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r1, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000180)={0x1, 0xb, 0x4, 0x5c46f2105200a32f, 0x3ff, {}, {0x3, 0x0, 0x8, 0x0, 0x1, 0x0, "31488e6d"}, 0x0, 0x1, @planes=&(0x7f0000000040)={0xfffffffd, 0x7, @mem_offset=0x2, 0x8}, 0xffff8001, 0x0, r1}) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000100)=0xfffffd05) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6}, 0x14) getsockname$packet(r4, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r3, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r7, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r3, 0x110, 0x5, &(0x7f0000000240)=[0x3, 0x4], 0x2) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) 06:39:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0xfffff000, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 464.828119][T21248] 9pnet: Could not find request transport: virtio®¨šš4\±È6[)D@¨ [ 464.837716][T21243] kAFS: unparsable volume name [ 464.877912][T21248] 9pnet: Could not find request transport: virtio®¨šš4\±È6[)D@¨ 06:39:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0xffffff7f, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:34 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=virtio,', {[{@cache_fscache='cache=fscache'}]}}) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0xa0301, 0x0) ioctl$FBIOGET_FSCREENINFO(r0, 0x4602, &(0x7f0000000240)) r1 = creat(&(0x7f0000000340)='./file0\x00', 0x20) ioctl$VIDIOC_S_SELECTION(r1, 0xc040565f, &(0x7f0000000380)={0x3, 0x1, 0xd54bdc4577230b09, {0x1ff, 0x5ddc, 0xffffffb3, 0xffffffff}}) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180), 0x100) setxattr$trusted_overlay_nlink(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='trusted.overlay.nlink\x00', &(0x7f0000000680)={'L-', 0xffffffff}, 0x16, 0x2) fadvise64(r0, 0xff, 0x4bd, 0x1) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f00000005c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4008200}, 0xc, &(0x7f0000000580)={&(0x7f00000006c0)=ANY=[@ANYBLOB="28a9e5703fabf931", @ANYRES16=r2, @ANYBLOB="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"], 0x228}, 0x1, 0x0, 0x0, 0x810}, 0x80) [ 465.028433][T21262] 9pnet_virtio: no channels available for device syz 06:39:34 executing program 3: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x4) r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r3, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = socket(0x200000000000011, 0x3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r5, &(0x7f0000000240)={0x11, 0x0, r7}, 0x14) getsockname$packet(r5, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) getsockopt$packet_int(r5, 0x107, 0x9, &(0x7f0000000200), &(0x7f0000000340)=0x4) r8 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x75, &(0x7f0000000280)={r9}, &(0x7f00000002c0)=0x18) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f00000000c0)={r9, 0x1}, 0x8) r10 = socket(0x200000000000011, 0x3, 0x0) r11 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r10, &(0x7f0000000240)={0x11, 0x0, r12}, 0x14) getsockname$packet(r10, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) sendmsg$IPSET_CMD_RENAME(r10, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x31000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="ab1388ca05065b9c27bd7000afba265b0c00000009000300738f7a32be804c95"], 0x20}, 0x1, 0x0, 0x0, 0xc805}, 0x10) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', 0x0, 0x1000020, 0x0) shmget$private(0x0, 0x1000, 0x54001000, &(0x7f0000ffc000/0x1000)=nil) rename(&(0x7f0000000300)='./bus/file1\x00', &(0x7f0000000140)='./bus/file0\x00') [ 465.031311][T21249] 9pnet_virtio: no channels available for device syz [ 465.103063][T21262] QAT: Invalid ioctl [ 465.132616][T21262] 9pnet_virtio: no channels available for device syz [ 465.178031][T21262] QAT: Invalid ioctl 06:39:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) listxattr(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x200000, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) 06:39:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="7472616e733de0697274696f3863616368653d667363616368652c00b0c32263a101fd9592739ff744c14cfc76406c73e08f8ff811010d2e3223709299fe6061635a04b4be25256aa431"]) r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000280)={0x3f, 0x1000, 0x0, 0x7fffffff}, 0x10) pipe2(&(0x7f00000002c0)={0xffffffffffffffff}, 0x4af7edb15ace947d) fsconfig$FSCONFIG_SET_FD(r3, 0x5, &(0x7f0000000380)='loselinux\x00', 0x0, 0xffffffffffffffff) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) setsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f0000000040)=0x1, 0x4) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000300), 0x100) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) ioctl$sock_SIOCDELDLCI(r4, 0x8981, &(0x7f00000000c0)={'veth0_virt_wifi\x00'}) socket$vsock_stream(0x28, 0x1, 0x0) 06:39:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0xffffff9e, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0xffffffe4, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 465.297933][T21281] 9pnet: Could not find request transport: àirtio8cache=fscache [ 465.336111][T21282] 9pnet_virtio: no channels available for device syz 06:39:35 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x1000000000000006}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f00000002c0)=0x400000000008000, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="4f18b342f1b612dfa764a402831061017b62a813e08e0323db63df3d27a4a59a17171d054bac5a088c8892a6b2221b4dfaac1c3780c0fa15ba4f4988a5d9671f925de18039854ee7a5a511e78f2757ce544df7b44c53006eb41504ef8f6aaf9668e3c653dfe5a5c193dec29854e806834218e723d4a78f40c8cfbb37f1ee92bd119286317b5dff8ee7b7d3fe47ac49845f4b4603981fb8d567ae0761de00f793086df16230f7a12f2cf081dfa33ae26455aa8115ac0b4f1c18304dda3559c7fd52ac9812793e1a745059ec93d1d652628a34b6afbc832b4dc0c387ab4e1a7287738d8afef1b03dcc600ff69e0d2c07", 0xef}, {&(0x7f0000000140)="8860297095e5abace55553a9e06d0fd0164800faad7c994a3b783d4ef2f31aa2e77f7aeedc90d43b4f07", 0x2a}, {&(0x7f0000000180)="89f48a37de2a04ccf909e3f9de4889e9fcd911771b5830d1e55d2fae043233e97d12704a14ec0ff570d3426721babbf694e5734103cf254b6175b69c390164c2225c7e1dd84a46d6fa932c36e3fee7a1d1dcdad0e60d4f707a0ab3ea0e9e2d3adcd7bc8611492083415d12f4a3f95119516077fbaa057188", 0x78}, {&(0x7f0000001400)="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", 0x1000}], 0x4}}, {{0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000140)}}], 0x2, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_bt_hci(r1, 0x400448e3, &(0x7f0000000340)="f9") r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000300)=0x6, 0x4) 06:39:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) listxattr(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) rt_sigaction(0x32, &(0x7f0000000100)={&(0x7f0000000180)="c4e2f932ab655666663e3e64dbe30f01fcc441785a3586000000c4e3c979170367440ffba7c11b850fc441f829890f000000c4410b7ce0660f383f55ef480f38f62d760ed1c9", {0x80}, 0xc8000004, &(0x7f0000000040)="c44215cfa672000000f267f3d051008f4978e3b67fe20000f2d9c2c4e28dbfaa31000000c4615d6621def246ad6640a059240000000000006467f30f1ee7"}, 0x0, 0x8, &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x1, 0x4, 0x84, 0xffff}]}, 0x10) 06:39:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0xfffffff0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 465.452943][T21281] 9pnet: Could not find request transport: àirtio8cache=fscache 06:39:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7472616e733d766972746d6f2c63616368653d667363616368652c00ce07e651a29607c9bf9b177255cbd1c774c7a02f2703187625ce5537217928b8fe3fa3f371bef73783866ecc357fa475b8eaf122f6e303"]) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) migrate_pages(r0, 0x969, &(0x7f00000000c0)=0x6, &(0x7f00000002c0)=0x5) newfstatat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', &(0x7f0000000180), 0x2000) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) 06:39:35 executing program 3: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x8, 0x1) prctl$PR_CAPBSET_DROP(0x18, 0x20) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) recvmsg$can_j1939(r0, &(0x7f0000000240)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000100)=""/34, 0x22}, {&(0x7f0000000140)=""/45, 0x2d}, {&(0x7f0000000180)=""/69, 0x45}], 0x3}, 0x10102) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 465.584894][T21309] 9pnet: Could not find request transport: virtmo 06:39:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0xfffffffe, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 465.643355][T21306] 9pnet_virtio: no channels available for device syz 06:39:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x139000, 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) listxattr(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000040)=""/28) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) [ 465.644061][T21309] 9pnet: Could not find request transport: virtmo 06:39:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=virtio,', {[{@cache_fscache='cache=fscache'}]}}) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180), 0x100) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f00000000c0)=0x3) [ 465.802127][T21324] 9pnet_virtio: no channels available for device syz 06:39:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0xffffffff, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 465.828094][T21327] 9pnet_virtio: no channels available for device syz 06:39:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="746b616e733d76697274696f2c636163682f4748b8567101884c653d667363b094ec38dbab920a63d85876d09724b03ff4f8cefcff0d29ab1cebf10a00000000000017335e555674648d5b42e0f897474c"]) lremovexattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)=@known='trusted.overlay.metacopy\x00') newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180), 0x4000) [ 465.857743][T21331] 9pnet_virtio: no channels available for device syz 06:39:35 executing program 3: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) recvfrom(r1, &(0x7f00000000c0)=""/213, 0xd5, 0x60018000, &(0x7f0000000000)=@nfc_llcp={0x27, 0x1, 0x0, 0x6, 0x8, 0xad, "caf1812ae6f486a4f24dc811a7eb925e405b58f46bf7f049562a550ca0a56a07db985999f12774ee5e58e6dad562a2daf0646b8a4cd3cc5f47f483e25acbe8", 0x9}, 0x80) ftruncate(r0, 0x8200) 06:39:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) listxattr(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x8081, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0x10) prctl$PR_SET_TSC(0x1a, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getuid() mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@xino_off='xino=off'}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}], [{@smackfshat={'smackfshat', 0x3d, '9p\x00'}}, {@audit='audit'}, {@fowner_gt={'fowner>', r1}}, {@subj_type={'subj_type', 0x3d, 'keyring'}}, {@uid_lt={'uid<', r2}}, {@subj_type={'subj_type', 0x3d, '!'}}]}) 06:39:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 465.993895][T21348] 9pnet_virtio: no channels available for device syz 06:39:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x2}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:35 executing program 2: r0 = socket$pptp(0x18, 0x1, 0x2) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000000)={'syzkaller1\x00', {0x2, 0x4e21, @broadcast}}) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=virtio,', {[{@cache_fscache='cache=fscache'}]}}) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180), 0x100) r1 = getpid() pidfd_open(r1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000040)='fdinfo\x00') getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f00000000c0)=0x6, &(0x7f0000000240)=0x4) [ 466.068014][T21343] overlayfs: unrecognized mount option "smackfshat=9p" or missing value [ 466.218439][T21343] 9pnet_virtio: no channels available for device syz 06:39:36 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x1) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) listxattr(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) 06:39:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=virtio,', {[{@cache_fscache='cache=fscache'}]}}) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000240), 0x6000) [ 466.407459][T21377] 9pnet_virtio: no channels available for device syz [ 466.428517][T21376] 9pnet_virtio: no channels available for device syz [ 466.453842][T21377] 9pnet_virtio: no channels available for device syz 06:39:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:36 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r1 = fcntl$dupfd(r0, 0xa0f, 0xffffffffffffffff) ioctl$CDROMEJECT(r1, 0x5309) listxattr(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) 06:39:36 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000300)={0xa00000, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x990965, 0xffffff00}}) r0 = accept4$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8983, &(0x7f00000000c0)={0x6, 'vlan0\x00', {0x10000}, 0x1}) syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7472616e733d76697274696f2c63616368653d7f7363616368652c00"]) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180), 0x100) 06:39:36 executing program 3: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x12}, 0x0, 0x5, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) [ 466.783489][T21389] 9pnet_virtio: no channels available for device syz [ 466.812402][T21389] 9pnet_virtio: no channels available for device syz 06:39:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x5}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 466.849660][T21388] 9pnet_virtio: no channels available for device syz 06:39:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=virtio,', {[{@cache_fscache='cache=fscache'}]}}) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180), 0x100) 06:39:36 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x3000402, 0x0) listxattr(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) [ 467.079015][T21406] 9pnet_virtio: no channels available for device syz 06:39:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000340)={'trans=virtio,', {[{@access_user='access=user'}, {@access_any='access=any'}, {@access_any='access=any'}], [{@seclabel='seclabel'}]}}) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0), 0x2000) 06:39:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 467.141708][T21410] 9pnet_virtio: no channels available for device syz 06:39:37 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) listxattr(&(0x7f0000000040)='./file0\x00', 0x0, 0xfffffffffffffeea) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) 06:39:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:37 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x7, 0x191100) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1060}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x78, r1, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x54, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}]}, 0x78}}, 0x7f61c63832351aca) sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f0000000640)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40900300}, 0xc, &(0x7f0000000600)={&(0x7f0000000740)={0x1a4, r1, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x38, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc21}]}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0x5c, 0x1, [@TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x66}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'team_slave_1\x00'}}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x839}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}]}, @TIPC_NLA_MEDIA={0xb0, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1d4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf0eb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x1a4}, 0x1, 0x0, 0x0, 0x40000}, 0x20008001) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=virtio,', {[{@cache_fscache='cache=fscache'}]}}) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180), 0x100) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000003c0)) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000680), &(0x7f0000000700)=0x68) 06:39:37 executing program 3: unshare(0x4000400) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x0) [ 467.368626][T21428] 9pnet_virtio: no channels available for device syz 06:39:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x8}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:37 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) listxattr(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101000, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x70, r1, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_ID={0x8}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x200}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1f}]}]}, 0x70}}, 0x2c06d007) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) [ 467.380353][T21430] 9pnet_virtio: no channels available for device syz 06:39:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet(0x2, 0x2000000000003, 0x2) r0 = socket(0xa, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) setsockopt$inet_int(r0, 0x1f00000000000000, 0xf, &(0x7f0000000000)=0x6, 0xfefb) r4 = socket(0x200000000000011, 0x3, 0x0) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dri/renderD128\x00', 0x90000, 0x0) r5 = socket(0x200000000000011, 0x3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x1) r7 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x180) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS32(r7, 0xc0245720, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) bind$packet(r5, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) r8 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300)='/dev/cachefiles\x00', 0x0, 0x0) getsockname$packet(r8, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmmsg$sock(r8, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r9, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x0, 0x0) r10 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/status\x00', 0x0, 0x0) io_uring_enter(r10, 0x6, 0x7ff, 0x1, &(0x7f0000000400)={0xffff}, 0x8) getsockopt$PNPIPE_IFINDEX(r4, 0x113, 0x2, &(0x7f0000000080), &(0x7f0000000280)=0x4) 06:39:37 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000040)='./file0/file0/../file0\x00', 0x600000, 0x4) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7472616e733d76697274696368653d59bcafa68119ee610000000000"]) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180), 0x800) 06:39:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x9}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 467.590272][T21458] 9pnet: Could not find request transport: virtiche=Y¼¯¦îa [ 467.595751][T21450] 9pnet_virtio: no channels available for device syz [ 467.616147][T21462] 9pnet: Could not find request transport: virtiche=Y¼¯¦îa 06:39:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0xa}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:37 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) listxattr(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000240), 0xffffffffffffffff, 0xfff}}, 0x18) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x4481, 0x0) connect$pptp(r1, &(0x7f00000001c0)={0x18, 0x2, {0x1, @dev={0xac, 0x14, 0x14, 0x11}}}, 0x1e) 06:39:37 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400218) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="2b0000000300000000000000000000000000060000000000000000000000000073656c66656d3047504c00"], 0x2b) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r6}, 0x14) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000080)) ioctl(r7, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$MON_IOCH_MFLUSH(r7, 0x9208, 0x8) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000040)=0x5, &(0x7f00000000c0)=0x2) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='trans=virtio,e=yscache,\x00\x00\x00\x00\x00']) mount$overlay(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000340)={[{@xino_auto='xino=auto'}, {@workdir={'workdir', 0x3d, './file0/file0'}}, {@index_off='index=off'}, {@index_on='index=on'}, {@xino_auto='xino=auto'}], [{@subj_user={'subj_user', 0x3d, '%'}}, {@dont_appraise='dont_appraise'}, {@obj_type={'obj_type', 0x3d, 'syz\x00'}}]}) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180), 0x100) 06:39:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0xb}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 467.771409][T21470] overlayfs: unrecognized mount option "subj_user=%" or missing value [ 467.773909][T21475] 9pnet_virtio: no channels available for device syz [ 467.816468][T21475] 9pnet_virtio: no channels available for device syz 06:39:37 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) listxattr(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0xffffffffffffff58) mount$9p_unix(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180)='9p\x00', 0x42000, &(0x7f0000000240)={'trans=unix,', {[{@cache_mmap='cache=mmap'}, {@cachetag={'cachetag', 0x3d, '-'}}, {@access_any='access=any'}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, 'syz\x00'}}]}}) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) 06:39:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0xc}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 467.894603][T21470] 9pnet_virtio: no channels available for device syz [ 467.918506][T21486] 9pnet_virtio: no channels available for device syz [ 467.991587][T21487] overlayfs: unrecognized mount option "subj_user=%" or missing value [ 468.072764][T21486] 9pnet_virtio: no channels available for device syz 06:39:37 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x585040, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x75, &(0x7f0000000280)={r3}, &(0x7f00000002c0)=0x18) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000280)={0x7, 0x2, 0xc009, 0x5, 0x5, 0x80, 0x8, 0x81, r3}, 0x20) getsockname$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="7472617e723d76697274696f2c63616368653d667363459a75807106b388bfca13206163688be200"]) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180), 0x100) ioctl$MON_IOCQ_URB_LEN(r0, 0x9201) 06:39:37 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4000) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000100)) listxattr(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r4}, 0x14) getsockname$packet(r2, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r1, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) r6 = accept4$vsock_stream(r1, &(0x7f0000000180), 0x10, 0x800) accept4(r6, &(0x7f0000000240)=@in6={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000001c0)=0x80, 0x800) 06:39:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0xe}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 468.213839][T21497] 9pnet_virtio: no channels available for device syz 06:39:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x10}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 468.237733][T21502] 9pnet_virtio: no channels available for device syz 06:39:38 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) sysinfo(&(0x7f0000000240)=""/249) listxattr(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x1, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x2, 0x50002) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000180)={0x0, 0x0, r1}) [ 468.315643][T21508] 9pnet_virtio: no channels available for device syz 06:39:38 executing program 2: mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=virtio,', {[{@cache_fscache='cache=fscache'}]}}) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180), 0x100) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x90080, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000040)=0x5) 06:39:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x11}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:38 executing program 2: getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x1c) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=virtio,', {[{@cache_fscache='cache=fscache'}]}}) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180), 0x100) 06:39:38 executing program 3: rt_sigaction(0x1b, &(0x7f0000000100)={&(0x7f0000000000)="676d8fa9089a7ad864f3dd245cdbe1c46211465afe660faef12e44dff38f08389f4ab30f8fc9d801af655666669d", {0x10001}, 0x4000000, &(0x7f00000000c0)="400fd128364169bf000800000000000026410f7f45f840c08e0e0000000964f6467abb660faeb30d000000262e6544d9f5abc44279ade7430fae31"}, &(0x7f0000000280)={&(0x7f00000001c0)="660fdf9600000080c4a178150ec4417a6f3500b04b75410f1e2b66420f383e54c100c461956512660f383c1bc40121662c4f66400f1bda460f15df", {}, 0x0, &(0x7f0000000200)="c4a2f1ab92f44c0000c4821dbe445655c481b1f8dfc4c1d652e9676766420f559886886bec650f18298f6800ccfb00448181c2d3452000000080c461e958dcc4417c53b5feffffff"}, 0x8, &(0x7f0000000300)) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x6, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000061100000009a3cf63700000000000000bd5a9fe05928deaf057b37bcacf94d0e9f2f784eea51a8520c15589003096f4f4719c602821daec1184136dc3172aeda689d1aa0dae9687bfeffa226b9e9f29814749c3b9eaa2ecd288f06e87695a68ec85c5db3a5c7ae73704412b96c6803d2712e3657315670f4b7609d18f92ab774b2fe0cc202471606db47bf269a704db3093e3f3369a378d9d4f2ec24cd926e9882f8b8ff1d5d77daaa05745e814727f90941b059c10ea7102f10763707d403023c321b"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f0000000040)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, 0x0) open(0x0, 0x0, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hpet\x00', 0x703080, 0x0) r5 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_LIST(r4, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="e359d3ad448073bfda428c3704b745becfce7f86d76bee8e331012f663ef961c4cd786291f30883494537041dba78b9ba72b098a79d1d0f8eab893b34905538ab8174552d05050c89f1feb0f74d2533246495abeb0f0503df123e9d8047cd61ec10d7275d6c68cea27f235db0c94a14679a67cdcd7b13fdc84532eccc8856ca0486a1eb6a6d6d82953aee9f3dfa84d71e0fbe5eed414ec2518a96ca38f7d0d84bf9b0f056e8877bc48a1985cd5ed5cecb5292bf9ee3afc2d65f9748b7fc290720f64e80175e91514a76fac6d51eafa19f3ce1761ab9ab13c82ce", @ANYRES16=r5, @ANYBLOB="000225bd7000fcdbdf250200000008000500000007ff14000300ff010000000000000000000000000001050001000100000014000300000000000000000000000000000000002000070073797374656d5f753a6f626a6563745f723a70746d785f743a7330001400030000000000000000000000ffff7f00000108000500ac1e0001"], 0x88}, 0x1, 0x0, 0x0, 0x8bd39a0ac5d7563b}, 0x4090) sendmsg$NLBL_UNLABEL_C_STATICADD(r1, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000004}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x60, r5, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast2}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @mcast2}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth0_vlan\x00'}]}, 0x60}, 0x1, 0x0, 0x0, 0x2000080}, 0xed2c420b2240347e) ioctl$VIDIOC_G_JPEGCOMP(0xffffffffffffffff, 0x808c563d, 0x0) [ 468.556670][T21517] 9pnet_virtio: no channels available for device syz 06:39:38 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) listxattr(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x55c28bfb137b69e) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vcs\x00', 0x60841, 0x0) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000440)) ioctl(r0, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x418881, 0x8) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r3, &(0x7f0000000240)={0x11, 0x0, r5}, 0x14) getsockname$packet(r3, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) getsockopt$inet_dccp_buf(r3, 0x21, 0x80, &(0x7f0000000380)=""/2, &(0x7f00000003c0)=0x2) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000280)={&(0x7f0000000100), 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r6, 0x400, 0x70bd2a, 0x25dfdbfc, {{}, {}, {0x14, 0x19, {0x73, 0x6, 0xffffffff, 0x9}}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20008802}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r7, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$VIDIOC_S_EXT_CTRLS(r7, 0xc0205648, &(0x7f0000000340)={0xfffffff, 0x9, 0x2, 0xffffffffffffffff, 0x0, &(0x7f0000000300)={0x9909cd, 0xe085, [], @p_u8=&(0x7f00000002c0)=0x5}}) ioctl$SG_GET_TIMEOUT(r8, 0x2202, 0x0) [ 468.594745][T21523] 9pnet_virtio: no channels available for device syz 06:39:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x12}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 468.643266][T21523] 9pnet_virtio: no channels available for device syz 06:39:38 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7472616e733d76697274696f2c63616368653d66736361636865330045250b2a8302c0beaff02d8d1ab2ebb1933426826105814c111c6e2bf5372da7bb339f05c2e366ebb5fe3b2e8c59810e4d93383073a535137a86586df32ee09b1b8bcc311600a9508bd08080aec03868aceda09f94ff51ab96a5f8e1"]) r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r0, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000480)=[{&(0x7f00000000c0)=""/12, 0xc}, {&(0x7f0000000340)=""/98, 0x62}, {&(0x7f00000003c0)=""/180, 0xb4}], 0x3, &(0x7f00000004c0)=""/93, 0x5d}, 0x2000) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x75, &(0x7f0000000280)={r8}, &(0x7f00000002c0)=0x18) getsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000580)=@assoc_id=r8, &(0x7f00000005c0)=0x4) mkdir(&(0x7f0000000040)='./file1\x00', 0x7b74163d495a9f21) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180), 0x100) 06:39:38 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="661e"], 0x2) perf_event_open(&(0x7f0000000180)={0x6, 0x294}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r4}, 0x14) getsockname$packet(r2, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r1, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) [ 468.767054][T21539] 9p: Unknown Cache mode fscache3 [ 468.777031][T21542] 9pnet_virtio: no channels available for device syz 06:39:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x13}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:38 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r1 = dup2(r0, 0xffffffffffffffff) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000040)) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x4000, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = socket(0x8, 0x2, 0x1f) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r3, &(0x7f0000000240)={0x11, 0x0, r5}, 0x14) getsockname$packet(r3, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r2, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r6, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x20004, 0x0) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket(0x200000000000011, 0x3, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r8, &(0x7f0000000240)={0x11, 0x0, r10}, 0x14) getsockname$packet(r8, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r7, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r11, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) r12 = socket(0x200000000000011, 0x3, 0x0) r13 = socket(0x200000000000011, 0x3, 0x0) r14 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r14, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r13, &(0x7f0000000240)={0x11, 0x0, r15}, 0x14) getsockname$packet(r13, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r12, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r16, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r12, 0x84, 0x1f, 0x0, 0x0) [ 468.967149][T21539] 9pnet_virtio: no channels available for device syz 06:39:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x14}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:38 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000240)={'nat\x00'}, &(0x7f0000000040)=0x54) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=virtio,', {[{@cache_fscache='cache=fscache'}]}}) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180), 0x100) 06:39:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="7472616e733d76697274696f2c63616368653d66736361636865330045250b2a8302c0beaff02d8d1ab2ebb1933426826105814c111c6e2bf5372da7bb339f05c2e366ebb5fe3b2e8c59810e4d93383073a535137a86586df32ee09b1b8bcc311600a9508bd08080aec03868aceda09f94ff51ab96a5f8e1"]) r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r0, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) recvmsg$kcm(r0, &(0x7f0000000540)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000480)=[{&(0x7f00000000c0)=""/12, 0xc}, {&(0x7f0000000340)=""/98, 0x62}, {&(0x7f00000003c0)=""/180, 0xb4}], 0x3, &(0x7f00000004c0)=""/93, 0x5d}, 0x2000) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x75, &(0x7f0000000280)={r8}, &(0x7f00000002c0)=0x18) getsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000580)=@assoc_id=r8, &(0x7f00000005c0)=0x4) mkdir(&(0x7f0000000040)='./file1\x00', 0x7b74163d495a9f21) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180), 0x100) 06:39:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x1c}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 469.133601][T21566] 9pnet_virtio: no channels available for device syz [ 469.151546][T21567] 9pnet_virtio: no channels available for device syz [ 469.153416][T21566] 9pnet_virtio: no channels available for device syz 06:39:39 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=virtio,', {[{@cache_fscache='cache=fscache'}]}}) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000340), 0x1000) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r0, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/status\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000600)={{{@in=@broadcast, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x8, 0x3, &(0x7f0000000580)=[{&(0x7f00000003c0)="b41714c14ac9b9309eab6ed27aac0d30ee626fde2d01b42166c074f8e77f3a742a66cab0ee98d656d7dd92796a77f321a68aecb69df059416d517a3a4c328a31cecde594f0a4318efb6d2ce6e13fd13837444af9c95b7a1a26b61d793edbb34253d80e2a67cba9337449148770ecd026119cba3bc671d725a20bb7badcbf3a778e9f33f49a970f110275d4ae0d99e0441eb613a37fce895f956d239a3d973ed9", 0xa0, 0x43c}, {&(0x7f0000000480)="450a05ea5556ea246b10c13f666658d55c277876256fdabe229a2b53c2a7800da7317bd23b08e52b02bdf6ed5286beac2c86391f5adec5818dd0b705b793a7561979d59f6fd5832b35e93bd66b54513d33c497ba4dbb57f998d67d274c49d5528952d2827a", 0x65, 0x5}, {&(0x7f0000000500)="2cdff2196274fde60a96895f5f8daa724a21e720cd31cfb4415ee7949d4837c513c80893f164b21dccf7c5a70c9377abf006f4bf93f5d2a8339822a18eee9cd9b6fd017c64ee6ce4898cdd072650b94e0deebd3520", 0x55, 0x3}], 0x80, &(0x7f0000000740)={[{@dax='dax'}, {@init_itable='init_itable'}, {@noinit_itable='noinit_itable'}, {@data_writeback='data=writeback'}], [{@fowner_eq={'fowner', 0x3d, r6}}, {@smackfshat={'smackfshat', 0x3d, 'trans=virtio,'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@hash='hash'}, {@obj_type={'obj_type', 0x3d, '+ppp1\x0e'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fsname={'fsname'}}, {@fsmagic={'fsmagic', 0x3d, 0x9}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}]}) link(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000240)='./file0\x00') r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0xc0000, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(r7, 0xc0385650, &(0x7f0000000300)={{0x0, @name="270359c09f768cb281ddb021910ce961ba899a4dadceeeeac50aab20ae085c87"}, 0x8, 0x800, 0x6}) [ 469.202210][T21561] 9pnet_virtio: no channels available for device syz 06:39:39 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) getsockopt$inet6_dccp_buf(r1, 0x21, 0x80, &(0x7f0000000080)=""/232, &(0x7f0000000180)=0xe8) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffff0f, &(0x7f0000000880)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250009000e000100400000ff050005001201", 0x2380b}], 0x1}, 0x0) [ 469.254054][T21578] 9pnet_virtio: no channels available for device syz 06:39:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x48}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 469.295587][T21581] bridge0: port 2(bridge_slave_1) entered disabled state [ 469.306388][T21578] SELinux: duplicate or incompatible mount options 06:39:39 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x84) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) listxattr(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) ioctl(r0, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$CDROMMULTISESSION(r0, 0x5310, &(0x7f0000000040)={@msf={0x3f, 0x20, 0x5}, 0x1, 0x2}) write$selinux_load(0xffffffffffffffff, &(0x7f0000000240)={0xf97cff8c, 0x8, 'SE Linux', "f7ee58e58be24e5702d614e3b3bfa952f2bf4b4b31be38373068e75ef514369d86762864233ada99e1956498a521575b5ea8ec50312ecc4e237624ad6323d0b6f5d6f60425cf5398afd90ae27eb73bcca4dbf1ea9ebd0376b396605f3b7dd5bcaf57f756d3d6a5e1ae43635829661b83"}, 0x80) iopl(0x3f) [ 469.317792][T21581] bridge0: port 1(bridge_slave_0) entered disabled state 06:39:39 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7442610500000000000000010000000100"/28]) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) ioctl(r0, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$FLOPPY_FDWERRORCLR(r0, 0x256) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x8) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180), 0x100) 06:39:39 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) getsockopt$inet6_dccp_buf(r1, 0x21, 0x80, &(0x7f0000000080)=""/232, &(0x7f0000000180)=0xe8) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffff0f, &(0x7f0000000880)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250009000e000100400000ff050005001201", 0x2380b}], 0x1}, 0x0) [ 469.466345][T21595] 9pnet_virtio: no channels available for device syz 06:39:39 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000000)={0x1, 0x5}, 0x8) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="400000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000055011600140001001000020000000081000000000000000008001b0000000000bf60691b89529d87a1b1543eb39104797f589f4b0800fbad3c27e6e332579393668f043c9c76817105e1c827afc721e9fc8649571724e2e21747c3b953c2220e6eff8698c98859cedc8fad6f758bfc4000280de13858045b21ef5b8fcd1c9c00acb1a6ec6281e5511c4ed8e5e69710ddd7e69373a394c46838f5b75d7e783935247dd457dbf6dceb09623e3c9bd1fa18933b36"], 0x40}}, 0x0) 06:39:39 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) listxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0x23b) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) 06:39:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x4a}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 469.533452][T21604] 9pnet_virtio: no channels available for device syz [ 469.554129][T21607] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 469.593342][T21613] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. 06:39:39 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$KDSETLED(r0, 0x5608, 0x7) 06:39:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x4c}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 469.695001][T21618] 9pnet_virtio: no channels available for device syz 06:39:39 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$KDSETLED(r0, 0x5608, 0x7) 06:39:39 executing program 3: r0 = io_uring_setup(0x755, &(0x7f0000000140)={0x0, 0x0, 0x8, 0x1, 0x8f}) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x100000000, 0x101200) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)=0x10000) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) sync() r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000026c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) r3 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000400)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r3, 0xc0845658, &(0x7f0000000440)={0x7366219a3e63ccea, @reserved}) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000000)={0x0, 0xffff0001, 0x1003}) 06:39:39 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) r3 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000100)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LISTALL(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x281020}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000829bd7000ffdbdf250400000008000100ea97923f080001000100000008000100020000008500010001000000428d11ba991bba9bad356492c46ef6dc718f2bcefd98dd61e143a9577803b7c30d5df4625cea5ae12017c796498ddd5ba321b5"], 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x880) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000080)) ioctl(r4, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$DRM_IOCTL_SET_CLIENT_CAP(r4, 0x4010640d, &(0x7f0000000180)={0x2, 0x13f68ce}) listxattr(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) r5 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x400000, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r5, 0x80045505, &(0x7f00000002c0)) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) [ 469.920190][T21633] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1291182335 > max in inode 16593 06:39:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x60}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 470.072296][T21633] 9pnet_virtio: no channels available for device syz 06:39:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x68}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:39 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) r2 = getpid() pidfd_open(r2, 0x0) tkill(r2, 0x3b) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3c25fe800000000000001fbaa68754ba00e8c1344f3e62d76c27e8000041020000002c80", 0x2a}], 0x1}, 0x0) 06:39:39 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x108400, 0x0) listxattr(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) ioctl(r0, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_INFO(r0, 0x805c4d65, &(0x7f0000000100)) 06:39:39 executing program 3: rt_sigprocmask(0x0, &(0x7f00000000c0)={0xfffffffffffffffe}, 0x0, 0x8) r0 = getpgrp(0x0) sendto$netrom(0xffffffffffffffff, &(0x7f0000000240)="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", 0x1000, 0x4000000, &(0x7f0000000100)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x4}, [@default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}, 0x48) r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0xb, &(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080)={0x7fffffffffffff66}, &(0x7f00000012c0), 0x0, 0x8) r2 = add_key(&(0x7f0000001240)='cifs.spnego\x00', &(0x7f0000001280)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$read(0xb, r2, &(0x7f0000001400)=""/29, 0x1d) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6}, 0x14) getsockname$packet(r4, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r3, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r7, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r8, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r9, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r3, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x120}, 0xc, &(0x7f00000001c0)={&(0x7f0000001440)=ANY=[@ANYBLOB="88d65d1b3e39c1564e49221204", @ANYRES16=r9, @ANYBLOB="00042cbd7000ffdbdf250700000044000100060001000200000008000600776c63000600010002000000060004004e2100000c000700400000001d8a7ab7080009006e0000000c0007000300000019000000080004007f00000008000600ffffff7f0400030008000400050000001400010008000b00736970000800090040000000"], 0x88}, 0x1, 0x0, 0x0, 0x20000000}, 0x4080) 06:39:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x6c}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 470.205342][T21655] IPVS: sync thread started: state = BACKUP, mcast_ifn = vcan0, syncid = 0, id = 0 06:39:40 executing program 3: rt_sigprocmask(0x0, &(0x7f00000000c0)={0xfffffffffffffffe}, 0x0, 0x8) r0 = getpgrp(0x0) sendto$netrom(0xffffffffffffffff, &(0x7f0000000240)="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", 0x1000, 0x4000000, &(0x7f0000000100)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x4}, [@default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}, 0x48) r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0xb, &(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080)={0x7fffffffffffff66}, &(0x7f00000012c0), 0x0, 0x8) r2 = add_key(&(0x7f0000001240)='cifs.spnego\x00', &(0x7f0000001280)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$read(0xb, r2, &(0x7f0000001400)=""/29, 0x1d) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6}, 0x14) getsockname$packet(r4, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r3, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r7, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r8, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r9, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r3, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x120}, 0xc, &(0x7f00000001c0)={&(0x7f0000001440)=ANY=[@ANYBLOB="88d65d1b3e39c1564e49221204", @ANYRES16=r9, @ANYBLOB="00042cbd7000ffdbdf250700000044000100060001000200000008000600776c63000600010002000000060004004e2100000c000700400000001d8a7ab7080009006e0000000c0007000300000019000000080004007f00000008000600ffffff7f0400030008000400050000001400010008000b00736970000800090040000000"], 0x88}, 0x1, 0x0, 0x0, 0x20000000}, 0x4080) 06:39:40 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) listxattr(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) lsetxattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000540)=ANY=[@ANYBLOB="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"/315], &(0x7f0000000280)='\tp\x00\x91(\xe3X\r\x7f\x02\bS_\xde\xee\xa9\xf7\x9ec\xa6~ORAi\xd8\xcb\xe8+Z\xcba,h\xc9\x19\xdcwJ\xe0\x01\xf4f\xa3\xe5C2w\x9be\x9br\xa9\xa7\xa4\xfe\x86<\xd8\xc1\x03{X\xb9\xc91l s^=\\\f\xc2Q\x82g\n\'\x8f\xe4\x1dI\x9c!{w\x10\x95jvJ\x1e\xaa\xca\xc1>\'\xef\xa8\xf6f\xeah3\xdf\x9almp\x04\x9dx/\xbb\xe4\xc0\xd5\x84>:\xc9\xf5/Y\x02a\xcbH\xc5\xc3\xf8\xea!\xc9L)\x8a\x9d\x84\x9c41;U<)\x94\xca\xa0\xebB\xeek\x9dDr\xbcT\x89\x7f\x17\x10]\x81\fE\xc0\"\xc4\xaeI\xf4\xfe$\x19<\xf8{\x90hC$\xc1#=f\xfd\xf4\xae\xc82\xb8\x9b\x9a\xa79\xc7\xa5q\xed/\xbc\xeejH\r\xe7\r&\xc3\xc8\x00}\x88\"\x15u\v+\xf3\xd3\xf0\xd8\xb4\xddD\x19\x83\xf4\a\xf3W\xd8\xb9s\x93xk3\x03?\xe1N\x81\x8a\x12\xaaW~^\xa6\x88\x11=\xd7%\x0e:4\xc2\x19\xe4\xc0\f\xbeO\x1f\xd3A\xb2>\xd08\t\xeb=\xd8\xff\x92\xe3\x01\x01~PQ\x03\x87\xf2$\xa4\xe4TG\x9a\xf5u\v*\x85\xe5\xf0\xd3\xbb#p\x00'/316, 0x13c, 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000240), 0x5, &(0x7f0000ffb000/0x3000)=nil, 0x0) 06:39:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x74}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 470.390548][T21672] 9pnet_virtio: no channels available for device syz 06:39:40 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x7400, 0xfffffffffffffffe, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) openat$fuse(0xffffffffffffff9c, &(0x7f0000001180)='/dev/fuse\x00', 0x2, 0x0) pipe(&(0x7f0000001240)={0xffffffffffffffff}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001280)='/dev/vga_arbiter\x00', 0x40, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001340)='/selinux/checkreqprot\x00', 0x10002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000001300)='cpuacct.usage_user\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000011c0)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$RNDCLEARPOOL(r3, 0x5206, &(0x7f0000000140)) ioctl$HIDIOCGRAWINFO(r0, 0x80084803, &(0x7f0000000180)=""/4096) getsockname$packet(r1, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001380)=0x14) r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6}, 0x14) getsockname$packet(r4, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) bind$bt_hci(r4, &(0x7f00000013c0)={0x1f, 0x9, 0x6}, 0x6) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f0000001200)={0x0, 0x3, 0x1}) ioctl(r0, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$HIDIOCSFEATURE(r0, 0xc0404806, &(0x7f0000000080)="93fc515d8dbb4b2b0409751190a2efabe6557c033cf9eb4521") 06:39:40 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x73174e222e315c5e) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) listxattr(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) 06:39:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 470.594180][T21686] 9pnet_virtio: no channels available for device syz 06:39:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$mice(&(0x7f0000000340)='/dev/input/mice\x00', 0x0, 0x109100) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400218) r5 = getpgid(0x0) r6 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r9 = dup(r8) fstat(r9, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r4, &(0x7f0000001140)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@cred={{0x1c, 0x1, 0x2, {r5, r7, r10}}}], 0x20, 0x840}, {0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000480)="48bba5261e4fc051aee4b4ea431bbb34a759f7c47fbb5ac1ed16bdbc328b03beb40055bc603693c92f185bd95c2bbd", 0x2f}, {&(0x7f0000000500)="594b723c6cac71330a6e941a1da3d468116954a26b726f0139d42ea530774c76894265f614ddccc1a1ede528955e8cc4dbe175c32a2a3bbcf924ba2e47952847edae486109dccf754cd589cd8fcbad730b43c908cc56b083ea97a48b99ddabeaa7c3a62b708c13c0252c8d8800a6e5250c8f7264478e1e9623fdaa4e7d15e17860e86cc364b62e2310130d41ac2600ace518c5185e463de874fa34e3d97c82afd94c76ebdd21fb97c1546e3f", 0xac}, {0x0}, {&(0x7f0000000600)}, {&(0x7f0000000640)="06f8970bd493a072c9b4f697e52640bcfb5e47dfe146bcffea0f8cdc", 0x1c}, {0x0}], 0x6, 0x0, 0x0, 0x80805}], 0x2, 0x4000) r11 = socket(0x200000000000011, 0x3, 0x0) r12 = socket(0x200000000000011, 0x3, 0x0) r13 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r12, &(0x7f0000000240)={0x11, 0x0, r14}, 0x14) getsockname$packet(r12, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r11, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r15, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r11, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @initdev}}, 0x0, @in6=@empty}}, &(0x7f0000000480)=0x200) mount$fuse(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x8000, &(0x7f00000004c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r10}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1600}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x600}}, {@allow_other='allow_other'}], [{@euid_eq={'euid', 0x3d, 0xee00}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@smackfstransmute={'smackfstransmute'}}, {@fowner_eq={'fowner', 0x3d, r16}}]}}) mount$9p_virtio(&(0x7f0000000040)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x200000, &(0x7f0000000240)=ANY=[@ANYBLOB='t,\x00']) r17 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x304000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r17, 0x40086602, &(0x7f0000000080)) ioctl(r17, 0x1, &(0x7f0000000100)="ffe0f5") fallocate(0xffffffffffffffff, 0x0, 0x401, 0x9) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x8, 0x0, 0x2, 0xfffffffffffffc01}) ioctl$DRM_IOCTL_SG_FREE(r17, 0x40106439, &(0x7f00000000c0)={0x401, r18}) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x100) 06:39:40 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) listxattr(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) ioctl(r0, 0x1, &(0x7f0000000100)="ffe0f5") execveat(r0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000001c0)=[&(0x7f0000000100)='em0em1:}-wlan1trustedmd5sum{\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000280)=[&(0x7f0000000240)='9p\x00'], 0x1000) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) 06:39:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0xc7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 470.720218][T21691] fuse: blksize only supported for fuseblk [ 470.730615][T21691] 9pnet_virtio: no channels available for device syz [ 470.730627][T21699] 9pnet_virtio: no channels available for device syz 06:39:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:40 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) listxattr(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) ioctl(r0, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000180)={0x9d0000, 0x9, 0x40, 0xffffffffffffffff, 0x0, &(0x7f0000000100)={0x445ff634ec1531f6, 0x90, [], @p_u32=&(0x7f0000000040)=0x13a9}}) r2 = syz_init_net_socket$ax25(0x3, 0x5, 0xce) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r3, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0xc7bed23ab565e0cf, 0x0) r5 = syz_open_dev$floppy(&(0x7f0000000780)='/dev/fd#\x00', 0x80000000, 0x105000) r6 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000a40)={0x0, &(0x7f0000000a00)}) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/cachefiles\x00', 0x200000, 0x0) r8 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r8, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r9 = syz_open_dev$radio(&(0x7f0000000ac0)='/dev/radio#\x00', 0x2, 0x2) r10 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r10, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r11 = fcntl$getown(r10, 0x9) r12 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r13) r14 = getegid() lstat(&(0x7f0000001700)='./file0\x00', &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r17 = dup(r16) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400218) r18 = getpgid(0x0) r19 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r19, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r22 = dup(r21) fstat(r22, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r17, &(0x7f0000001140)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@cred={{0x1c, 0x1, 0x2, {r18, r20, r23}}}], 0x20, 0x840}, {0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000480)="48bba5261e4fc051aee4b4ea431bbb34a759f7c47fbb5ac1ed16bdbc328b03beb40055bc603693c92f185bd95c2bbd", 0x2f}, {&(0x7f0000000500)="594b723c6cac71330a6e941a1da3d468116954a26b726f0139d42ea530774c76894265f614ddccc1a1ede528955e8cc4dbe175c32a2a3bbcf924ba2e47952847edae486109dccf754cd589cd8fcbad730b43c908cc56b083ea97a48b99ddabeaa7c3a62b708c13c0252c8d8800a6e5250c8f7264478e1e9623fdaa4e7d15e17860e86cc364b62e2310130d41ac2600ace518c5185e463de874fa34e3d97c82afd94c76ebdd21fb97c1546e3f", 0xac}, {0x0}, {&(0x7f0000000600)}, {&(0x7f0000000640)="06f8970bd493a072c9b4f697e52640bcfb5e47dfe146bcffea0f8cdc", 0x1c}, {0x0}], 0x6, 0x0, 0x0, 0x80805}], 0x2, 0x4000) r24 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r24, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r25 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r25, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r26 = syz_init_net_socket$llc(0x1a, 0x7, 0x0) r27 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000002a40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) r28 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000002a80)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r29 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r29, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r30 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r30, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r31 = syz_open_dev$ptys(0xc, 0x3, 0x0) r32 = syz_open_dev$loop(&(0x7f0000002ac0)='/dev/loop#\x00', 0x0, 0x0) r33 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r33, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r34 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r35 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r35, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r36 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r36, 0x40086602, &(0x7f0000000080)) ioctl(r36, 0x1, &(0x7f0000000100)="ffe0f5") r37 = openat$cgroup_procs(r36, &(0x7f0000002b00)='tasks\x00', 0x2, 0x0) r38 = accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000002b40), 0x800) r39 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r39, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r40 = getpid() pidfd_open(r40, 0x0) r41 = socket(0x200000000000011, 0x3, 0x0) r42 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r42, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r41, &(0x7f0000000240)={0x11, 0x0, r43}, 0x14) getsockname$packet(r41, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) getsockopt$inet6_IPV6_IPSEC_POLICY(r41, 0x29, 0x22, &(0x7f0000002b80)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000002c80)=0xe8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r46 = dup(r45) ioctl$PERF_EVENT_IOC_ENABLE(r46, 0x8912, 0x400218) r47 = getpgid(0x0) r48 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r48, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r49) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r51 = dup(r50) fstat(r51, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r46, &(0x7f0000001140)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@cred={{0x1c, 0x1, 0x2, {r47, r49, r52}}}], 0x20, 0x840}, {0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000480)="48bba5261e4fc051aee4b4ea431bbb34a759f7c47fbb5ac1ed16bdbc328b03beb40055bc603693c92f185bd95c2bbd", 0x2f}, {&(0x7f0000000500)="594b723c6cac71330a6e941a1da3d468116954a26b726f0139d42ea530774c76894265f614ddccc1a1ede528955e8cc4dbe175c32a2a3bbcf924ba2e47952847edae486109dccf754cd589cd8fcbad730b43c908cc56b083ea97a48b99ddabeaa7c3a62b708c13c0252c8d8800a6e5250c8f7264478e1e9623fdaa4e7d15e17860e86cc364b62e2310130d41ac2600ace518c5185e463de874fa34e3d97c82afd94c76ebdd21fb97c1546e3f", 0xac}, {0x0}, {&(0x7f0000000600)}, {&(0x7f0000000640)="06f8970bd493a072c9b4f697e52640bcfb5e47dfe146bcffea0f8cdc", 0x1c}, {0x0}], 0x6, 0x0, 0x0, 0x80805}], 0x2, 0x4000) r53 = syz_open_dev$sndhw(&(0x7f0000002cc0)='/dev/snd/hwC#D#\x00', 0x0, 0x0) r54 = syz_open_dev$vcsa(&(0x7f0000002e80)='/dev/vcsa#\x00', 0xab6, 0x200) r55 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r55, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r56 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r56, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r57 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r57, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r58 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r58, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r59 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r59, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r60 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r60, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r61 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r61, &(0x7f0000000a00)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r62 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r62, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r63 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r63, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r64 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000002ec0)='/selinux/relabel\x00', 0x2, 0x0) r65 = syz_open_dev$radio(&(0x7f0000002f00)='/dev/radio#\x00', 0x1, 0x2) r66 = userfaultfd(0x1800) r67 = getpid() pidfd_open(r67, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000002f40)='./file0/file0\x00', &(0x7f0000002f80)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r70 = dup(r69) ioctl$PERF_EVENT_IOC_ENABLE(r70, 0x8912, 0x400218) r71 = getpgid(0x0) r72 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r72, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) dup(r74) clone3(&(0x7f0000002d00)={0x41000, &(0x7f00000007c0)=0xffffffffffffffff, &(0x7f0000000800), &(0x7f0000000840), {0xf}, &(0x7f0000000880)=""/83, 0x53, &(0x7f0000000900)=""/146, &(0x7f00000009c0)=[r40, 0x0, 0x0, r40, 0xffffffffffffffff, 0x0], 0x6}, 0x50) fstat(r75, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r70, &(0x7f0000001140)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@cred={{0x1c, 0x1, 0x2, {r71, r73, r76}}}], 0x20, 0x840}, {0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000480)="48bba5261e4fc051aee4b4ea431bbb34a759f7c47fbb5ac1ed16bdbc328b03beb40055bc603693c92f185bd95c2bbd", 0x2f}, {&(0x7f0000000500)="594b723c6cac71330a6e941a1da3d468116954a26b726f0139d42ea530774c76894265f614ddccc1a1ede528955e8cc4dbe175c32a2a3bbcf924ba2e47952847edae486109dccf754cd589cd8fcbad730b43c908cc56b083ea97a48b99ddabeaa7c3a62b708c13c0252c8d8800a6e5250c8f7264478e1e9623fdaa4e7d15e17860e86cc364b62e2310130d41ac2600ace518c5185e463de874fa34e3d97c82afd94c76ebdd21fb97c1546e3f", 0xac}, {0x0}, {&(0x7f0000000600)}, {&(0x7f0000000640)="06f8970bd493a072c9b4f697e52640bcfb5e47dfe146bcffea0f8cdc", 0x1c}, {0x0}], 0x6, 0x0, 0x0, 0x80805}], 0x2, 0x4000) r77 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000003000)='/dev/udmabuf\x00', 0x2) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f00000030c0)={0x9f0000, 0xbf, 0x9, 0xffffffffffffffff, 0x0, &(0x7f0000003080)={0x990a2d, 0x6, [], @p_u8=&(0x7f0000003040)=0x29}}) sendmmsg$unix(r1, &(0x7f0000003440)=[{&(0x7f0000000240)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f00000006c0)=[{&(0x7f00000002c0)="ea1a7388e458c590173ec8fd6aa2afe1b233c1a980fbb4945003bc52e91d09b67ecaa2181f3a0186c42653c293a95639a1d388ae629a0dbe8c33bdab99d5fba7e081e30bb969e1e57a38b6ea4e81", 0x4e}, {&(0x7f00000001c0)="2e0df10f3cf625610a983efb0aa52c685dffc13453df15ab36dc20e23ac95bbc", 0x20}, {&(0x7f0000000340)="308aec5bf8f8a089c3f2e437a6def88328c74c742e485dfe6230312e6fbed45271b12c50655be26724b5bb2d5837fa71acd6f1bab837a15284db44f8a8aaf275aa0e539cb66e1eba20f624694213e7c661ddc140e69a81", 0x57}, {&(0x7f00000003c0)="ec35c6e2403be40706f1e27c443ec5dafc45fa5ec3f925d42fd04c35d9567bb4e389223067f57b2f6a7acffbc8c73a8824dda09173501c98220deaf730441d48e4e58eb75d2323f50811a11a93edc8de565eae188877865f105de83d23e42b08586bc8485be9789a9d576443fc7ee4b6", 0x70}, {&(0x7f0000000440)="0a85901a76e7546d71c0fa8a2f6d7da95be6eee6b934d941463ddd56871e20547cf89bf1400894bcff414dbff5537886fb4c8f6901da57b18bac7db7a18c4078e93dd22eacf154844810d19270d17c66f656a80e21e30ac125bb9d9a5c82b5cfc3812a449be19c9a4e0ec8cebccc3b6b293a1751279a51d8458603f2b7dc43b533d582a1546df674440c0bdd0323cbef53edb3013cb32d32b56d948ac2635b0101616a2eac84205353d0fdd536f0ff074a69626ba50e774225a9f07da76c2aad6b85eb49c5a9934c62c2ee2985b8990752f0d1cb", 0xd4}, {&(0x7f0000000540)="605793098bbbb4155e55ed099923ae0bab53923da465d8e1bf87ffb9ac97f7dbdbec2256bd97b91a6525b3d49549441121f3f6362298813e13b736fd3df9284519317d", 0x43}, {&(0x7f00000005c0)="7d58971ce3ca47ac494b180944a87f0669d05315267896a5d5589779512a6bc8acd14228136bca6a879e7d054d3f260dda2e130098a06c3b6a7d8841f3aaa78d17b2fe4a020f11ef075d43780f091ff43ca3e4dcb591663bc142a7328c0ad373e834986aea6e6a313c4588b566683ebb129802fc8a050c8daf65ee14cdcffdc23bc9a9e7d6157b4db0e27690b3cfc5bbf0d219d554d31c5bfce97c36baf4b29164493701bc16385c5fc6aee4782eccc1a015d49fe02ffa9d615f016b1de2e54deffaacef1851ae8d98eadee16aeb7978f17bf79f90d110a0149088ef915718a0abd2408281258edc684310b443", 0xed}], 0x7, &(0x7f0000000b00)=[@rights={{0x30, 0x1, 0x1, [r2, r3, r4, r5, r6, r7, r8, r9]}}, @cred={{0x1c, 0x1, 0x2, {r11, r13, r14}}}], 0x50, 0x8841}, {&(0x7f0000000b80)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000001140)=[{&(0x7f0000000c00)="7239f79714f66ce116e327bb4620263bc1d5bcfc664b77f26275e82020813ce7291e1a981b99caa30ea047c579552f04e4d82654100becc68b0f8e10fa84ea5bf2de04713997803847b23a12e0b2a912e560cbff20341a17f390fa83b8ac1f813b4fc4d16fc425c782a59bd5859a5a07cf03c7bb53e8fb2e04787283e81b2a4031b3361abe4086cb8b2ba82154c744459938b6a580446628dd63457f5143bd3929aa8a9f5ed70b50af8cfdc66d09109515a4b863d2ecf56916d48c054ca4b9b366c4c2f02128ccf0", 0xc8}, {&(0x7f0000000d00)="747279e011320a8515d96980c4ffeadd3f103421bf230cb048cd4e35475681f0d48f7a8c4e38b9dfe24d0025e398f719ce2367be5437f0a70d675a29df0707", 0x3f}, {&(0x7f0000000d40)="c183882959dfce5b228f39278b84a321b440e628e86b544c3b7ed32886fdc1c28967e85b4d", 0x25}, {&(0x7f0000000d80)="d81913127ee9de6d1eb8080ecbd6b6d1032fad9c8ba195e015c62fc6d080258e42799f4f5d613adac65688ff1d35c2bdc6d82aa3bd3f2236887c03752f68e255ca6315cb2df1228b76f2483e69d9a62f49766fb25b0c23369e161fb50c0277af59359b82e8f03176de77fbd6ed6dc3d5c50f69fb8c380d5204cc368a6f66c84b3b368ceeb3ce5cb0c8b125d98ebf088c9c6de74e58f03ae7e58087d734843ae0ac64023ada5dc3cdcbefa9", 0xab}, {&(0x7f0000000e40)="b44a38b6f742bc1be86cfe7b6ebe69505f6df1fb126181dc", 0x18}, {&(0x7f0000000e80)="757653083815387c740a9a5ab165655d4f467f8fd542", 0x16}, {&(0x7f0000000ec0)="b307fc49dddb6a21d18333d2b84646a7e0b5867cae03488762d20a7cb5d27a5eb5e8c693dcf21ca2671378a75c61987c63196eda0250ba20c4b66416c674f078dd81a8b39a6f17de3868bd67951bfb238f827618a85a0101185ebb1a9c0d34b93a9f8bdd5fa47370a6218fc7847c206d72b512f26b78bb7bd62164bde9b21b0f017f41", 0x83}, {&(0x7f0000000f80)="20f909feba7e3b0e30917d4dbcfbd1e320f05c5ba1ec8ef7efdc02faf60ff0b9728607854e41d68c7102b9328a8954f70acf8129a14913f187ca725fc0dcd8551226b13a0e4f427a6778f02de2fcb18b121089e1fb0099f9b161945a873b6c2b2938a5194908af377842ab9f5f474a7a60ac8a1b0c6c0a022ee68bdf265ffd091e11b50a4280f76b95e9b1744770bc56bc7c53dc0948ab22c60aa7ca92c58ce22408ab6e83534904", 0xa8}, {&(0x7f0000001040)="36d89b23577f6bda20f25bf45c877c145b333dfd6a0e0e58b45d717e219dd07fe5f22ad95cf29f0792478cc3b7ab354b1b071a3a5c9ae82a00c91066d88b08e2c19d4da0e90c5cccf4bc21725d953480f09ff15f8931c38aa2f71b8eece2c9ab8d21d64c1c6e4fc0da7edf0d7e88d0e0daaff7d6973aa8f07a9163aa55d0197fbf391846793675fb36ee3197a0f086cee623ac14cbe9530eea0248795c67f77dcd6be412776c32dcbe3d85fe9caf02fbd91e1372", 0xb4}, {&(0x7f0000001100)="e6764fbfd55e081b5c2093958d71", 0xe}], 0xa, 0x0, 0x0, 0x800}, {&(0x7f0000001200)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000001680)=[{&(0x7f0000001280)="19da14f8a6701534e3cf6146e389a5e8e98e7c61a4d097238cd20b3e874665c1aef5bd93e4d8be4d63e67b318b5e93c714bee3c03bff1a24361249eb3accf5bee359089371d192166e0c98a25bb9558ee78aa03b77a551d87c2fcf05447dc4233a6400d20a5f8bead198b51d83e4fcbb347c7ee2e13641f0a9547a40bd8b746f449b18830b", 0x85}, {&(0x7f0000001340)="efcaa2421aa9f57aefb8be8f7f65bf4b5341bb4563fba6b87e4213fb08a2185356f35752d8995207ab942d71de0f0ab90b9d99bdb9eadd978bfe73adb70e623ce1d98f25cf47c07473a8ecfa94", 0x4d}, {&(0x7f00000013c0)="be38728c33717630963c79932f2d2d50b8d5eff792815f6a8863deb6c53b0a155230834f00f8ffe51156559fc6ed2737bae7c1b202e2aeb02763ee058071e275f5c0a8b7590a3be0f638d1f6c81cc1c5068884975198cf47bdaf8eb644456d19d59e53a65bc403ac101d6d1a397dabb9837d5cc44be6", 0x76}, {&(0x7f0000001440)="50640bc1575c713dce0aa2c16c6f5fd068820cd06156c61fedeb25c1c0d1a02c831022991506567d972598428c8f6b3e87c683eaa3eb77c84477d1bf28669462a08f750b88ef54812dc80c512801aad76136df2d4fe4a53d7d1a1837030239000a05cba63ded335a702eb4edc0c353d0bbfb05fde7f1cb57593d82ca15b6d153ad70d143ec8f52dcd239195693d1626c8e37d9dd5d17f79794858ffa833151ae7549f71cff0d08ffafac87313b71d9fbeb0e3386dfbbca4f6b77fd8575f436d443edf68f4dbc0d5b67fc", 0xca}, {&(0x7f0000001540)="f099b36fdc4a6d77efafe0d9d31f248be6f91d7b376da6cb179ae319fb14995f7e46977c85edbf5fa18eac6a2cc49ebb87182c237258883eae09263e756ff1d26c70ebdf480b7bd78c40409f15ee2b675458ee4cc926", 0x56}, {&(0x7f00000015c0)="e3992b2b736c27828096ea16f4fb5762693cf8c9b1f6d653a42a2247018304c7218a122fb29eb5e74aee6b3401469d9f5d6119cf23c6a6b7e935789cae847f2761d40c835e95fb263d9d01dc102a3128bfcc108eb299e97bf8d04f9edc3c3ed89b20d29afa0e3e85fb6c6c317cab3d3a7e1c7e1553c34c0dc01a2a1db73e9da96a3853dae8", 0x85}], 0x6, &(0x7f00000017c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, r15, r23}}}], 0x20, 0x10}, {&(0x7f0000001800)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002a00)=[{&(0x7f0000001880)="52250a825735ee416924d9db4ae85b69a87fb83acd9b8d345ac2c10d38a807cdda5c0eb753f75cb8d54e805ad5f9431f1297937defb51ad1fa073aa0db52abcb34aa4bd41f1925e34e64d38c39327e39f95870c037ac81aba5571a6969d208bdd57caf52e37b1aaa3e2bf578c371e4a7abac9c0efae7f39bb6f5aefd2b71fcfef7b67b4c79fa1f7997c32e71f4e51876994432052750a0385178971bc90c78d94ad05494d138", 0xa6}, {&(0x7f0000001940)="397eb6484dc5ea9b8a1a8e24656ef0980a9c4e85623388369e6d0d1afbecf20b8b46c785e1ff654578732d58095e32b18a0a38dd727b1010dd370a73c7f1cb66ab47701a89786f6963a6037cadd97f55f53cd4a77654b60aeea4fafd53b62d4b080f23d91c487b5135d3735d5404fc596cc07780", 0x74}, {&(0x7f00000019c0)="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", 0x1000}, {&(0x7f00000029c0)="cc5fe0192eb958414b1b81d3e48878a0aa90f7171670182637538f0886663566cf7fbb4622e6ced7f391b7952f946943d363", 0x32}], 0x4, &(0x7f0000003100)=[@rights={{0x2c, 0x1, 0x1, [r24, r25, r26, r27, r28, 0xffffffffffffffff, r29]}}, @rights={{0x20, 0x1, 0x1, [r30, 0xffffffffffffffff, r31, r32]}}, @rights={{0x30, 0x1, 0x1, [r33, r34, r35, 0xffffffffffffffff, r37, r38, 0xffffffffffffffff, r39]}}, @cred={{0x1c, 0x1, 0x2, {r40, r44, r52}}}, @rights={{0x18, 0x1, 0x1, [r53, r54]}}, @rights={{0x28, 0x1, 0x1, [r55, r56, r57, r58, r59, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [r60, r61, r62, r63, r64, r65, r66, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r67, r68, r76}}}, @rights={{0x18, 0x1, 0x1, [r77, r78]}}], 0x148, 0x11}, {&(0x7f0000003280)=@file={0x0, './file0/../file0\x00'}, 0x6e, &(0x7f0000003400)=[{&(0x7f0000003300)="a0fb2f375479c9a333cd0b6b26e2a40e027ed6d0b38bea296333b034d599585035261436df656e74475b836c81f8bcd4fc7176d1935ba7404b23e5d6b80dc36aa2fcdcac785fb2c63224edb43447d74905271b057736511f073da2f0a0bc2427ae3ff5d1f44b7b03a79bc8b1d8c958255c4867d1a3f026287e8bcbdf555b9a2d51a56936ea2e1595c732123b707f084f2e1fa61901b989a5992e6e0ec9b5ab1a09ce1dec1e8a3101836b791ce5d9cc53803decc338c0eef339d2be990e13046e3e0511091a8f98daea96b362055c1af0b4d8dab60c42baf8e9eea61c05e21fe994dcb77e84b11ea678ab", 0xea}], 0x1, 0x0, 0x0, 0x800}], 0x5, 0x88000) 06:39:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) listxattr(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) ioctl(r0, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000180)={0x9d0000, 0x9, 0x40, 0xffffffffffffffff, 0x0, &(0x7f0000000100)={0x445ff634ec1531f6, 0x90, [], @p_u32=&(0x7f0000000040)=0x13a9}}) r2 = syz_init_net_socket$ax25(0x3, 0x5, 0xce) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r3, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0xc7bed23ab565e0cf, 0x0) r5 = syz_open_dev$floppy(&(0x7f0000000780)='/dev/fd#\x00', 0x80000000, 0x105000) r6 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000a40)={0x0, &(0x7f0000000a00)}) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/cachefiles\x00', 0x200000, 0x0) r8 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r8, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r9 = syz_open_dev$radio(&(0x7f0000000ac0)='/dev/radio#\x00', 0x2, 0x2) r10 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r10, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r11 = fcntl$getown(r10, 0x9) r12 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r13) r14 = getegid() lstat(&(0x7f0000001700)='./file0\x00', &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r17 = dup(r16) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400218) r18 = getpgid(0x0) r19 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r19, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r22 = dup(r21) fstat(r22, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r17, &(0x7f0000001140)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@cred={{0x1c, 0x1, 0x2, {r18, r20, r23}}}], 0x20, 0x840}, {0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000480)="48bba5261e4fc051aee4b4ea431bbb34a759f7c47fbb5ac1ed16bdbc328b03beb40055bc603693c92f185bd95c2bbd", 0x2f}, {&(0x7f0000000500)="594b723c6cac71330a6e941a1da3d468116954a26b726f0139d42ea530774c76894265f614ddccc1a1ede528955e8cc4dbe175c32a2a3bbcf924ba2e47952847edae486109dccf754cd589cd8fcbad730b43c908cc56b083ea97a48b99ddabeaa7c3a62b708c13c0252c8d8800a6e5250c8f7264478e1e9623fdaa4e7d15e17860e86cc364b62e2310130d41ac2600ace518c5185e463de874fa34e3d97c82afd94c76ebdd21fb97c1546e3f", 0xac}, {0x0}, {&(0x7f0000000600)}, {&(0x7f0000000640)="06f8970bd493a072c9b4f697e52640bcfb5e47dfe146bcffea0f8cdc", 0x1c}, {0x0}], 0x6, 0x0, 0x0, 0x80805}], 0x2, 0x4000) r24 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r24, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r25 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r25, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r26 = syz_init_net_socket$llc(0x1a, 0x7, 0x0) r27 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000002a40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) r28 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000002a80)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r29 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r29, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r30 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r30, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r31 = syz_open_dev$ptys(0xc, 0x3, 0x0) r32 = syz_open_dev$loop(&(0x7f0000002ac0)='/dev/loop#\x00', 0x0, 0x0) r33 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r33, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r34 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r35 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r35, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r36 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r36, 0x40086602, &(0x7f0000000080)) ioctl(r36, 0x1, &(0x7f0000000100)="ffe0f5") r37 = openat$cgroup_procs(r36, &(0x7f0000002b00)='tasks\x00', 0x2, 0x0) r38 = accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000002b40), 0x800) r39 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r39, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r40 = getpid() pidfd_open(r40, 0x0) r41 = socket(0x200000000000011, 0x3, 0x0) r42 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r42, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r41, &(0x7f0000000240)={0x11, 0x0, r43}, 0x14) getsockname$packet(r41, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) getsockopt$inet6_IPV6_IPSEC_POLICY(r41, 0x29, 0x22, &(0x7f0000002b80)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000002c80)=0xe8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r46 = dup(r45) ioctl$PERF_EVENT_IOC_ENABLE(r46, 0x8912, 0x400218) r47 = getpgid(0x0) r48 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r48, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r49) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r51 = dup(r50) fstat(r51, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r46, &(0x7f0000001140)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@cred={{0x1c, 0x1, 0x2, {r47, r49, r52}}}], 0x20, 0x840}, {0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000480)="48bba5261e4fc051aee4b4ea431bbb34a759f7c47fbb5ac1ed16bdbc328b03beb40055bc603693c92f185bd95c2bbd", 0x2f}, {&(0x7f0000000500)="594b723c6cac71330a6e941a1da3d468116954a26b726f0139d42ea530774c76894265f614ddccc1a1ede528955e8cc4dbe175c32a2a3bbcf924ba2e47952847edae486109dccf754cd589cd8fcbad730b43c908cc56b083ea97a48b99ddabeaa7c3a62b708c13c0252c8d8800a6e5250c8f7264478e1e9623fdaa4e7d15e17860e86cc364b62e2310130d41ac2600ace518c5185e463de874fa34e3d97c82afd94c76ebdd21fb97c1546e3f", 0xac}, {0x0}, {&(0x7f0000000600)}, {&(0x7f0000000640)="06f8970bd493a072c9b4f697e52640bcfb5e47dfe146bcffea0f8cdc", 0x1c}, {0x0}], 0x6, 0x0, 0x0, 0x80805}], 0x2, 0x4000) r53 = syz_open_dev$sndhw(&(0x7f0000002cc0)='/dev/snd/hwC#D#\x00', 0x0, 0x0) r54 = syz_open_dev$vcsa(&(0x7f0000002e80)='/dev/vcsa#\x00', 0xab6, 0x200) r55 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r55, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r56 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r56, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r57 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r57, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r58 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r58, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r59 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r59, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r60 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r60, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r61 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r61, &(0x7f0000000a00)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r62 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r62, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r63 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r63, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r64 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000002ec0)='/selinux/relabel\x00', 0x2, 0x0) r65 = syz_open_dev$radio(&(0x7f0000002f00)='/dev/radio#\x00', 0x1, 0x2) r66 = userfaultfd(0x1800) r67 = getpid() pidfd_open(r67, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000002f40)='./file0/file0\x00', &(0x7f0000002f80)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r70 = dup(r69) ioctl$PERF_EVENT_IOC_ENABLE(r70, 0x8912, 0x400218) r71 = getpgid(0x0) r72 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r72, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r73) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) dup(r74) clone3(&(0x7f0000002d00)={0x41000, &(0x7f00000007c0)=0xffffffffffffffff, &(0x7f0000000800), &(0x7f0000000840), {0xf}, &(0x7f0000000880)=""/83, 0x53, &(0x7f0000000900)=""/146, &(0x7f00000009c0)=[r40, 0x0, 0x0, r40, 0xffffffffffffffff, 0x0], 0x6}, 0x50) fstat(r75, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r70, &(0x7f0000001140)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@cred={{0x1c, 0x1, 0x2, {r71, r73, r76}}}], 0x20, 0x840}, {0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000480)="48bba5261e4fc051aee4b4ea431bbb34a759f7c47fbb5ac1ed16bdbc328b03beb40055bc603693c92f185bd95c2bbd", 0x2f}, {&(0x7f0000000500)="594b723c6cac71330a6e941a1da3d468116954a26b726f0139d42ea530774c76894265f614ddccc1a1ede528955e8cc4dbe175c32a2a3bbcf924ba2e47952847edae486109dccf754cd589cd8fcbad730b43c908cc56b083ea97a48b99ddabeaa7c3a62b708c13c0252c8d8800a6e5250c8f7264478e1e9623fdaa4e7d15e17860e86cc364b62e2310130d41ac2600ace518c5185e463de874fa34e3d97c82afd94c76ebdd21fb97c1546e3f", 0xac}, {0x0}, {&(0x7f0000000600)}, {&(0x7f0000000640)="06f8970bd493a072c9b4f697e52640bcfb5e47dfe146bcffea0f8cdc", 0x1c}, {0x0}], 0x6, 0x0, 0x0, 0x80805}], 0x2, 0x4000) r77 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000003000)='/dev/udmabuf\x00', 0x2) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f00000030c0)={0x9f0000, 0xbf, 0x9, 0xffffffffffffffff, 0x0, &(0x7f0000003080)={0x990a2d, 0x6, [], @p_u8=&(0x7f0000003040)=0x29}}) sendmmsg$unix(r1, &(0x7f0000003440)=[{&(0x7f0000000240)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f00000006c0)=[{&(0x7f00000002c0)="ea1a7388e458c590173ec8fd6aa2afe1b233c1a980fbb4945003bc52e91d09b67ecaa2181f3a0186c42653c293a95639a1d388ae629a0dbe8c33bdab99d5fba7e081e30bb969e1e57a38b6ea4e81", 0x4e}, {&(0x7f00000001c0)="2e0df10f3cf625610a983efb0aa52c685dffc13453df15ab36dc20e23ac95bbc", 0x20}, {&(0x7f0000000340)="308aec5bf8f8a089c3f2e437a6def88328c74c742e485dfe6230312e6fbed45271b12c50655be26724b5bb2d5837fa71acd6f1bab837a15284db44f8a8aaf275aa0e539cb66e1eba20f624694213e7c661ddc140e69a81", 0x57}, {&(0x7f00000003c0)="ec35c6e2403be40706f1e27c443ec5dafc45fa5ec3f925d42fd04c35d9567bb4e389223067f57b2f6a7acffbc8c73a8824dda09173501c98220deaf730441d48e4e58eb75d2323f50811a11a93edc8de565eae188877865f105de83d23e42b08586bc8485be9789a9d576443fc7ee4b6", 0x70}, {&(0x7f0000000440)="0a85901a76e7546d71c0fa8a2f6d7da95be6eee6b934d941463ddd56871e20547cf89bf1400894bcff414dbff5537886fb4c8f6901da57b18bac7db7a18c4078e93dd22eacf154844810d19270d17c66f656a80e21e30ac125bb9d9a5c82b5cfc3812a449be19c9a4e0ec8cebccc3b6b293a1751279a51d8458603f2b7dc43b533d582a1546df674440c0bdd0323cbef53edb3013cb32d32b56d948ac2635b0101616a2eac84205353d0fdd536f0ff074a69626ba50e774225a9f07da76c2aad6b85eb49c5a9934c62c2ee2985b8990752f0d1cb", 0xd4}, {&(0x7f0000000540)="605793098bbbb4155e55ed099923ae0bab53923da465d8e1bf87ffb9ac97f7dbdbec2256bd97b91a6525b3d49549441121f3f6362298813e13b736fd3df9284519317d", 0x43}, {&(0x7f00000005c0)="7d58971ce3ca47ac494b180944a87f0669d05315267896a5d5589779512a6bc8acd14228136bca6a879e7d054d3f260dda2e130098a06c3b6a7d8841f3aaa78d17b2fe4a020f11ef075d43780f091ff43ca3e4dcb591663bc142a7328c0ad373e834986aea6e6a313c4588b566683ebb129802fc8a050c8daf65ee14cdcffdc23bc9a9e7d6157b4db0e27690b3cfc5bbf0d219d554d31c5bfce97c36baf4b29164493701bc16385c5fc6aee4782eccc1a015d49fe02ffa9d615f016b1de2e54deffaacef1851ae8d98eadee16aeb7978f17bf79f90d110a0149088ef915718a0abd2408281258edc684310b443", 0xed}], 0x7, &(0x7f0000000b00)=[@rights={{0x30, 0x1, 0x1, [r2, r3, r4, r5, r6, r7, r8, r9]}}, @cred={{0x1c, 0x1, 0x2, {r11, r13, r14}}}], 0x50, 0x8841}, {&(0x7f0000000b80)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000001140)=[{&(0x7f0000000c00)="7239f79714f66ce116e327bb4620263bc1d5bcfc664b77f26275e82020813ce7291e1a981b99caa30ea047c579552f04e4d82654100becc68b0f8e10fa84ea5bf2de04713997803847b23a12e0b2a912e560cbff20341a17f390fa83b8ac1f813b4fc4d16fc425c782a59bd5859a5a07cf03c7bb53e8fb2e04787283e81b2a4031b3361abe4086cb8b2ba82154c744459938b6a580446628dd63457f5143bd3929aa8a9f5ed70b50af8cfdc66d09109515a4b863d2ecf56916d48c054ca4b9b366c4c2f02128ccf0", 0xc8}, {&(0x7f0000000d00)="747279e011320a8515d96980c4ffeadd3f103421bf230cb048cd4e35475681f0d48f7a8c4e38b9dfe24d0025e398f719ce2367be5437f0a70d675a29df0707", 0x3f}, {&(0x7f0000000d40)="c183882959dfce5b228f39278b84a321b440e628e86b544c3b7ed32886fdc1c28967e85b4d", 0x25}, {&(0x7f0000000d80)="d81913127ee9de6d1eb8080ecbd6b6d1032fad9c8ba195e015c62fc6d080258e42799f4f5d613adac65688ff1d35c2bdc6d82aa3bd3f2236887c03752f68e255ca6315cb2df1228b76f2483e69d9a62f49766fb25b0c23369e161fb50c0277af59359b82e8f03176de77fbd6ed6dc3d5c50f69fb8c380d5204cc368a6f66c84b3b368ceeb3ce5cb0c8b125d98ebf088c9c6de74e58f03ae7e58087d734843ae0ac64023ada5dc3cdcbefa9", 0xab}, {&(0x7f0000000e40)="b44a38b6f742bc1be86cfe7b6ebe69505f6df1fb126181dc", 0x18}, {&(0x7f0000000e80)="757653083815387c740a9a5ab165655d4f467f8fd542", 0x16}, {&(0x7f0000000ec0)="b307fc49dddb6a21d18333d2b84646a7e0b5867cae03488762d20a7cb5d27a5eb5e8c693dcf21ca2671378a75c61987c63196eda0250ba20c4b66416c674f078dd81a8b39a6f17de3868bd67951bfb238f827618a85a0101185ebb1a9c0d34b93a9f8bdd5fa47370a6218fc7847c206d72b512f26b78bb7bd62164bde9b21b0f017f41", 0x83}, {&(0x7f0000000f80)="20f909feba7e3b0e30917d4dbcfbd1e320f05c5ba1ec8ef7efdc02faf60ff0b9728607854e41d68c7102b9328a8954f70acf8129a14913f187ca725fc0dcd8551226b13a0e4f427a6778f02de2fcb18b121089e1fb0099f9b161945a873b6c2b2938a5194908af377842ab9f5f474a7a60ac8a1b0c6c0a022ee68bdf265ffd091e11b50a4280f76b95e9b1744770bc56bc7c53dc0948ab22c60aa7ca92c58ce22408ab6e83534904", 0xa8}, {&(0x7f0000001040)="36d89b23577f6bda20f25bf45c877c145b333dfd6a0e0e58b45d717e219dd07fe5f22ad95cf29f0792478cc3b7ab354b1b071a3a5c9ae82a00c91066d88b08e2c19d4da0e90c5cccf4bc21725d953480f09ff15f8931c38aa2f71b8eece2c9ab8d21d64c1c6e4fc0da7edf0d7e88d0e0daaff7d6973aa8f07a9163aa55d0197fbf391846793675fb36ee3197a0f086cee623ac14cbe9530eea0248795c67f77dcd6be412776c32dcbe3d85fe9caf02fbd91e1372", 0xb4}, {&(0x7f0000001100)="e6764fbfd55e081b5c2093958d71", 0xe}], 0xa, 0x0, 0x0, 0x800}, {&(0x7f0000001200)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000001680)=[{&(0x7f0000001280)="19da14f8a6701534e3cf6146e389a5e8e98e7c61a4d097238cd20b3e874665c1aef5bd93e4d8be4d63e67b318b5e93c714bee3c03bff1a24361249eb3accf5bee359089371d192166e0c98a25bb9558ee78aa03b77a551d87c2fcf05447dc4233a6400d20a5f8bead198b51d83e4fcbb347c7ee2e13641f0a9547a40bd8b746f449b18830b", 0x85}, {&(0x7f0000001340)="efcaa2421aa9f57aefb8be8f7f65bf4b5341bb4563fba6b87e4213fb08a2185356f35752d8995207ab942d71de0f0ab90b9d99bdb9eadd978bfe73adb70e623ce1d98f25cf47c07473a8ecfa94", 0x4d}, {&(0x7f00000013c0)="be38728c33717630963c79932f2d2d50b8d5eff792815f6a8863deb6c53b0a155230834f00f8ffe51156559fc6ed2737bae7c1b202e2aeb02763ee058071e275f5c0a8b7590a3be0f638d1f6c81cc1c5068884975198cf47bdaf8eb644456d19d59e53a65bc403ac101d6d1a397dabb9837d5cc44be6", 0x76}, {&(0x7f0000001440)="50640bc1575c713dce0aa2c16c6f5fd068820cd06156c61fedeb25c1c0d1a02c831022991506567d972598428c8f6b3e87c683eaa3eb77c84477d1bf28669462a08f750b88ef54812dc80c512801aad76136df2d4fe4a53d7d1a1837030239000a05cba63ded335a702eb4edc0c353d0bbfb05fde7f1cb57593d82ca15b6d153ad70d143ec8f52dcd239195693d1626c8e37d9dd5d17f79794858ffa833151ae7549f71cff0d08ffafac87313b71d9fbeb0e3386dfbbca4f6b77fd8575f436d443edf68f4dbc0d5b67fc", 0xca}, {&(0x7f0000001540)="f099b36fdc4a6d77efafe0d9d31f248be6f91d7b376da6cb179ae319fb14995f7e46977c85edbf5fa18eac6a2cc49ebb87182c237258883eae09263e756ff1d26c70ebdf480b7bd78c40409f15ee2b675458ee4cc926", 0x56}, {&(0x7f00000015c0)="e3992b2b736c27828096ea16f4fb5762693cf8c9b1f6d653a42a2247018304c7218a122fb29eb5e74aee6b3401469d9f5d6119cf23c6a6b7e935789cae847f2761d40c835e95fb263d9d01dc102a3128bfcc108eb299e97bf8d04f9edc3c3ed89b20d29afa0e3e85fb6c6c317cab3d3a7e1c7e1553c34c0dc01a2a1db73e9da96a3853dae8", 0x85}], 0x6, &(0x7f00000017c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, r15, r23}}}], 0x20, 0x10}, {&(0x7f0000001800)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002a00)=[{&(0x7f0000001880)="52250a825735ee416924d9db4ae85b69a87fb83acd9b8d345ac2c10d38a807cdda5c0eb753f75cb8d54e805ad5f9431f1297937defb51ad1fa073aa0db52abcb34aa4bd41f1925e34e64d38c39327e39f95870c037ac81aba5571a6969d208bdd57caf52e37b1aaa3e2bf578c371e4a7abac9c0efae7f39bb6f5aefd2b71fcfef7b67b4c79fa1f7997c32e71f4e51876994432052750a0385178971bc90c78d94ad05494d138", 0xa6}, {&(0x7f0000001940)="397eb6484dc5ea9b8a1a8e24656ef0980a9c4e85623388369e6d0d1afbecf20b8b46c785e1ff654578732d58095e32b18a0a38dd727b1010dd370a73c7f1cb66ab47701a89786f6963a6037cadd97f55f53cd4a77654b60aeea4fafd53b62d4b080f23d91c487b5135d3735d5404fc596cc07780", 0x74}, {&(0x7f00000019c0)="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", 0x1000}, {&(0x7f00000029c0)="cc5fe0192eb958414b1b81d3e48878a0aa90f7171670182637538f0886663566cf7fbb4622e6ced7f391b7952f946943d363", 0x32}], 0x4, &(0x7f0000003100)=[@rights={{0x2c, 0x1, 0x1, [r24, r25, r26, r27, r28, 0xffffffffffffffff, r29]}}, @rights={{0x20, 0x1, 0x1, [r30, 0xffffffffffffffff, r31, r32]}}, @rights={{0x30, 0x1, 0x1, [r33, r34, r35, 0xffffffffffffffff, r37, r38, 0xffffffffffffffff, r39]}}, @cred={{0x1c, 0x1, 0x2, {r40, r44, r52}}}, @rights={{0x18, 0x1, 0x1, [r53, r54]}}, @rights={{0x28, 0x1, 0x1, [r55, r56, r57, r58, r59, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [r60, r61, r62, r63, r64, r65, r66, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r67, r68, r76}}}, @rights={{0x18, 0x1, 0x1, [r77, r78]}}], 0x148, 0x11}, {&(0x7f0000003280)=@file={0x0, './file0/../file0\x00'}, 0x6e, &(0x7f0000003400)=[{&(0x7f0000003300)="a0fb2f375479c9a333cd0b6b26e2a40e027ed6d0b38bea296333b034d599585035261436df656e74475b836c81f8bcd4fc7176d1935ba7404b23e5d6b80dc36aa2fcdcac785fb2c63224edb43447d74905271b057736511f073da2f0a0bc2427ae3ff5d1f44b7b03a79bc8b1d8c958255c4867d1a3f026287e8bcbdf555b9a2d51a56936ea2e1595c732123b707f084f2e1fa61901b989a5992e6e0ec9b5ab1a09ce1dec1e8a3101836b791ce5d9cc53803decc338c0eef339d2be990e13046e3e0511091a8f98daea96b362055c1af0b4d8dab60c42baf8e9eea61c05e21fe994dcb77e84b11ea678ab", 0xea}], 0x1, 0x0, 0x0, 0x800}], 0x5, 0x88000) 06:39:41 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000040)={'trans=virtio,', {[{@cache_none='cache=none'}]}}) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000240), 0x400) accept4$llc(0xffffffffffffffff, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000600)=0x10, 0xc0000) syz_mount_image$ocfs2(&(0x7f00000000c0)='ocfs2\x00', &(0x7f0000000180)='./file1\x00', 0xffffffff80000001, 0x4, &(0x7f0000000540)=[{&(0x7f00000002c0)="4a2a1b821c3db654210e5831078a90bf83057ff73720b0685b53450d163510b0c823a81d650b10d23d0d3918334b0ed4cb0854f581d558acbaafbfc4e4f34d4dd9828023939072f5be2bf7e5b92a54afacbb03893ae6c5738a03dabc663e91509085d3660ca23e68df73092a60eb6a50a7fed7a787632e05a5c1e0500f19ecc782dc7fa91dc68fa6297b196450b65f677128c03b847f33ae8323a428f6d331cb6f92d4aea3035bedc6f2c958f6a988e0550076f3c09121c75df103725bd82a2a87f9febb1c9271a2ade247bef4abb5da4bc7d9387a9906254d19628af6c3bae10fc90147a7bddcfdaa57719d3c121e822aae6f0953", 0xf5, 0x4}, {&(0x7f00000003c0)="81ba3977be937d5c8255bfb32680eae2d74096f30b844bef09fe1a832af878f5df1ba160a6a1f9e680a88288ba89194dec3d3fa3681df0c42d08b332c22620b1f9cb216aca78721ce1ec808138b81039835438d4843a77525a6ffc9a341bf4138583bf19", 0x64, 0xc213}, {&(0x7f00000001c0), 0x0, 0x8}, {&(0x7f0000000440)="4331a9a287ce98e2f6fade49e6d125a6c25e727db1ed0d93abec660872e472990f336c0c23544f01d9642f87d7980e5cd2c56c62caf9e0a28f9038dc2cf41e790847d2ad81191f11673f13caef564f66a4d5838993066a68e783019cb2e58ae3c1aa8191ad734ef9a981ecce4b7d65834566d3b78d4d75906cf86dfe1205f0ba88dc6c403b68068d28289ef83d1f61598c9c387cd87d6d19f6183d1d4b51849456a309e20b36baf31f71ea8a38b3057f9666b0d761a73b83b02ee0f8d94c61e54b7b36ee7437437897bc3af58db968c1d26a0d6d13ca14ba4095f137451d90db1e3364428cbe118b19d0", 0xea, 0x20}], 0x0, &(0x7f00000005c0)='cache=none') 06:39:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x2}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:41 executing program 0: io_uring_setup(0xcb0, &(0x7f0000000240)={0x0, 0x0, 0x772d7d563bd3a06a, 0x3, 0x2f7}) mkdir(&(0x7f0000000000)='./file0\x00', 0x20) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x10, 0x0) listxattr(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) sysfs$3(0x3) ioctl(r0, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000000180)={0x3, 0xe6, 0x9, 0x5}) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") io_uring_enter(r1, 0x3, 0x4, 0x0, &(0x7f0000000040)={0x40}, 0x8) [ 471.599587][T21719] 9pnet_virtio: no channels available for device syz [ 471.619495][T21717] (syz-executor.2,21717,0):ocfs2_parse_options:1449 ERROR: Unrecognized mount option "cache=none" or missing value 06:39:41 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mq_unlink(&(0x7f0000000040)='9p\x00') mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) listxattr(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) [ 471.646876][T21724] 9pnet_virtio: no channels available for device syz 06:39:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 471.652694][T21726] 9pnet_virtio: no channels available for device syz [ 471.706142][T21717] (syz-executor.2,21717,0):ocfs2_fill_super:1175 ERROR: status = -22 [ 471.838470][T21717] 9pnet_virtio: no channels available for device syz [ 471.862756][T21735] 9pnet_virtio: no channels available for device syz [ 471.892166][T21737] (syz-executor.2,21737,0):ocfs2_parse_options:1449 ERROR: Unrecognized mount option "cache=none" or missing value [ 471.910290][T21740] 9pnet_virtio: no channels available for device syz 06:39:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:41 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) listxattr(&(0x7f0000000040)='./file0\x00', 0x0, 0x219) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) [ 471.982054][T21737] (syz-executor.2,21737,0):ocfs2_fill_super:1175 ERROR: status = -22 06:39:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r4}, 0x14) getsockname$packet(r2, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r1, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) sendmsg$nl_route(r0, &(0x7f0000004fc8)={0x0, 0xfffffffffffffe9b, &(0x7f000000b000)={&(0x7f0000000040)=@setlink={0x0, 0x13, 0x800, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, r5, 0x1000, 0x40000}, [@IFLA_ALT_IFNAME={0x0, 0x35, 'veth1\x00'}]}, 0x19}}, 0x0) [ 472.059911][T21747] 9pnet_virtio: no channels available for device syz [ 472.092266][T21747] 9pnet_virtio: no channels available for device syz 06:39:41 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="742c1a9654260e000000c9ac00000d00"/28]) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000180), 0x100) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000240)='trusted.overlay.upper\x00', &(0x7f0000000280)={0x0, 0xfb, 0x44, 0x0, 0x3f, "cd11a54392b8f9e4ffd18424c6cd7ea1", "5dae1e63e26e15161025467dc9ec4ff1445b1155eb52e9c90515721fc5a035fcb637e3dbf0a0497f4d2b6bf6c72d5b"}, 0x44, 0x6) openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video35\x00', 0x2, 0x0) 06:39:41 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x8400, 0x0) getpeername$tipc(r0, &(0x7f0000000100)=@id, &(0x7f0000000180)=0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) rmdir(&(0x7f00000002c0)='./file0/file0\x00') listxattr(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="236465762f6e622430ff"], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='vfat\x00', 0x2000000, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) 06:39:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x5}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000c80200005801000058010000580100000000000058010000300200003002000030020000300200003002000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0005801000000000000000000000000000000000000000048006c696d6974000000000000000000000000000000000000000000000000006f87131d600f00000000000000000000000000000000000000000000000000000000000000000000380074696d6500000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff000000000000000068004354000000000000000000000000000000000000000000000000000000020000000000000000000000007070747000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000d80000000000000000000000000000000000000000006800435400000000000000000000000000000000000000000000000000000001000000000000000000000000736e6d705f747261700000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff00000000"], 0x328) [ 472.218295][T21760] 9pnet_virtio: no channels available for device syz 06:39:42 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) ioctl(r0, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000001c80)) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ubi_ctrl\x00', 0x10001, 0x0) sendmsg$xdp(r4, &(0x7f0000001c40)={0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f0000001800)="709e2cfab07f2921eac8631bc1bafbe4d4dff7a11d99516626d18799b2c7816853e908854f1ded9f748814d23efda1a2856ce90c6fb0f991dd50889b50abd92992593668c732dd2888d0b5a99a0724f762e37c42a282670c9be7cc1462b82839765fbc1ddc429be0cfdab159d95bcc72a8a48cf0f0ad7fc09ae7ca1704697e74383320eb53d64ec19f9787b7d4c221fc1353139c", 0x94}, {&(0x7f00000018c0)="16b496ac7cd75b7e04d961eacfe688f20f624ae8010d4f835dda78e015f6070ea4a552857eb368ea", 0x28}, {&(0x7f0000001900)="eb38c8a6965d08e0b8e54856f0947fcde32af8d0edd06585ef910558222e6693bfc8d3d1425200245c7ddccf7f497a30822a59e4def6528d6719df971c666f4280cf1740", 0x44}, {&(0x7f0000001980)="97355053983a83ca2133bff2ae80dd8ee8efbdef336600e4691a549e35db87d0c93f8259d5bdb2d65128c9dd0ce145bfa49305532d38", 0x36}, {&(0x7f00000019c0)="a0683895461d900e6e990c3faee93e3362c96b46412e8baad2f1ed7d1cf7a3dae97b3d", 0x23}, {&(0x7f0000001a00)="29cddc4860110b27802c0c69cfdf06f1b81e13383a7b603cf17c1b812092b5697052dc7349305e0d81d6384c6dab085d07211f499563add754c634fe4db8e1707cb57568dae4cadabe43d80fd07b3bf1104c763d74cd0501159cca38346fd11bb078f066dc0f83c6cd3494ba231615b3a11b27b2f82856911a65408a4cc341043d972becb0733c4bd55c76d8dc09148b8537e776", 0x94}, {&(0x7f0000001ac0)="8504b3297803f6eeffcdf2c1c9158cbc5b76f21c8b61eac62a1f58412d098595d405be2e134736ffd0c3381baaee27acf92f2b33849aa945d399b0b954bdd09711f441cf3858b71e250970518858e12250fe8806494c0f26f07dd2768fd267d31e876a2d124894682cf6efc593ace961f0d69b7b07148eff5d66b0678f0fe2795f1189b25b86bd7e7b79ccf05135dc1ee5a8da898b311a2493baf9ed2c1f235af066b73e007f4ad4902dbdcbb951b95b10bad008d680b4c47c5749cad721021e40397b60b5526b5b0accc1a64f994140ada6a28cbbe6b42f6c037b8ff4cf5a83bbfaee1fe79071d7b44b28d2fc7519", 0xef}], 0x7, 0x0, 0x0, 0x21}, 0x1000) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r5}, 0x14) getsockname$packet(r2, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r7 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r7, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r7, 0xc0096616, &(0x7f0000001cc0)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) sendmmsg$sock(r1, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r6, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x52}}], 0x18}}], 0x1, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f0000000040)=0x1b, 0x4) listxattr(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) sendmsg$sock(r3, &(0x7f00000017c0)={&(0x7f0000000180)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f0000001740)=[{&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000000280)="e2511f0102b18b69e719eaefc66d6df57ead4b5e562aabd2510d7e390321a63a9f2e5dfa6812411abe607c13dc0ffd23733ee12691432028cb29a0a9768026f008de32437bb9d805386d327edd12ec5f804bf4335fd318b8900acf4d40a16924633f45ecdf80b2e01d70f2379b4737b107e388922ddd4bea4595d08da965c0e8801bb619c034d2b95eeabe937a83753807ae7afe9eefffd17abb22aa46869858be5a49f44b514f313d3494d86306e72946352fe90cf6b5db754ca73fb69f5d12fc7fd0ce82547f6b917cea620e", 0xcd}, {&(0x7f0000000380)}, {&(0x7f0000000400)="65a96a123b43380328eaa56d8e1758a7ec26a2dc7700f8bf7fb701bf0c4b29179b566f72a46a66bd4b36b900eac1cfa2703a9db0323c830576c1ff80fd6a38f7bbcaf0d665d7e35c03a7fc9ccb28cbc2065bcf56c16f2812444667782d258fc197b63574a0661283fcca2b080202b4651e9b4b1bdc", 0x75}, {&(0x7f0000001580)="0559b1f225d42d9f555f46d0dabe43668821181e57e02302076373307a43a48cc80f1c13b28cb66e13064b427e3f4a315f5f96f53843da036fded81e02b5ca4a3557c7ba7325dcfe1035069b30aede7f07efe04705dab6ee9b048a823d2bc49e5d376282336235ebf0658c14350ae7d29cf1f5ed0090810866fc48f12d4a9decba44d2b8dc40bfdcd54e1d4149a36832a1c9d77a2b90933496a3bca6eed50eeb76012836b19593f8fe00b46cfd", 0xad}, {&(0x7f0000001640)="72ab0500943b5cfd1842366aa26dfac022f5306dfd3fc157bdc45820300bf080ef3b6baa9d337e2c269624fe301e1071ef020f14a10993037f0e506322013b44e214d2ab7706fefaf6b42d1c32f57b4bae53ff47b6acacb202c355d84f3886e0a2046f7fd477f42fa107eab0b7f4a8322cf58e0d9d052b8258310f468187c2de8feab657b2e0eab0d626476501dfbc5d0d6e5cba6977240094b3fe01ea2b5573c0b57eb8c251581f79ca0d0cd39ee15d5c1adb40c750cfea4d6f1c431347fa12dfffa186e572a722cb71176d32a5fc1e6ee428a7", 0xd4}, {&(0x7f0000000480)="143643483236c31a2b962005ba38f8f6d99d0921d69f3461", 0x18}, {&(0x7f00000004c0)="3f1082d90a92d285a28d21aaf8b831fd9981f40cdf87435050e5aa32bb313878922e46ca6a", 0x25}], 0x8}, 0x0) 06:39:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 472.291966][T21773] xt_limit: Overflow, try lower: 487819119/3936 [ 472.309156][T21771] 9pnet_virtio: no channels available for device syz 06:39:42 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x8400, 0x0) getpeername$tipc(r0, &(0x7f0000000100)=@id, &(0x7f0000000180)=0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) rmdir(&(0x7f00000002c0)='./file0/file0\x00') listxattr(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="236465762f6e622430ff"], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='vfat\x00', 0x2000000, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) [ 472.329931][T21778] 9pnet_virtio: no channels available for device syz [ 472.351856][T21781] 9pnet_virtio: no channels available for device syz 06:39:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='trans=virtio0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 472.424266][T21778] 9pnet_virtio: no channels available for device syz 06:39:42 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = getpid() pidfd_open(r1, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000000)=r1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000040)={{{@in6=@loopback, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000180)=0xe8) unlink(&(0x7f0000000140)='./file0\x00') [ 472.443440][T21793] 9pnet: Could not find request transport: virtio0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x8}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="74bd81cafb3dd6ebe36a6f93e77363616368ce08c3988d04722f00fc7d5badb834609f8ad676405b2c00000000000b00007c0c3a8bdeb3bdae7a2714cbd99b4b7490a95b8e54622f34dc305e76807e8f3dbe72d6c99ce740288bb6f5ba39c23b6ecc2a77c307116c08b46e3a69fa00c2f60fecfd677497295426ecc5d1bdd1fe2ba0e979ee3a235616b580009d98d23a2dfebd2c0abdecb46f7707cb332de92e90785958ffb46c65de4699ddda5ef16b11423dde946f701adacc0c903d7426eefcaf73a1376cbc57ae62446709105f373dd1746aa06de0f9534b34e3b77d417eaeab6f3f0179c43d8286"]) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x400) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) ioctl(r0, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0xd08000, 0x7, 0x9, 0xffffffffffffffff, 0x0, &(0x7f0000000100)={0x9a090b, 0x100, [], @value64=0xffffffff}}) mkdirat(r1, &(0x7f0000000300)='./file0\x00', 0x20) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r2, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) fsetxattr$security_evm(r2, &(0x7f00000001c0)='security.evm\x00', &(0x7f00000002c0)=@sha1={0x1, "516aa48b4b6f85fc21b400"}, 0x15, 0x2) [ 472.532448][T21801] 9pnet_virtio: no channels available for device syz [ 472.570461][T21808] 9pnet_virtio: no channels available for device syz [ 472.593729][T21808] 9pnet_virtio: no channels available for device syz 06:39:42 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) ioctl(r0, 0x1, &(0x7f0000000100)="ffe0f5") r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r1, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000180)={0x47c15495, 0x6, 0x4, 0x8, 0x7d, {0x0, 0x7530}, {0x0, 0x8, 0x7f, 0x0, 0x5, 0x83, "78e61f75"}, 0x3, 0x0, @offset=0x8000, 0x2, 0x0, r1}) ioctl$CDROMREADTOCENTRY(r2, 0x5306, &(0x7f0000000100)={0x1, 0x7, 0x7, 0x2, @lba=0x3, 0x40}) listxattr(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) nanosleep(&(0x7f0000000040), 0x0) 06:39:42 executing program 3: open(&(0x7f00000009c0)='./bus\x00', 0x941347, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r1 = dup2(0xffffffffffffffff, r0) ioctl$CDROM_MEDIA_CHANGED(r1, 0x5325, 0xffffffffffff4f80) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lqwerdir=.:file2']) truncate(&(0x7f0000000080)='./bus\x00', 0x9) chdir(&(0x7f0000000240)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) 06:39:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x9}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x201040, &(0x7f0000000240)=ANY=[@ANYBLOB="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"]) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180), 0x100) r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r0, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) r5 = socket(0x200000000000011, 0x3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r5, &(0x7f0000000240)={0x11, 0x0, r7}, 0x14) getsockname$packet(r5, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x3, 0x10}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000380)={r8, 0x5d3e, 0x7fffffff, 0x9b5}, &(0x7f00000003c0)=0x10) [ 472.647995][T21815] overlayfs: unrecognized mount option "lqwerdir=.:file2" or missing value 06:39:42 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) syz_extract_tcp_res(&(0x7f0000000080), 0x3c440000, 0x80) mount$overlay(0x0, 0x0, 0x0, 0x800000, &(0x7f0000000040)=ANY=[@ANYRESHEX]) setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:fuse_device_t:s0\x00', 0x23, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='configfs\x00', 0x0, 0x0) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dri/renderD128\x00', 0x40000, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f00000002c0)=0xffffff80, 0x4) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[]) r3 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r3, 0x0, 0x0) 06:39:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0xa}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0xb}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 472.729062][ T39] audit: type=1400 audit(1579070382.514:77): avc: denied { relabelto } for pid=21830 comm="syz-executor.3" name="file0" dev="sda1" ino=16865 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:fuse_device_t:s0 tclass=dir permissive=1 [ 472.786291][T21831] overlayfs: unrecognized mount option "" or missing value 06:39:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0xc}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 472.831965][ T39] audit: type=1400 audit(1579070382.564:78): avc: denied { mounton } for pid=21830 comm="syz-executor.3" path="/syzkaller-testdir818129106/syzkaller.dwImsf/669/file0" dev="sda1" ino=16865 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:fuse_device_t:s0 tclass=dir permissive=1 [ 473.000945][T21829] 9pnet_virtio: no channels available for device syz 06:39:42 executing program 0: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self\x00', 0x400000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) listxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0x1a9) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x5, 0x101000) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000001c0)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x3f}) 06:39:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=virtio,', {[{@cache_fscache='cache=fscache'}]}}) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x3, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") linkat(r0, &(0x7f00000000c0)='./file0/file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180), 0x100) [ 473.052872][T21837] overlayfs: unrecognized mount option "" or missing value [ 473.086039][T21850] 9pnet_virtio: no channels available for device syz 06:39:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0xe}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:42 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f00000000c0), &(0x7f0000000240)=0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=virtio,', {[{@cache_fscache='cache=fscache'}]}}) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180), 0x100) 06:39:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=virtio,', {[{@cache_fscache='cache=fscache'}]}}) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x3, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") linkat(r0, &(0x7f00000000c0)='./file0/file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180), 0x100) [ 473.135558][ T39] audit: type=1400 audit(1579070382.924:79): avc: denied { getattr } for pid=9571 comm="syz-executor.3" path="/syzkaller-testdir818129106/syzkaller.dwImsf/669/file0" dev="sda1" ino=16865 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:fuse_device_t:s0 tclass=dir permissive=1 [ 473.137639][T21856] 9pnet_virtio: no channels available for device syz [ 473.194952][ T39] audit: type=1400 audit(1579070382.954:80): avc: denied { read } for pid=9571 comm="syz-executor.3" name="file0" dev="sda1" ino=16865 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:fuse_device_t:s0 tclass=dir permissive=1 06:39:43 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=virtio,', {[{@cache_fscache='cache=fscache'}]}}) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x3, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") linkat(r0, &(0x7f00000000c0)='./file0/file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180), 0x100) [ 473.225099][T21862] 9pnet_virtio: no channels available for device syz 06:39:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x10}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 473.259933][ T39] audit: type=1400 audit(1579070382.954:81): avc: denied { open } for pid=9571 comm="syz-executor.3" path="/syzkaller-testdir818129106/syzkaller.dwImsf/669/file0" dev="sda1" ino=16865 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:fuse_device_t:s0 tclass=dir permissive=1 [ 473.283524][T21867] 9pnet_virtio: no channels available for device syz 06:39:43 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=virtio,', {[{@cache_fscache='cache=fscache'}]}}) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x3, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") linkat(r0, &(0x7f00000000c0)='./file0/file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180), 0x100) [ 473.300032][ T39] audit: type=1400 audit(1579070382.954:82): avc: denied { rmdir } for pid=9571 comm="syz-executor.3" name="file0" dev="sda1" ino=16865 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:fuse_device_t:s0 tclass=dir permissive=1 [ 473.390336][T21878] 9pnet_virtio: no channels available for device syz [ 473.407193][T21878] 9pnet_virtio: no channels available for device syz 06:39:43 executing program 0: mkdir(&(0x7f00000001c0)='./file0/file1\x00', 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x80, 0x180040) r1 = syz_open_dev$media(&(0x7f0000000280)='/dev/media#\x00', 0xffffffff, 0x200000) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000180)='trusted\x00', &(0x7f0000000240)='./file0\x00', r1) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) listxattr(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) r2 = syz_open_dev$sndhw(&(0x7f0000000000)='/dev/snd/hwC#D#\x00', 0x4, 0x440020) mkdirat(r2, &(0x7f0000000040)='./file0\x00', 0x1c) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) 06:39:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x11}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:43 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000500)=0xe8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) r3 = semget(0x0, 0x0, 0x14a) semctl$SETVAL(r3, 0x3, 0x10, &(0x7f0000000600)=0x7fff) mount$9p_xen(&(0x7f0000000080)='syz\x00', &(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)='9p\x00', 0x2020, &(0x7f0000000540)={'trans=xen,', {[{@debug={'debug', 0x3d, 0x9}}, {@debug={'debug', 0x3d, 0xfff}}, {@version_L='version=9p2000.L'}, {@access_uid={'access', 0x3d, r0}}, {@dfltuid={'dfltuid', 0x3d, r2}}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x37, 0x39, 0x34, 0x35, 0x61, 0x34, 0x6a], 0x2d, [0x35, 0x156ada1bbbc08f03, 0x32, 0x38], 0x2d, [0x38, 0x38, 0x36, 0x63], 0x2d, [0x33, 0x35, 0x7ac0ee47d5144513, 0x3a25ef5859b519], 0x2d, [0x30, 0x52, 0x63, 0x62, 0x38, 0x34, 0x37, 0x30]}}}]}}) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x800, 0x0) membarrier(0xb9fa1dbe9455a597, 0x0) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r4, 0x40485404, &(0x7f0000000200)={{0x3, 0x2, 0xfffffffb, 0x1, 0x6}, 0x7fffffff}) mkdir(&(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r5 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat(r5, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r5, &(0x7f00000003c0)='./file0\x00') 06:39:43 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='trairtio,cache=fscache,\x00\x00\x00\x00\x00']) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000180), 0x100) [ 473.980120][T21889] 9pnet_virtio: no channels available for device syz 06:39:43 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=virtio,', {[{@cache_fscache='cache=fscache'}]}}) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000440), 0x4100) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) getsockopt$IP_SET_OP_VERSION(r0, 0x1, 0x53, &(0x7f00000003c0), &(0x7f0000000400)=0x8) setreuid(0x0, r1) mount$9p_xen(&(0x7f0000000040)='syz\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x0, &(0x7f0000000300)={'trans=xen,', {[{@version_u='version=9p2000.u'}, {@version_9p2000='version=9p2000'}], [{@uid_lt={'uid<', r1}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_measure='dont_measure'}, {@obj_user={'obj_user', 0x3d, 'eth1/['}}, {@measure='measure'}, {@dont_measure='dont_measure'}]}}) 06:39:43 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r1 = getpid() r2 = pidfd_open(r1, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r2, 0xc2604111, &(0x7f0000000180)={0x200, [[0x5, 0xe000000, 0x9, 0x1, 0x2, 0x9, 0xd36c], [0xba9, 0x3f, 0x5f, 0xfffffffe, 0x6, 0xad45, 0x7, 0x10001], [0x5, 0xc9, 0x3, 0x0, 0x8, 0x3a, 0x2, 0x1]], [], [{0x98f, 0x4c, 0x0, 0x0, 0x0, 0x1}, {0x76be, 0x401, 0x1, 0x0, 0x1, 0x1}, {0x10000, 0x4, 0x1, 0x0, 0x1}, {0x200, 0x3, 0x1, 0x0, 0x0, 0x1}, {0x2, 0x2, 0x0, 0x0, 0x1, 0x1}, {0x5, 0x0, 0x1, 0x0, 0x1}, {0xffffff81, 0x9, 0x0, 0x1, 0x1, 0x1}, {0x9, 0x1, 0x0, 0x0, 0x0, 0x1}, {0x44d0, 0x6, 0x0, 0x1, 0x1}, {0x1, 0x9, 0x0, 0x0, 0x1, 0x1}, {0x5, 0x7fff, 0x0, 0x0, 0x1}, {0x0, 0xc2, 0x0, 0x1, 0x1}], [], 0xfc}) r3 = syz_open_procfs(r1, &(0x7f0000000000)='timers\x00') ioctl$TCSETS(r3, 0x40045431, &(0x7f00005befdc)={0x0, 0x3, 0xffffffff, 0x0, 0x16, "00220000000000000000ff0f00"}) r4 = syz_open_pts(r0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000300)={'dummy0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_CARRIER={0x8}]}, 0x28}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r7, &(0x7f0000000140)=[{0xf000, 0x0, &(0x7f0000000100), 0x200, &(0x7f0000000100)}], 0x492492492492a1d, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000140)=0x1) 06:39:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x12}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:43 executing program 3: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7b4a, 0x48002) recvfrom$inet6(r1, &(0x7f0000000200)=""/25, 0x19, 0x10000, &(0x7f0000000240)={0xa, 0x4e22, 0x4, @mcast2, 0x3}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f000095dffc)=0x8) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r5, 0x84, 0x75, &(0x7f0000000280)={r7}, &(0x7f00000002c0)=0x18) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000380)={r7, @in6={{0xa, 0x4e20, 0x5, @rand_addr="88059fb44d9fbea6b524696435f647d6", 0x7}}, [0x5, 0x6, 0x7fffffff, 0x7, 0x9, 0xae1, 0xfff, 0x5, 0x5, 0xfffffffffffffff9, 0x3, 0x5, 0x80, 0x400, 0xcd44]}, &(0x7f0000000280)=0x100) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000002c0)={r8, 0x5}, &(0x7f0000000300)=0x8) writev(r4, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) dup(r4) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$VHOST_RESET_OWNER(r3, 0xaf02, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x1c, &(0x7f0000000140)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x15}]}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x23, &(0x7f0000000000)={r2}, 0x8) 06:39:43 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)='9p\x00', 0x82600, 0x0) listxattr(&(0x7f0000000100)='./file0/file0\x00', 0x0, 0x230) chmod(&(0x7f0000000040)='./file0\x00', 0x10) syz_open_dev$media(&(0x7f0000000b00)='/dev/media#\x00', 0x1, 0x10002) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000004d40)='/dev/nvram\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, 0x0, 0x0) 06:39:43 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000040)='./file1\x00', &(0x7f0000000200)='9p\x00', 0xa0b0, 0x0) listxattr(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) 06:39:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x13}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:43 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7472616e733d76697274abbed0dc616368653d667363616368652c00"]) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180), 0x100) 06:39:43 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) listxattr(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x13, r1, 0x0) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r2 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) bind$llc(r2, &(0x7f0000000040)={0x1a, 0x311, 0xf8, 0x1, 0x51, 0x43, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) 06:39:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x14}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:44 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=virtio,', {[{@cache_fscache='cache=fscache'}]}}) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file1\x00', &(0x7f0000000180), 0x100) [ 474.249250][ T39] audit: type=1400 audit(1579070384.024:83): avc: denied { map } for pid=21927 comm="syz-executor.0" path="/selinux/status" dev="selinuxfs" ino=19 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=file permissive=1 [ 474.251298][T21928] 9pnet_virtio: no channels available for device syz [ 474.251737][T21934] 9pnet: Could not find request transport: virt«¾ÐÜache=fscache [ 474.254248][T21934] 9pnet: Could not find request transport: virt«¾ÐÜache=fscache [ 474.287401][T21938] 9pnet_virtio: no channels available for device syz [ 474.294397][T21938] 9pnet_virtio: no channels available for device syz 06:39:44 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) listxattr(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r0, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) recvmsg$can_bcm(r0, &(0x7f00000002c0)={&(0x7f0000000180)=@nfc, 0x80, &(0x7f0000000040)=[{&(0x7f0000000240)=""/122, 0x7a}], 0x1, &(0x7f0000000100)=""/7, 0x7}, 0x40000000) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) 06:39:44 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = geteuid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x81d51235b15b3ed5, 0x0) sendmsg$IPSET_CMD_RENAME(r4, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x58, 0x5, 0x6, 0x100, 0x70bd2a, 0x25dfdbfe, {0xc, 0x0, 0x9}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x7427b0e0c558bd2f) setreuid(0x0, r3) setsockopt$CAN_RAW_ERR_FILTER(r4, 0x65, 0x2, &(0x7f0000000600)=0xff, 0x4) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0xfffffffffffff420, 0x1, &(0x7f0000000280)=[{&(0x7f0000000240)="4e7911f0601a6c4a7b64970465ce71de973e7cb2e74cdc6be45e5d47572a3ade37986c1ba15518586ec9e0ec3a2c326bc1e7e7", 0x33, 0x60}], 0x810, &(0x7f00000003c0)={[{@shortname_winnt='shortname=winnt'}, {@uni_xlate='uni_xlate=1'}], [{@uid_eq={'uid', 0x3d, r0}}, {@uid_gt={'uid>', r1}}, {@subj_role={'subj_role', 0x3d, '\\vboxnet1'}}, {@dont_hash='dont_hash'}, {@euid_lt={'euid<', r3}}]}) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7472616e733d76697274696f2c62616368653d667363a0ef504529e3"]) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180), 0x100) 06:39:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x1c}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:44 executing program 3: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x0, @loopback}], 0x10) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r1, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r2, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r3 = dup3(r1, r2, 0xc0000) mmap$fb(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0xf2539e53ab5df877, 0x12, r3, 0x1e000) r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6}, 0x14) getsockname$packet(r4, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) setsockopt$PNPIPE_ENCAP(r4, 0x113, 0x1, &(0x7f0000000040), 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback={0x0, 0x2}}, 0x1c) restart_syscall() [ 475.053348][T21959] 9pnet_virtio: no channels available for device syz 06:39:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x48}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:44 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=virtio,', {[{@cache_fscache='cache=fscache'}]}}) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180), 0x100) r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x10000, 0x9fb6196f2b2de619) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x0, 0x100, "f26e2c0b0714ae44c3d79eedb7976e8fefa336b9859e01c2b9bcc05df74e521a", 0xffffffff, 0x0, 0x9, 0x7, 0x200}) [ 475.130530][T21970] 9pnet_virtio: no channels available for device syz [ 475.131377][T21956] 9pnet_virtio: no channels available for device syz [ 475.156139][T21970] 9pnet_virtio: no channels available for device syz 06:39:44 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=virtio,', {[{@cache_fscache='cache=fscache'}]}}) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180), 0x100) r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6}, 0x14) getsockname$packet(r4, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r3, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r7, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000040)={@rand_addr="002ae754127960802e8b8cbbf528e871", r7}, 0x14) 06:39:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x4a}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 475.223338][T21979] 9pnet_virtio: no channels available for device syz [ 475.247721][T21979] 9pnet_virtio: no channels available for device syz 06:39:45 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=virtio,', {[{@cache_fscache='cache=fscache'}]}}) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', &(0x7f0000000180), 0x0) 06:39:45 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) listxattr(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r0, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) recvmsg$can_bcm(r0, &(0x7f00000002c0)={&(0x7f0000000180)=@nfc, 0x80, &(0x7f0000000040)=[{&(0x7f0000000240)=""/122, 0x7a}], 0x1, &(0x7f0000000100)=""/7, 0x7}, 0x40000000) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) 06:39:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x4c}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 475.343666][T21988] 9pnet_virtio: no channels available for device syz 06:39:45 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="747261b5733d76697274696f2c63616368653d667363616368652c00"]) r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000240)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, {0xeb80a5b27e78e106, @local}, 0x40, {0x2, 0x4e22, @loopback}, 'syzkaller1\x00'}) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180), 0x100) 06:39:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x60}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:45 executing program 0: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = openat$ndctl0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ndctl0\x00', 0x1, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000080)={0xf, 0x5, 0x6, 0x4, 0x8, "ceea42f91745127703c8a65cae33af31fcbb79"}) ioctl$SCSI_IOCTL_DOORUNLOCK(r0, 0x5381) 06:39:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ocfs2_control\x00', 0x18040, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r1, 0xc2604110, &(0x7f00000002c0)={0x9, [[0x0, 0x7, 0x2, 0x5, 0x87, 0x8001, 0x0, 0x10001], [0x3, 0x0, 0xc21, 0x4, 0x1f, 0x0, 0x3f, 0x1], [0x56, 0x7fffffff, 0x1, 0x400, 0x7, 0x6, 0x6, 0x5788]], [], [{0x9, 0x0, 0x0, 0x0, 0x1}, {0x3, 0x20000000}, {0x8, 0x9, 0x1, 0x0, 0x1}, {0x1, 0x9, 0x1}, {0x1, 0x6, 0x1, 0x0, 0x0, 0x1}, {0x6, 0x7f, 0x0, 0x1, 0x1}, {0x5, 0x2, 0x0, 0x0, 0x1}, {0x2, 0x8, 0x0, 0x1, 0x1, 0x1}, {0x3, 0xfffeffff, 0x0, 0x1, 0x1, 0x1}, {0x1, 0x1a, 0x0, 0x0, 0x1, 0x1}, {0x80, 0x0, 0x1, 0x1, 0x1}, {0x4, 0x1}], [], 0x9}) ioctl$IMGETCOUNT(r2, 0x80044943, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) ftruncate(0xffffffffffffffff, 0x48280) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000040)) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r4, 0x0) io_submit(r3, 0x20000000000001cb, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 06:39:45 executing program 0: r0 = socket$inet6(0xa, 0x802, 0x73) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x80000, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r3, 0x408c563e, &(0x7f0000000080)={0x4, 0x1, 0x2b, "ffdd5e5822f3b2a80baf701259bbc7fc950e546b05a09412012c4efd1770f4e49489c9c9e95d851a2f317dd84a213007bf0894603c7245163375dfde", 0x34, "24657e528b16873f5b430b03a8a59b1c52727a78d80c68c46244c023a56ef8926f2f0bb39d108e531bf21f39d3c141c5ad6141627aa99253f50265bf", 0x10}) ioctl$DRM_IOCTL_GET_STATS(r3, 0x80f86406, &(0x7f0000000040)=""/33) ioprio_get$uid(0x7, r2) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r4, 0x0, 0x40, &(0x7f0000000ffc), 0x4) getsockopt$inet_buf(r4, 0x0, 0x0, &(0x7f0000000140)=""/90, &(0x7f00000001c0)=0x5a) sendmmsg$inet6(r0, &(0x7f0000001640)=[{{&(0x7f0000000200)={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c, 0x0}}, {{&(0x7f0000000680)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c, 0x0}}], 0x2, 0x0) r5 = openat$ndctl0(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ndctl0\x00', 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000340)={r6}) [ 476.070944][T22004] 9pnet_virtio: no channels available for device syz 06:39:45 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000240)='overlay\x00', 0x1000, &(0x7f0000000280)=':]\\[%\x00') mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e733d76697274696f2c63616368653d667363616368652c00e0d43ff58251ca10038c2275af18e6dd380f50e5a0616589be0714a58a2c3c7bcb4bdb2806f7f4522d4ad42cbf77674fd3c29d04d55759617aee744c8f2e12cf63576ae1bf46a17eaf887d57f7ae13463f108f0ddf7b"]) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180), 0x100) 06:39:45 executing program 0: remap_file_pages(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x0, 0x40) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='comm\x00') 06:39:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x68}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 476.145344][T22023] mmap: syz-executor.0 (22023) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 06:39:46 executing program 0: pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) vmsplice(r0, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0x1004c}], 0x1, 0x0) [ 476.210429][T22030] 9pnet_virtio: no channels available for device syz 06:39:46 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=virtio,', {[{@cache_fscache='cache=fscache'}]}}) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)=""/93) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180), 0x100) r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000001300)=[@in={0x2, 0x4e24, @multicast1}, @in={0x2, 0x4e20, @multicast1}, @in6={0xa, 0x4e23, 0x1, @dev={0xfe, 0x80, [], 0x27}, 0x1000}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e24, 0x0, @loopback}], 0x68) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_mr_cache\x00') recvfrom$llc(r3, &(0x7f0000000300)=""/4096, 0x1000, 0x1000, 0x0, 0x0) 06:39:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x202b02, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x400, 0x0) ioctl$SNDCTL_DSP_GETIPTR(r2, 0x800c5011, &(0x7f0000000180)) ioctl$CDROMPLAYBLK(r1, 0x5317, &(0x7f00000000c0)={0x8d, 0x8}) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400218) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff07000000ffffff81000800000000000000004000ffffff85000000e1000000887700720030b5829237c30000000000008000da55aa", 0xffffffffffffff5d, 0x1c0}]) 06:39:46 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) bind$bt_sco(r1, &(0x7f0000000080)={0x1f, {0x2, 0x6, 0x81, 0x4, 0x2, 0x5}}, 0x8) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x6) r2 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) getsockopt(r3, 0x6, 0x9, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 06:39:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x6c}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 476.283122][T22037] QAT: Invalid ioctl 06:39:46 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) bind$bt_sco(r1, &(0x7f0000000080)={0x1f, {0x2, 0x6, 0x81, 0x4, 0x2, 0x5}}, 0x8) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x6) r2 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) getsockopt(r3, 0x6, 0x9, &(0x7f00000000c0)=""/59, &(0x7f0000000100)=0x3b) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) [ 476.383155][T22047] 9pnet_virtio: no channels available for device syz 06:39:46 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x22) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"]) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180), 0x100) 06:39:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x10000000006, 0x0, 0x20000000, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x1, 0x0, 0x0, 0x0, 0x1}, 0x2c) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0xffffffffffffff95, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000080)=0x10001) 06:39:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x74}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) [ 476.604705][T22064] 9pnet_virtio: no channels available for device syz [ 476.655011][T22037] QAT: Invalid ioctl 06:39:46 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x22) mount$9p_virtio(&(0x7f0000000080)='syz\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"]) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180), 0x100) 06:39:46 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) r1 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6}, 0x14) getsockname$packet(r4, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r3, &(0x7f0000000300), 0x1, 0x48000) getpeername$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x1c) setreuid(0x0, r2) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket(0x200000000000011, 0x3, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r11, 0x40086602, &(0x7f0000000080)) ioctl(r11, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SCSI_IOCTL_START_UNIT(r11, 0x5) bind$packet(r8, &(0x7f0000000240)={0x11, 0x0, r10}, 0x14) getsockname$packet(r8, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r7, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r12, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) getsockopt$IP_SET_OP_VERSION(r7, 0x1, 0x53, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 06:39:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x7a}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:46 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x5645c1a3cea767a4, 0x0) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f00000000c0)={0x1, {0x101, 0xffff, 0x759a1809, 0x80000000}}) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xffffffffffffff09) write$P9_ROPEN(r1, &(0x7f0000000100)={0x18, 0x71, 0x2, {{0x1, 0x2, 0x6}, 0x1}}, 0x18) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001400e704b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) 06:39:46 executing program 3: socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r4, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) fsetxattr$trusted_overlay_nlink(r4, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'L+', 0x5}, 0x16, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x36}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x4001, r5}]]}}}]}, 0x38}}, 0x0) 06:39:46 executing program 0: r0 = socket(0x388530caad30191f, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) 06:39:46 executing program 2: r0 = socket(0x840000000002, 0x3, 0x200000000000ff) sendmmsg$inet(r0, &(0x7f0000001c00)=[{{&(0x7f0000000200)={0x2, 0x0, @rand_addr=0x2}, 0x10, &(0x7f00000012c0)=[{&(0x7f0000001b40)="d2f45af2e97614eb6363f6b8de2d762bc2212694", 0xffffff14}], 0x1}}, {{&(0x7f0000001340)={0x2, 0x4e21}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_retopts={{0x10}}], 0x10}}], 0x2, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r1, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) fdatasync(r1) 06:39:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0xc7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:46 executing program 2: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) r2 = socket$pppoe(0x18, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8982, &(0x7f00000000c0)={0x2, 'ip6_vti0\x00', {0x1}, 0x7fff}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000180)=@chain={'key_or_keyring:', r1, ':chain\x00'}) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x100, 0x0) ioctl$VHOST_SET_OWNER(r3, 0xaf01, 0x0) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x75, &(0x7f0000000280)={r6}, &(0x7f00000002c0)=0x18) getsockopt$inet_sctp_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000200)={0x0, 0x9, 0xfffffffa, 0x9, 0x4, 0x0, 0x7f, 0x8, {r6, @in6={{0xa, 0x4e23, 0x3, @rand_addr="d0f239a88b837b8edf420b51a1905c7c", 0x2}}, 0x6, 0x21f, 0x3, 0x8bfd, 0x101}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000002c0)={r7, 0xf1a3}, &(0x7f0000000300)=0x8) 06:39:47 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000180), 0xf0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket(0x200000000000011, 0x3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r5, &(0x7f0000000240)={0x11, 0x0, r7}, 0x14) getsockname$packet(r5, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r4, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r8, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000001c0)='veth1\x00', 0x3ff9b061) r9 = dup2(r0, r0) sendmsg$NBD_CMD_RECONFIGURE(r9, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000480)=ANY=[@ANYPTR64], 0x1}}, 0x0) write$cgroup_type(r9, &(0x7f0000000140)='threaded\x00', 0xfffffefa) 06:39:47 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = socket(0x10, 0x3, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x3}}, 0x30) ioctl$sock_ifreq(r1, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = dup(r3) socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r3, 0x89f3, &(0x7f0000000080)={'lo\x00', @ifru_flags=0x3800}) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000080)) ioctl(r6, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$BLKROSET(r6, 0x125d, &(0x7f0000000180)=0xd2) writev(r5, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) ioctl$void(r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400218) r7 = socket(0x10, 0x3, 0x0) dup2(r7, r0) 06:39:47 executing program 2: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) r2 = socket$pppoe(0x18, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8982, &(0x7f00000000c0)={0x2, 'ip6_vti0\x00', {0x1}, 0x7fff}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000180)=@chain={'key_or_keyring:', r1, ':chain\x00'}) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x100, 0x0) ioctl$VHOST_SET_OWNER(r3, 0xaf01, 0x0) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x75, &(0x7f0000000280)={r6}, &(0x7f00000002c0)=0x18) getsockopt$inet_sctp_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000200)={0x0, 0x9, 0xfffffffa, 0x9, 0x4, 0x0, 0x7f, 0x8, {r6, @in6={{0xa, 0x4e23, 0x3, @rand_addr="d0f239a88b837b8edf420b51a1905c7c", 0x2}}, 0x6, 0x21f, 0x3, 0x8bfd, 0x101}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000002c0)={r7, 0xf1a3}, &(0x7f0000000300)=0x8) 06:39:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket(0x200000000000011, 0x2, 0x81) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r3, &(0x7f0000000240)={0x11, 0x0, r5}, 0x14) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x400, 0x0) ioctl$SIOCGSTAMPNS(r6, 0x8907, &(0x7f0000000200)) getsockname$packet(r3, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r2, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r7, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) r8 = socket(0x200000000000011, 0x3, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r8, &(0x7f0000000240)={0x11, 0x0, r10}, 0x14) getsockname$packet(r8, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f0000000040)={0x5, 0xb, 0xfffffffe, 0x7fffffff, 0x0}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f00000000c0)={r11, @in6={{0xa, 0x4e22, 0x3, @mcast1, 0x2}}, 0x1, 0xfffff5db, 0x9, 0x8}, &(0x7f0000000180)=0x98) r12 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r12, 0x0, 0x484, &(0x7f0000000240)=""/148, &(0x7f0000000300)=0x94) [ 477.637955][T22122] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1995825407 > max in inode 17425 [ 477.641501][T22126] IPVS: length: 148 != 24 06:39:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x2}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 477.881090][T22136] IPVS: length: 148 != 24 06:39:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:48 executing program 2: mmap(&(0x7f0000068000/0x3000)=nil, 0x3000, 0x2, 0x4010, 0xffffffffffffffff, 0xffffe000) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f0000000100)=0x4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000040)={0x57, 0xff, 0x7, {0x87, 0x5}, {0x2, 0x9676}, @cond=[{0x82f0, 0x7c54, 0x80, 0x8, 0x7fff, 0x7}, {0x0, 0x4, 0x4df, 0x3ca7, 0x4, 0xff}]}) r1 = openat$cgroup_ro(r0, &(0x7f0000000140)='cpuacct.stat\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r5, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) ioctl$VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f00000001c0)={0x1f, 0x5, 0x4, 0x4000000, 0x80000001, {r3, r4/1000+30000}, {0x4, 0x1, 0x1, 0x1, 0x2, 0x0, "47330cfe"}, 0x2, 0x2, @fd=r1, 0x200, 0x0, r5}) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 06:39:48 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x5}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:48 executing program 0: socket$inet6(0xa, 0x80003, 0x800000000000006) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x48}}, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000080)={{0x80, 0x5, 0x40, 0x7f, 0x0, 0x8}, 0x7, 0x2, 0x9, 0x3, 0x2c0, "0047581865ef899b7f40ba35e557628816bc4eb64d67d4b45ede0356fa87c2dc737e93f294e54090fefba57e6562297c0c16ad3c8b616d1b47b6aa2c7b3f44e1c0fa38b11263eb238f641766aa00895bdd981032a3fafe9c2f2d96797d010021869821b5e899acd713c7cc8173071797b4e99ed3e3c9ee0a8da5518c68352148"}) 06:39:48 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = socket(0x10, 0x3, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x3}}, 0x30) ioctl$sock_ifreq(r1, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = dup(r3) socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r3, 0x89f3, &(0x7f0000000080)={'lo\x00', @ifru_flags=0x3800}) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000080)) ioctl(r6, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$BLKROSET(r6, 0x125d, &(0x7f0000000180)=0xd2) writev(r5, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) ioctl$void(r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400218) r7 = socket(0x10, 0x3, 0x0) dup2(r7, r0) 06:39:48 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000001b80)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000100)=""/143, 0x8f}, {&(0x7f00000001c0)=""/104, 0x68}, {&(0x7f0000000340)=""/163, 0xa3}], 0x3}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000480)=""/117, 0x75}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400218) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xfe6a, 0xffffff0c, 0x0, 0x1c) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$CDROM_DISC_STATUS(r3, 0x5327) 06:39:48 executing program 0: socket$inet6(0xa, 0x80003, 0x6b) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000e00)={0x0, 0xf00}}, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000280)={0x14, r3, 0xc91add0bf88807dd, 0x0, 0x0, {0x2f}}, 0x14}}, 0x0) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80008}, 0xc, &(0x7f0000000180)={&(0x7f0000000680)={0x13c, r3, 0x10, 0x0, 0x0, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x13c}}, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x20000004e20, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x24000000, &(0x7f0000000040)={0x2, 0x4e20, @local}, 0x10) sendto$inet(r1, &(0x7f00000001c0)="83", 0x1, 0x4081, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000200)="14", 0x1, 0x0, 0x0, 0xfffffffffffffea8) recvfrom$inet(r1, 0x0, 0x78, 0x0, 0x0, 0x0) 06:39:48 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 478.510983][T22167] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 478.533197][T22163] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1995825407 > max in inode 16849 06:39:48 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") r4 = openat$cgroup_ro(r3, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) ioctl$VIDIOC_S_INPUT(r4, 0xc0045627, &(0x7f0000000180)=0x7) sendmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="5500000018007f0a00fe05b2a4a280930a000001fe80040214000000390009002d0050000500000019000540029b84136eff010000de441100ae20ca3ab82200fc060cec4fab91d471cd34938c42f030dd941e7931", 0x55}], 0x1}, 0x0) 06:39:48 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 478.594496][T22178] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 478.607129][T22178] IPv6: NLM_F_CREATE should be set when creating new route [ 478.624895][T22169] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 2465587455 > max in inode 17569 [ 478.634788][T22182] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 06:39:48 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) close(r0) mount$9p_xen(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='tran\x00\x00xen,\x00']) 06:39:48 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x48, 0x1, 0x2, 0x8, 0x70bd2a, 0x25dfdbff, {0x7, 0x0, 0x8}, [@CTA_EXPECT_FN={0x13, 0xb, 'callforwarding\x00'}, @CTA_EXPECT_FN={0x13, 0xb, 'callforwarding\x00'}, @CTA_EXPECT_NAT={0xc, 0xa, [@CTA_EXPECT_NAT_DIR={0x8}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x4000004) sendfile(r0, 0xffffffffffffffff, 0x0, 0x50800000000443) finit_module(0xffffffffffffffff, &(0x7f00000001c0)='/selinux/relabel\x00', 0x0) 06:39:49 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_REWIND(r0, 0x40084146, &(0x7f0000000000)=0x3) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x619102, 0x0) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f00000000c0)={0x9, 0xb, 0x1}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffb000/0x4000)=nil, 0x4000}, 0x2}) 06:39:49 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x8}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:49 executing program 2: clone(0x4413cd00, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r2, &(0x7f0000000540)=[{&(0x7f0000000140)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f0000000000)) write$USERIO_CMD_REGISTER(r1, &(0x7f00000001c0)={0x0, 0x7}, 0x2) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6}, 0x14) getsockname$packet(r4, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r3, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r7, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000180)=0xfffffffffffffffe, 0x4) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) sendmsg$OSF_MSG_ADD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x268}, 0x1, 0x0, 0x0, 0x54f1f1e5c7b63b5}, 0x40) ioctl$EXT4_IOC_SETFLAGS(r8, 0x40086602, &(0x7f0000000080)) ioctl(r8, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$BLKIOMIN(r8, 0x1278, &(0x7f0000000040)) 06:39:49 executing program 3: syz_open_procfs(0xffffffffffffffff, 0xfffffffffffffffe) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x40840) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) ioctl(r0, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f00000000c0)={&(0x7f0000000040), &(0x7f0000000080)=""/19, 0x13}) recvmsg(r0, &(0x7f0000001300)={&(0x7f0000000140)=@generic, 0x80, &(0x7f00000012c0)=[{&(0x7f00000001c0)=""/48, 0x30}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/130, 0x82}], 0x3}, 0x10000) 06:39:49 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_REWIND(r0, 0x40084146, &(0x7f0000000000)=0x3) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x619102, 0x0) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f00000000c0)={0x9, 0xb, 0x1}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffb000/0x4000)=nil, 0x4000}, 0x2}) [ 479.473434][T22205] IPVS: ftp: loaded support on port[0] = 21 06:39:49 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) io_setup(0x4, &(0x7f0000000040)=0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r3, 0x208200) r4 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000100), &(0x7f0000000180)=0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) io_submit(r1, 0x2, &(0x7f00000007c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f00000000c0)="ba", 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}]) 06:39:49 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpu.stat\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x10005, 0x800}) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r2, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r3, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r4, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) ioctl$USBDEVFS_SETINTERFACE(r0, 0x80085504, &(0x7f0000000100)={0xfffffffc, 0x1}) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r5, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) r7 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r7, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r8 = syz_open_dev$tty20(0xc, 0x4, 0x0) r9 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r9, &(0x7f00000002c0)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) ioctl$KDSKBSENT(r9, 0x4b49, &(0x7f0000000580)={0xe5, "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"}) writev(r8, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r10 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r10, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r11 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r11, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) write$selinux_load(r0, &(0x7f0000000180)=ANY=[@ANYRESOCT=r2, @ANYRES16=r7, @ANYRESOCT=r2, @ANYRESDEC=r4, @ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR=&(0x7f0000000200)=ANY=[@ANYRESOCT=0x0, @ANYRESHEX=r11], @ANYBLOB="41e212fa3ed652c01a4490ce1556117c40d419d3409fc4cfc4cddcf6258fb1316445a82169018be16ad9e575888c01a8be0fa18a3410209b63dacbea1d7d949a9ebc7f7bb2d93ff54e", @ANYRES64=r6, @ANYRES64=r2, @ANYBLOB="3e3dcdd55b7678adadcd62beaee07fe87ae1310032c850b207c0a479bd8cd6ddcde53c9d08a6a8f2d29586180f5868668a88ba750fce548f7ee8c80813cbcf7f8ec3d3d00af7646f3c71", @ANYRES32=r10, @ANYRESOCT=r8, @ANYBLOB="f02db6ecfb9f1c87488e963a6ec6c1948ef96907e984661beee270eb71faad0b7554b4d71dd8684417efeba69e18f9f45c7cf0616587cc6cb2df38b8a4b63059dac6e71d7d1a5f6f5c0507096ade590d8452b947c0cd813432a2cb76686390388f0be771cf4cf80793842514ef660ed444a455e591a892b26642ad83c44396c84a55a5a83b75820b4aca3bb03b346bddcb35be925e0f94800360ead378be75ff0d72df1c04ec7538dd1653134e06d9ea80bfdb3bade18e6f4e4e606077fadc0de25e4dc2575ede3dba7bff841a2d", @ANYRESDEC=r2]], 0x4c) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x450001, 0x0) r12 = socket(0x200000000000011, 0x3, 0x0) r13 = socket(0x200000000000011, 0x3, 0x0) r14 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r14, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r13, &(0x7f0000000240)={0x11, 0x0, r15}, 0x14) getsockname$packet(r13, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r12, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r16, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) getsockname$unix(r12, &(0x7f0000000040), &(0x7f0000000280)=0x75) 06:39:49 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x9}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 479.645177][ T39] audit: type=1400 audit(1579070389.434:84): avc: denied { read } for pid=22219 comm="syz-executor.3" path="socket:[81844]" dev="sockfs" ino=81844 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 06:39:49 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xa}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 479.821095][T22222] SELinux: policydb magic number 0x30303030 does not match expected magic number 0xf97cff8c [ 479.836604][T22227] IPVS: ftp: loaded support on port[0] = 21 [ 479.902016][T22222] SELinux: failed to load policy [ 479.971461][T22230] SELinux: policydb magic number 0x30303030 does not match expected magic number 0xf97cff8c [ 479.989460][T22230] SELinux: failed to load policy 06:39:49 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$EBT_SO_GET_INFO(r0, 0x84, 0x80, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000080)=0xffffffffffffff29) socket$inet6_dccp(0xa, 0x6, 0x0) 06:39:49 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpu.stat\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x10005, 0x800}) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r2, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r3, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r4, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) ioctl$USBDEVFS_SETINTERFACE(r0, 0x80085504, &(0x7f0000000100)={0xfffffffc, 0x1}) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r5, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) r7 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r7, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r8 = syz_open_dev$tty20(0xc, 0x4, 0x0) r9 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r9, &(0x7f00000002c0)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) ioctl$KDSKBSENT(r9, 0x4b49, &(0x7f0000000580)={0xe5, "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"}) writev(r8, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r10 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r10, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r11 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r11, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) write$selinux_load(r0, &(0x7f0000000180)=ANY=[@ANYRESOCT=r2, @ANYRES16=r7, @ANYRESOCT=r2, @ANYRESDEC=r4, @ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR=&(0x7f0000000200)=ANY=[@ANYRESOCT=0x0, @ANYRESHEX=r11], @ANYBLOB="41e212fa3ed652c01a4490ce1556117c40d419d3409fc4cfc4cddcf6258fb1316445a82169018be16ad9e575888c01a8be0fa18a3410209b63dacbea1d7d949a9ebc7f7bb2d93ff54e", @ANYRES64=r6, @ANYRES64=r2, @ANYBLOB="3e3dcdd55b7678adadcd62beaee07fe87ae1310032c850b207c0a479bd8cd6ddcde53c9d08a6a8f2d29586180f5868668a88ba750fce548f7ee8c80813cbcf7f8ec3d3d00af7646f3c71", @ANYRES32=r10, @ANYRESOCT=r8, @ANYBLOB="f02db6ecfb9f1c87488e963a6ec6c1948ef96907e984661beee270eb71faad0b7554b4d71dd8684417efeba69e18f9f45c7cf0616587cc6cb2df38b8a4b63059dac6e71d7d1a5f6f5c0507096ade590d8452b947c0cd813432a2cb76686390388f0be771cf4cf80793842514ef660ed444a455e591a892b26642ad83c44396c84a55a5a83b75820b4aca3bb03b346bddcb35be925e0f94800360ead378be75ff0d72df1c04ec7538dd1653134e06d9ea80bfdb3bade18e6f4e4e606077fadc0de25e4dc2575ede3dba7bff841a2d", @ANYRESDEC=r2]], 0x4c) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x450001, 0x0) r12 = socket(0x200000000000011, 0x3, 0x0) r13 = socket(0x200000000000011, 0x3, 0x0) r14 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r14, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r13, &(0x7f0000000240)={0x11, 0x0, r15}, 0x14) getsockname$packet(r13, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r12, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r16, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) getsockname$unix(r12, &(0x7f0000000040), &(0x7f0000000280)=0x75) 06:39:49 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xb}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:49 executing program 2: r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x3) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000080)={{{0x3}}, 0x9a, 0x500, &(0x7f0000000100)="a465027bf8bdd0c2080203856583dc541e3c621ff5fa82bee7140ea1812682a2438204fb2cae8f14dadacb06c94bf11b3ac8d11cfdf57c3ec96ae36daf15a1d5ab0786964816926516b81a6d601885ea916d522eded59deb222efc01bcd8bab81648cc71428318e320129660936bdfbf7d9cd072c25f300750dcbbdb330e18b78a1e7e936e3adfd23da1098210a5856e303119b699a517021609"}) r1 = open(&(0x7f0000000200)='./bus\x00', 0x14103e, 0x80) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x80000, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6}, 0x14) getsockname$packet(r4, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r3, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r7, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0)=0x8, 0x4) dup3(0xffffffffffffffff, r0, 0x80000) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20d00, 0x1000}, 0x18) [ 480.101253][ T9577] tipc: TX() has been purged, node left! 06:39:49 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x13f, 0x2}}, 0x20) r1 = socket$nl_route(0x10, 0x3, 0x0) dup3(r1, r0, 0x0) [ 480.121322][T22245] SELinux: policydb magic number 0x30303030 does not match expected magic number 0xf97cff8c [ 480.165281][T22245] SELinux: failed to load policy 06:39:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xc}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:50 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xffffffffffffff44}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="008537004bb70000000000000000007a"], 0x10}}, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r1, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r2, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r3, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r4, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r5, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r6, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYRES32=r5, @ANYRESHEX=r6, @ANYBLOB="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", @ANYRES16, @ANYPTR64=&(0x7f00000003c0)=ANY=[]], 0xad}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x3ef, 0x0) 06:39:50 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0xd6d7022d3eb535c8, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000140)=0xe8) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r5, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) fstat(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000540)={0xa0, 0x0, 0x2, {{0x4, 0x1, 0x7, 0x6, 0x0, 0x1, {0x6, 0x2, 0x8, 0x2, 0x3, 0x3, 0x6, 0xb76, 0x6, 0x0, 0x3, r4, r6, 0x80}}, {0x0, 0x4}}}, 0xa0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400218) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r7, &(0x7f0000000240)={0x11, 0x0, r9}, 0x14) getsockname$packet(r7, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18020000000000000d0100070000850000002c000000a1a0e508832cdb1d43f9c69f022d1f9500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r10, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 06:39:50 executing program 2: r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x3) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000080)={{{0x3}}, 0x9a, 0x500, &(0x7f0000000100)="a465027bf8bdd0c2080203856583dc541e3c621ff5fa82bee7140ea1812682a2438204fb2cae8f14dadacb06c94bf11b3ac8d11cfdf57c3ec96ae36daf15a1d5ab0786964816926516b81a6d601885ea916d522eded59deb222efc01bcd8bab81648cc71428318e320129660936bdfbf7d9cd072c25f300750dcbbdb330e18b78a1e7e936e3adfd23da1098210a5856e303119b699a517021609"}) r1 = open(&(0x7f0000000200)='./bus\x00', 0x14103e, 0x80) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x80000, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6}, 0x14) getsockname$packet(r4, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r3, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r7, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0)=0x8, 0x4) dup3(0xffffffffffffffff, r0, 0x80000) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20d00, 0x1000}, 0x18) 06:39:50 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0x12, &(0x7f0000000000)=0x7f, 0xfffffffffffffeaf) socketpair$unix(0x1, 0x0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x9, 0x80ffffffff}, 0x14) shutdown(r0, 0x1) 06:39:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x50}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x41100, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:39:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xe}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$phonet(0x23, 0x2, 0x1) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="34000000210071010000000000000000020020000000000004000100080002000000000008000000e000000208000b000000000058aba687af94016f889a1a8e81064b6500aaa61a1f39e411b5967335a2d30ad6e2ec46586e090782c9c3ba01d71f85bd3214c1f1927c9e2e3af8bfbe11ada1562156f63d50acb99ab9142c8c096bed7fc81b27df345528"], 0x34}}, 0x0) 06:39:50 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000040)) fchdir(r0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x351040, 0x0) fsconfig$FSCONFIG_SET_BINARY(r1, 0x2, &(0x7f00000001c0)='\x00', &(0x7f0000000300)="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", 0x1000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x24ba1dc0, 0x0, 0x0, [0x12, 0x0, 0x0, 0x40000000]}) 06:39:50 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) openat$ndctl0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ndctl0\x00', 0x202801, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x6}, &(0x7f0000000080)=0x8) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r3, &(0x7f0000000240)={0x11, 0x0, r5}, 0x14) getsockname$packet(r3, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x75, &(0x7f0000000280)={r8}, &(0x7f00000002c0)=0x18) getsockopt$inet_sctp6_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f00000000c0)={r8, 0x5, 0xd7, 0x3, 0x0, 0x7fff, 0x0, 0x8, {0x0, @in6={{0xa, 0x4e21, 0x32dd, @mcast1, 0xf8000000}}, 0xda, 0x7, 0x0, 0x3, 0x4}}, &(0x7f0000000180)=0xb0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000001c0)={r2, 0x7, 0x1, 0x74eb, 0xff7f, 0x0, 0x5, 0x5, {r2, @in={{0x2, 0x4e20, @local}}, 0x7, 0xffffefe1, 0xa4, 0x2800, 0xd0}}, &(0x7f0000000280)=0xb0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b0f, &(0x7f0000000600)='wlan1\x00\a\xd3~\xd4\xa2\xb8y\xe1\x04\xbe\x02\x00\x00\x00\x00\x00\x00@!\a\xff\x8d\x00\x00\xf6\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfd\xfd\x00\a\x00\x18\x9f \xfa\x91\x1b\x01U\xbe\x01\x01X\xbdh\xbfjOc\xcd\x15\xc1K\xab\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\xd1\x19EI\x952\x12,\xec\x02:a\xad\xef,\xbc (\x02B-mF\xfa\x92\xdc\x13\x06\x1fk6=z\x8eni)\xb5i\x0f\xc7\v\x9d\x81\xb3r\xb1x\\\xdb\xcbzE\xfeO\xe7\xdf\x96\xa2\xf8EX\xe3\xbcf\x02\x98T\x1a\x1f\x16\xb9\b\xa2\xb0\a\x00vCh>\xa3\xd7\xc70\x92C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7[\xe3\x00\x00\x00\x00\x00\x00t\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa \x91d\xff9\xfa\r\xbe\x16%\xde\xa2o\xa9\\%\xc8\xfa\xd9t\xe5t\x99\xb9j\x16\xc4}-\xf6\xd3\x02\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\xd0\xab.\x13L8V\x1d\xa0\x02#\xb4\xea@\x1b\xd0{\x02iE\xb30\xe8\xdb[\xc8\xe5\xae\x98\xdc\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cy\xb3QOT\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39\xe9yT\xc4\xf0\xef\xe0X\b#\x9a\xcd\xe0\xf8q\x9a\xcd\xdeAF,\x04\"\x84\xa9O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\xcc\x13\x12\xcc@\x89\xf8F\x82OO\x990\xcei\xf2\xd1\x04\xde\xaa\xfa\xc0\xe9c\x81\x86\xc3j2m\xf6B\x19=h\x8fe\xc2\x13\x92?||\xbf\x10\x8f$\xdf^\xba\x04^\x13\r}\xd2n?3O\xb5\xa8\xfa\xfe\xe6\x92\xfd\x1c\xbc\x15\x81G\xbeC\xb2\x80\x87\x83\xb6\xf7wz\xcf\xa3c\xac\xe56\x8cg\x15\x9e\x96c') 06:39:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x10}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:50 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x1, 0xc1df5f6619fb6c3a) ioctl$VIDIOC_TRY_DECODER_CMD(0xffffffffffffffff, 0xc0485661, &(0x7f0000000180)={0x7, 0x1, @stop_pts=0xffffffffffffff7f}) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000040)={0x40, 0x2, &(0x7f0000000200)="05ee9192e54719450d3126a7649dae0d25c336c00a5b5e2faa3b6272d1e169c7aafa058019ae2806279d4fe9b34b2da15aada591d8d7f13a4fc1567c7060861f7ffac5f9030b08ac8000762caf7305ba13bdba691ed5261ef960b92bcb9c68336e", {0xac63, 0x8, 0x35315258, 0x3, 0x5, 0x5, 0x1, 0x51}}) r1 = dup2(0xffffffffffffffff, r0) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0x10, &(0x7f00000000c0)={&(0x7f0000000080)=@can={{0x0, 0x1, 0x0, 0x1}, 0x3, 0x2, 0x0, 0x0, "745098018b602afe"}, 0x10}, 0x1, 0x0, 0x0, 0x1050}, 0x800c9c1) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000140)={0xef63c5b154473c62, 0x6, [@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @broadcast, @dev={[], 0xa}, @local, @random="226e2bdcc5b1", @dev={[], 0x2c}]}) 06:39:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SNDRV_PCM_IOCTL_USER_PVERSION(r2, 0x40044104, &(0x7f0000000040)=0x764eb6a) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0xf, 0x10}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 06:39:50 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x9, 0x0) connect$pppoe(r0, &(0x7f00000002c0)={0x18, 0x0, {0x1, @broadcast, 'netdevsim0\x00'}}, 0x1e) r1 = socket$inet(0x10, 0x800, 0xfd) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_ADD(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40008}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r3, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x48040410}, 0x2) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)="4c0000001200ff095ffefd956fa283b724a6006b00000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r4, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) fcntl$lock(r4, 0x26, &(0x7f0000000380)={0x0, 0x1, 0x7e83, 0x5, r5}) 06:39:50 executing program 3: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$CDROMMULTISESSION(r0, 0x5310, &(0x7f0000000280)={@lba=0x400, 0x0, 0x1}) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) io_setup(0x6, &(0x7f0000000040)=0x0) io_pgetevents(r2, 0x3, 0x3, &(0x7f0000000440)=[{}, {}, {}], 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r3, 0x208200) r4 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r5 = socket(0x200000000000011, 0x3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r5, &(0x7f0000000240)={0x11, 0x0, r7}, 0x14) getsockname$packet(r5, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) sendmsg$NFNL_MSG_ACCT_DEL(r5, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80008100}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x48, 0x3, 0x7, 0x200, 0x70bd29, 0x25dfdbfb, {0xa, 0x0, 0x7}, [@NFACCT_FILTER={0x34, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xff}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x8}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xffff8001}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x7}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x44000046}, 0x1) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r4, 0x0) io_submit(r2, 0x1, &(0x7f00000007c0)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f00000002c0)="ba", 0x1}]) [ 480.813113][ T9571] FAT-fs (loop3): error, fat_free_clusters: deleting FAT entry beyond EOF 06:39:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x11}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 480.871742][ T9571] FAT-fs (loop3): Filesystem has been set read-only 06:39:50 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000100)=0x80000003, 0x346) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@local, 0x7ff, 0xc1bdf8b0338cd648, 0x2, 0x8, 0x9, 0x8001}, 0x20) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c) 06:39:50 executing program 2: rt_sigprocmask(0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000000080)) r0 = memfd_create(&(0x7f0000000100)='\xf8\x0e\x1cB \x80\x00\x00\x00\x00\x00\x00\xab\xe2\xe7\xec', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 06:39:50 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) dup2(r0, r1) ioctl$TIOCL_BLANKSCREEN(r1, 0x541c, &(0x7f00000003c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r2, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) ioctl$TIOCL_PASTESEL(r2, 0x541c, &(0x7f0000000000)) 06:39:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x12}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:51 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SG_GET_COMMAND_Q(r1, 0x2270, &(0x7f0000000000)) r2 = request_key(&(0x7f0000000140)='cifs.spnego\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='system\x00', 0xfffffffffffffff9) keyctl$get_keyring_id(0x0, r2, 0x1) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) [ 481.311721][T22343] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 06:39:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x18, 0x2, [@IFLA_IPTUN_LOCAL={0x14, 0x9, @remote}]}}}]}, 0x44}}, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3, 0x800) 06:39:51 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x13}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:51 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) dup2(r0, r1) ioctl$TIOCL_BLANKSCREEN(r1, 0x541c, &(0x7f00000003c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r2, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) ioctl$TIOCL_PASTESEL(r2, 0x541c, &(0x7f0000000000)) 06:39:51 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) dup2(r0, r1) ioctl$TIOCL_BLANKSCREEN(r1, 0x541c, &(0x7f00000003c0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r2, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) ioctl$TIOCL_PASTESEL(r2, 0x541c, &(0x7f0000000000)) 06:39:52 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket(0x200000000000011, 0x3, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r8, &(0x7f0000000240)={0x11, 0x0, r10}, 0x14) getsockname$packet(r8, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) r11 = socket(0x200000000000011, 0x3, 0x0) r12 = socket(0x200000000000011, 0x3, 0x0) r13 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r12, &(0x7f0000000240)={0x11, 0x0, r14}, 0x14) getsockname$packet(r12, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r11, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r15, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) sendmmsg$sock(r11, &(0x7f0000000840)=[{{0x0, 0x3e8, &(0x7f00000007c0)=[{&(0x7f00000005c0)="fc7650842f55e19a270ea5031f62aa10b5b382ce502b753f1f47f86fb749db8604f7048a1765423db86fa1cccc657a0477b6b4f2c6f1f3a32f640cd1ba7fa1a0", 0x263}, {&(0x7f0000000600)="c06bb004b2c100a4618fb49e7a78246d04e4d749c5e5932fc23cf13722f8bcff91e151aa043f9f30d61918661cab8d6c7b3b00c2eb897ff9e8b60b8fc7dd844d7e4d0dc5ab1356346826ad4555a0643814875b01a9b2683edf64a754497f158dc87e65f7b115f1eff5e16c48987b3def3be0e9ebc57ba06865056c535699dc2e4db32843e6b8751230734b73e7e2fddac7aea4c772324bc2242b", 0x9a}, {&(0x7f00000006c0)="cf5b96003c92c57f504ab8105a79e8dc5f58d9b62993ab36b150b45a0cdcb916", 0x20}, {&(0x7f0000000700)="bef0ae58042bbdb3df1586b3a4e79b9828c5532bf13af63d6a1acbfd0195e5b7a61ec7df0d6c27bc6a5f30f697eeb4d51f41471c00f6cc68bb5c894bc0423111241063af614d8f40b1093f33d0b6ba838b6e9e9de5dbf086e8f1933bf8c986638963d421cf8bcce8b94c47c91b68503d84af154f693fc54eb044332ca81eccc74d250a7b2b5e8266a2bc3da6d19f891f059a49628da9152f88e4d6d36f49cb33db3fee65c996147fb0ab979d841647b4ed47b23d6c53c3f82c", 0xfffffffffffffe72}], 0x4, 0x0, 0x317}}], 0x1, 0x40800) ioctl$sock_inet_SIOCGIFNETMASK(r7, 0x891b, &(0x7f0000000580)={'veth1_to_hsr\x00', {0x2, 0x4e24, @multicast2}}) getsockname$packet(r4, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) ioctl$SIOCX25SCALLUSERDATA(r4, 0x89e5, &(0x7f0000000480)={0x22, "6355491889a1e750645f79c667004ca24aa570374855df02a5c6f7b84addf291da8684cc8a46c9c543ecf8bf437b73000058dfaefc857c66941e5f79cc13810e9c131b94c4e4f38ca0ef2754a11b8a56d4bfd6e2b04315d063f9588abb454911af030b9e6ea2016b66ecdc9f95ee84f63e7ebac117a9836382697c65730c38f4"}) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000340)={0x7, 0x5, 0x8000, 0x7, [], [], [], 0x77a, 0x1, 0x1ff, 0x80000000, "eb65674d40e062c90b58903e55d0eedf"}) 06:39:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) r8 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) getsockname$packet(r10, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r11 = socket(0x200000000000011, 0x3, 0x0) r12 = socket(0x200000000000011, 0x3, 0x0) r13 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r12, &(0x7f0000000240)={0x11, 0x0, r14}, 0x14) getsockname$packet(r12, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r11, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r15, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r15}, [@IFLA_AF_SPEC={0x8, 0x1a, 0x0, 0x1, [@AF_MPLS]}]}, 0x8}}, 0x0) [ 482.200583][T22361] netlink: 'syz-executor.3': attribute type 9 has an invalid length. [ 482.249571][T22361] netlink: 'syz-executor.3': attribute type 9 has an invalid length. 06:39:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x14}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:52 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f00000000c0)={{0x1, 0x0, @descriptor="36fb1930fce89fcc"}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400218) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x44102, 0x4c) [ 482.253940][T22368] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1777721599 > max in inode 17608 06:39:52 executing program 3: getcwd(&(0x7f0000000000)=""/64, 0x40) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r0 = socket(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0xa8d, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x40000, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ocfs2_control\x00', 0x100000, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x6628, 0x0) 06:39:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x1c}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r2, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) signalfd(r2, &(0x7f0000000000)={0x9}, 0x8) r3 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x9, &(0x7f0000000240)=0x0) connect$can_bcm(r3, &(0x7f0000000140), 0x10) io_submit(r4, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0xfffd, r3, &(0x7f0000000200)="05000000ffc21faf16da39de706f646800580f02000000003f420f000000000000580f02000000003f420f000000000000ffffffff000000", 0x38}]) 06:39:52 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000140)=0x4) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r3, &(0x7f0000000500)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x88200090}, 0xc, &(0x7f00000004c0)={&(0x7f0000000240)={0x274, r4, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_TAGLST={0x34, 0x4, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x525bd14d174dd413}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x94, 0xc, [{0x1c, 0xb, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x105619c2}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3f0387e1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb9c2}]}, {0x1c, 0xb, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe63c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9353}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6ed551aa}]}, {0x24, 0xb, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x13bca4e9}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x67126d1a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4991}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x694cfc14}]}, {0x34, 0xb, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x11b}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6264}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6aa2}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2da52bbe}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa76f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x62bc}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x38, 0xc, [{0x34, 0xb, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe7e7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb6df}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2395ab0b}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4998}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8263}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x539e8b7d}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x158, 0x8, [{0x34, 0x7, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x35ef4ddd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb6}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x446e4161}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x73}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7c51b911}]}, {0x24, 0x7, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x21b6e43d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd7}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x9bdae0b}]}, {0x4c, 0x7, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x245abe77}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3bd154fe}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x47e12da1}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x39}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xfd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd0}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xea}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x511efb47}]}, {0x3c, 0x7, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x65467fb7}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x103fb753}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xea}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x84ea78e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xee}]}, {0x1c, 0x7, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6877bc64}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6d1ec79c}]}, {0x2c, 0x7, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x31}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4af67e27}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc0}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8c}]}, {0x2c, 0x7, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1dafd3db}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6c4a6b}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xab}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x52c350d0}]}]}]}, 0x274}, 0x1, 0x0, 0x0, 0x8000}, 0x20004000) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x1) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20, @remote}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) [ 482.498513][T22394] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 06:39:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x48}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:52 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket(0x200000000000011, 0x3, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r8, &(0x7f0000000240)={0x11, 0x0, r10}, 0x14) getsockname$packet(r8, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) r11 = socket(0x200000000000011, 0x3, 0x0) r12 = socket(0x200000000000011, 0x3, 0x0) r13 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r12, &(0x7f0000000240)={0x11, 0x0, r14}, 0x14) getsockname$packet(r12, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r11, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r15, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) sendmmsg$sock(r11, &(0x7f0000000840)=[{{0x0, 0x3e8, &(0x7f00000007c0)=[{&(0x7f00000005c0)="fc7650842f55e19a270ea5031f62aa10b5b382ce502b753f1f47f86fb749db8604f7048a1765423db86fa1cccc657a0477b6b4f2c6f1f3a32f640cd1ba7fa1a0", 0x263}, {&(0x7f0000000600)="c06bb004b2c100a4618fb49e7a78246d04e4d749c5e5932fc23cf13722f8bcff91e151aa043f9f30d61918661cab8d6c7b3b00c2eb897ff9e8b60b8fc7dd844d7e4d0dc5ab1356346826ad4555a0643814875b01a9b2683edf64a754497f158dc87e65f7b115f1eff5e16c48987b3def3be0e9ebc57ba06865056c535699dc2e4db32843e6b8751230734b73e7e2fddac7aea4c772324bc2242b", 0x9a}, {&(0x7f00000006c0)="cf5b96003c92c57f504ab8105a79e8dc5f58d9b62993ab36b150b45a0cdcb916", 0x20}, {&(0x7f0000000700)="bef0ae58042bbdb3df1586b3a4e79b9828c5532bf13af63d6a1acbfd0195e5b7a61ec7df0d6c27bc6a5f30f697eeb4d51f41471c00f6cc68bb5c894bc0423111241063af614d8f40b1093f33d0b6ba838b6e9e9de5dbf086e8f1933bf8c986638963d421cf8bcce8b94c47c91b68503d84af154f693fc54eb044332ca81eccc74d250a7b2b5e8266a2bc3da6d19f891f059a49628da9152f88e4d6d36f49cb33db3fee65c996147fb0ab979d841647b4ed47b23d6c53c3f82c", 0xfffffffffffffe72}], 0x4, 0x0, 0x317}}], 0x1, 0x40800) ioctl$sock_inet_SIOCGIFNETMASK(r7, 0x891b, &(0x7f0000000580)={'veth1_to_hsr\x00', {0x2, 0x4e24, @multicast2}}) getsockname$packet(r4, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) ioctl$SIOCX25SCALLUSERDATA(r4, 0x89e5, &(0x7f0000000480)={0x22, "6355491889a1e750645f79c667004ca24aa570374855df02a5c6f7b84addf291da8684cc8a46c9c543ecf8bf437b73000058dfaefc857c66941e5f79cc13810e9c131b94c4e4f38ca0ef2754a11b8a56d4bfd6e2b04315d063f9588abb454911af030b9e6ea2016b66ecdc9f95ee84f63e7ebac117a9836382697c65730c38f4"}) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000340)={0x7, 0x5, 0x8000, 0x7, [], [], [], 0x77a, 0x1, 0x1ff, 0x80000000, "eb65674d40e062c90b58903e55d0eedf"}) 06:39:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x4a}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 483.031369][T22407] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1777721599 > max in inode 17608 06:39:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x4c}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:52 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket(0x200000000000011, 0x3, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r8, &(0x7f0000000240)={0x11, 0x0, r10}, 0x14) getsockname$packet(r8, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) r11 = socket(0x200000000000011, 0x3, 0x0) r12 = socket(0x200000000000011, 0x3, 0x0) r13 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r12, &(0x7f0000000240)={0x11, 0x0, r14}, 0x14) getsockname$packet(r12, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r11, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r15, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) sendmmsg$sock(r11, &(0x7f0000000840)=[{{0x0, 0x3e8, &(0x7f00000007c0)=[{&(0x7f00000005c0)="fc7650842f55e19a270ea5031f62aa10b5b382ce502b753f1f47f86fb749db8604f7048a1765423db86fa1cccc657a0477b6b4f2c6f1f3a32f640cd1ba7fa1a0", 0x263}, {&(0x7f0000000600)="c06bb004b2c100a4618fb49e7a78246d04e4d749c5e5932fc23cf13722f8bcff91e151aa043f9f30d61918661cab8d6c7b3b00c2eb897ff9e8b60b8fc7dd844d7e4d0dc5ab1356346826ad4555a0643814875b01a9b2683edf64a754497f158dc87e65f7b115f1eff5e16c48987b3def3be0e9ebc57ba06865056c535699dc2e4db32843e6b8751230734b73e7e2fddac7aea4c772324bc2242b", 0x9a}, {&(0x7f00000006c0)="cf5b96003c92c57f504ab8105a79e8dc5f58d9b62993ab36b150b45a0cdcb916", 0x20}, {&(0x7f0000000700)="bef0ae58042bbdb3df1586b3a4e79b9828c5532bf13af63d6a1acbfd0195e5b7a61ec7df0d6c27bc6a5f30f697eeb4d51f41471c00f6cc68bb5c894bc0423111241063af614d8f40b1093f33d0b6ba838b6e9e9de5dbf086e8f1933bf8c986638963d421cf8bcce8b94c47c91b68503d84af154f693fc54eb044332ca81eccc74d250a7b2b5e8266a2bc3da6d19f891f059a49628da9152f88e4d6d36f49cb33db3fee65c996147fb0ab979d841647b4ed47b23d6c53c3f82c", 0xfffffffffffffe72}], 0x4, 0x0, 0x317}}], 0x1, 0x40800) ioctl$sock_inet_SIOCGIFNETMASK(r7, 0x891b, &(0x7f0000000580)={'veth1_to_hsr\x00', {0x2, 0x4e24, @multicast2}}) getsockname$packet(r4, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) ioctl$SIOCX25SCALLUSERDATA(r4, 0x89e5, &(0x7f0000000480)={0x22, "6355491889a1e750645f79c667004ca24aa570374855df02a5c6f7b84addf291da8684cc8a46c9c543ecf8bf437b73000058dfaefc857c66941e5f79cc13810e9c131b94c4e4f38ca0ef2754a11b8a56d4bfd6e2b04315d063f9588abb454911af030b9e6ea2016b66ecdc9f95ee84f63e7ebac117a9836382697c65730c38f4"}) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000340)={0x7, 0x5, 0x8000, 0x7, [], [], [], 0x77a, 0x1, 0x1ff, 0x80000000, "eb65674d40e062c90b58903e55d0eedf"}) 06:39:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x60}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 483.345027][T22421] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1777721599 > max in inode 17613 [ 484.810043][ T9577] tipc: TX() has been purged, node left! 06:39:58 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@size={'size', 0x3d, [0x65, 0x0]}}]}) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) 06:39:58 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) mmap$snddsp_control(&(0x7f0000ffd000/0x3000)=nil, 0x1000, 0xf9a1361e6b8597ac, 0x8005010, 0xffffffffffffffff, 0x83000000) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001800810500000000000000001d01000015000400000000efde3ff720020000000800050000080000"], 0x34}}, 0x0) 06:39:58 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x68}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:58 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket(0x200000000000011, 0x3, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r8, &(0x7f0000000240)={0x11, 0x0, r10}, 0x14) getsockname$packet(r8, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) r11 = socket(0x200000000000011, 0x3, 0x0) r12 = socket(0x200000000000011, 0x3, 0x0) r13 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r12, &(0x7f0000000240)={0x11, 0x0, r14}, 0x14) getsockname$packet(r12, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r11, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r15, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) sendmmsg$sock(r11, &(0x7f0000000840)=[{{0x0, 0x3e8, &(0x7f00000007c0)=[{&(0x7f00000005c0)="fc7650842f55e19a270ea5031f62aa10b5b382ce502b753f1f47f86fb749db8604f7048a1765423db86fa1cccc657a0477b6b4f2c6f1f3a32f640cd1ba7fa1a0", 0x263}, {&(0x7f0000000600)="c06bb004b2c100a4618fb49e7a78246d04e4d749c5e5932fc23cf13722f8bcff91e151aa043f9f30d61918661cab8d6c7b3b00c2eb897ff9e8b60b8fc7dd844d7e4d0dc5ab1356346826ad4555a0643814875b01a9b2683edf64a754497f158dc87e65f7b115f1eff5e16c48987b3def3be0e9ebc57ba06865056c535699dc2e4db32843e6b8751230734b73e7e2fddac7aea4c772324bc2242b", 0x9a}, {&(0x7f00000006c0)="cf5b96003c92c57f504ab8105a79e8dc5f58d9b62993ab36b150b45a0cdcb916", 0x20}, {&(0x7f0000000700)="bef0ae58042bbdb3df1586b3a4e79b9828c5532bf13af63d6a1acbfd0195e5b7a61ec7df0d6c27bc6a5f30f697eeb4d51f41471c00f6cc68bb5c894bc0423111241063af614d8f40b1093f33d0b6ba838b6e9e9de5dbf086e8f1933bf8c986638963d421cf8bcce8b94c47c91b68503d84af154f693fc54eb044332ca81eccc74d250a7b2b5e8266a2bc3da6d19f891f059a49628da9152f88e4d6d36f49cb33db3fee65c996147fb0ab979d841647b4ed47b23d6c53c3f82c", 0xfffffffffffffe72}], 0x4, 0x0, 0x317}}], 0x1, 0x40800) ioctl$sock_inet_SIOCGIFNETMASK(r7, 0x891b, &(0x7f0000000580)={'veth1_to_hsr\x00', {0x2, 0x4e24, @multicast2}}) getsockname$packet(r4, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) ioctl$SIOCX25SCALLUSERDATA(r4, 0x89e5, &(0x7f0000000480)={0x22, "6355491889a1e750645f79c667004ca24aa570374855df02a5c6f7b84addf291da8684cc8a46c9c543ecf8bf437b73000058dfaefc857c66941e5f79cc13810e9c131b94c4e4f38ca0ef2754a11b8a56d4bfd6e2b04315d063f9588abb454911af030b9e6ea2016b66ecdc9f95ee84f63e7ebac117a9836382697c65730c38f4"}) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000340)={0x7, 0x5, 0x8000, 0x7, [], [], [], 0x77a, 0x1, 0x1ff, 0x80000000, "eb65674d40e062c90b58903e55d0eedf"}) [ 489.069859][T22442] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 489.172924][T22448] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 06:39:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x6c}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:59 executing program 3: getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x18, &(0x7f0000000040), &(0x7f0000000100)=0x4) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3b, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e0000002e00815be00f80ecdb4cb9040b4865160800030040000000000004140e000a001500cd5edc2976d153b4", 0x235}], 0x1}, 0x0) [ 489.177421][T22449] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1777721599 > max in inode 17625 06:39:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9, 0x6, &(0x7f0000001480)=[{&(0x7f00000000c0)="75e29ab85b2f8a4dccbe11f609c4cfbcf2a45641b0b1dcd71a44bcd124039fe4d6010000007a0c2004957de95058a6a061a2733f76094ac8b6ef07a38d7900b10c6115df40d9650d32ce01672a9bf4ec68246ed21afe4dc82b1468d9670488d720aff34bd43300"/115, 0x73, 0x6}, {&(0x7f00000016c0)="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", 0x1c5, 0x8000}, {&(0x7f0000001540)="1e0dcb66488835d8affa9309dea32a06b856492913422452047e04b1bc77c6b3fbfc80085632df339436187b6006b89290c1391635a844b30e297f6730fde4373a96380fb801c18dfdecb61279fd5f6d0a220c52c879539b374051ffaf56495fb9a9b34532f91058045f6a82f0b32057f94815771851205f41db820440fc469ebae59d6e0816d02ca7fef53a21cf8207048694a5ab101cb3a429437fe66bacac82b284513f717b7ced3d786ec6c42da1a2d4c2dc730da6bde6b9b332ea0944cc3329797d98bafc2308ac00"/219, 0xdb, 0x6}, {&(0x7f0000003400)="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", 0x1067, 0x5}, {&(0x7f0000000240)="0e4dca83fc587c0174576353acbdb3b9367b125a8b05e01b81d76e761507a5a68ba5885978de44863ca239f496537853545d88831e8c44398df20034a012b78dae2533904c8e0f50d07d05dab5827c9bf9939a41353826e19eadd4cf3e8e476d073c78c498aed3cc9771f165e5fef71184f412786e5286ce2432c3011da7e6bdd574477aa0d187517b84182011317ad60ca742e7da3d08936b9521d5f3cfbd529859b3624d92610b1569a6cbce6cda0f0950f54f6cd31e5a759a63f267d983dfc733d1ae9eda27c7669f4fca41bef0d1c4e49adbd7b4360c0ab56c60977439d21153a917ec354c8d89075a6b", 0xec, 0x1ff}, {&(0x7f0000000340)="81c7c457a790929fe8ea73eca64dd0b5cae1dacd48ac9898e4acf7155c2618a58a2827d3496661b870411c92c57d420620fe9aefd79efbaf84fdb8ef59429ab4407d7fded0f3452996e7eb58b294868ca125e75432cc02aba19b9a91768e", 0x5e, 0x401}], 0x410, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x480441, 0x0) r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x2000, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, &(0x7f0000000080)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast}) stat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) 06:39:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000001040)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {0x0, 0x0, 0x4}, [@IPSET_ATTR_TYPENAME={0x2e7, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) [ 489.394216][T22467] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.3'. [ 489.423108][T22468] FAT-fs (loop0): invalid media value (0x52) [ 489.464050][T22468] FAT-fs (loop0): Can't find a valid FAT filesystem 06:39:59 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket(0x200000000000011, 0x3, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r8, &(0x7f0000000240)={0x11, 0x0, r10}, 0x14) getsockname$packet(r8, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) r11 = socket(0x200000000000011, 0x3, 0x0) r12 = socket(0x200000000000011, 0x3, 0x0) r13 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r12, &(0x7f0000000240)={0x11, 0x0, r14}, 0x14) getsockname$packet(r12, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r11, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r15, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) sendmmsg$sock(r11, &(0x7f0000000840)=[{{0x0, 0x3e8, &(0x7f00000007c0)=[{&(0x7f00000005c0)="fc7650842f55e19a270ea5031f62aa10b5b382ce502b753f1f47f86fb749db8604f7048a1765423db86fa1cccc657a0477b6b4f2c6f1f3a32f640cd1ba7fa1a0", 0x263}, {&(0x7f0000000600)="c06bb004b2c100a4618fb49e7a78246d04e4d749c5e5932fc23cf13722f8bcff91e151aa043f9f30d61918661cab8d6c7b3b00c2eb897ff9e8b60b8fc7dd844d7e4d0dc5ab1356346826ad4555a0643814875b01a9b2683edf64a754497f158dc87e65f7b115f1eff5e16c48987b3def3be0e9ebc57ba06865056c535699dc2e4db32843e6b8751230734b73e7e2fddac7aea4c772324bc2242b", 0x9a}, {&(0x7f00000006c0)="cf5b96003c92c57f504ab8105a79e8dc5f58d9b62993ab36b150b45a0cdcb916", 0x20}, {&(0x7f0000000700)="bef0ae58042bbdb3df1586b3a4e79b9828c5532bf13af63d6a1acbfd0195e5b7a61ec7df0d6c27bc6a5f30f697eeb4d51f41471c00f6cc68bb5c894bc0423111241063af614d8f40b1093f33d0b6ba838b6e9e9de5dbf086e8f1933bf8c986638963d421cf8bcce8b94c47c91b68503d84af154f693fc54eb044332ca81eccc74d250a7b2b5e8266a2bc3da6d19f891f059a49628da9152f88e4d6d36f49cb33db3fee65c996147fb0ab979d841647b4ed47b23d6c53c3f82c", 0xfffffffffffffe72}], 0x4, 0x0, 0x317}}], 0x1, 0x40800) ioctl$sock_inet_SIOCGIFNETMASK(r7, 0x891b, &(0x7f0000000580)={'veth1_to_hsr\x00', {0x2, 0x4e24, @multicast2}}) getsockname$packet(r4, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) ioctl$SIOCX25SCALLUSERDATA(r4, 0x89e5, &(0x7f0000000480)={0x22, "6355491889a1e750645f79c667004ca24aa570374855df02a5c6f7b84addf291da8684cc8a46c9c543ecf8bf437b73000058dfaefc857c66941e5f79cc13810e9c131b94c4e4f38ca0ef2754a11b8a56d4bfd6e2b04315d063f9588abb454911af030b9e6ea2016b66ecdc9f95ee84f63e7ebac117a9836382697c65730c38f4"}) 06:39:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400218) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x60a) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) dup2(r1, r2) 06:39:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x74}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 489.644269][T22468] FAT-fs (loop0): invalid media value (0x52) [ 489.669399][T22468] FAT-fs (loop0): Can't find a valid FAT filesystem 06:39:59 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000180), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000200)="f4001100002b2c25fe8000000000000005baa68754a3000000000200000000000000000000ffffff8800000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}, {&(0x7f00000000c0)="ee6ffb5813d4ee91f7dbf33e566ca4974187c2bbf1509a0a3b131b019d55af895924d53cb48e65659d21b6fc5caf1afa79aac6bc608d23710e37c67f120bea240d9b8c83421a79c3288af45d2161", 0x4e}], 0x2}, 0x900) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8982, &(0x7f0000000000)={0x6, 'netdevsim0\x00', {0x38}, 0x200}) 06:39:59 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) dup(r0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x1) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000001c0)='westwood\x00', 0x39) r2 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x3f, 0x208402) ioctl$SIOCRSACCEPT(r2, 0x89e3) [ 489.705118][T22487] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1777721599 > max in inode 17626 06:39:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x7a}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 489.777235][T22494] Dead loop on virtual device ip6_vti0, fix it urgently! 06:39:59 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(0xffffffffffffffff, 0xc040564a, &(0x7f0000000080)={0x40000000, 0x0, 0x200b, 0x8, 0x40, 0x23b59131, 0x0, 0x3}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$VIDIOC_G_AUDIO(r2, 0x80345621, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r3 = open(&(0x7f0000000280)='./file0\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xc, 0x110, r3, 0x3bf2e000) mincore(&(0x7f00001d0000/0x2000)=nil, 0x2000, &(0x7f0000000000)=""/81) 06:39:59 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket(0x200000000000011, 0x3, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r8, &(0x7f0000000240)={0x11, 0x0, r10}, 0x14) getsockname$packet(r8, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) r11 = socket(0x200000000000011, 0x3, 0x0) r12 = socket(0x200000000000011, 0x3, 0x0) r13 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r12, &(0x7f0000000240)={0x11, 0x0, r14}, 0x14) getsockname$packet(r12, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r11, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r15, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) sendmmsg$sock(r11, &(0x7f0000000840)=[{{0x0, 0x3e8, &(0x7f00000007c0)=[{&(0x7f00000005c0)="fc7650842f55e19a270ea5031f62aa10b5b382ce502b753f1f47f86fb749db8604f7048a1765423db86fa1cccc657a0477b6b4f2c6f1f3a32f640cd1ba7fa1a0", 0x263}, {&(0x7f0000000600)="c06bb004b2c100a4618fb49e7a78246d04e4d749c5e5932fc23cf13722f8bcff91e151aa043f9f30d61918661cab8d6c7b3b00c2eb897ff9e8b60b8fc7dd844d7e4d0dc5ab1356346826ad4555a0643814875b01a9b2683edf64a754497f158dc87e65f7b115f1eff5e16c48987b3def3be0e9ebc57ba06865056c535699dc2e4db32843e6b8751230734b73e7e2fddac7aea4c772324bc2242b", 0x9a}, {&(0x7f00000006c0)="cf5b96003c92c57f504ab8105a79e8dc5f58d9b62993ab36b150b45a0cdcb916", 0x20}, {&(0x7f0000000700)="bef0ae58042bbdb3df1586b3a4e79b9828c5532bf13af63d6a1acbfd0195e5b7a61ec7df0d6c27bc6a5f30f697eeb4d51f41471c00f6cc68bb5c894bc0423111241063af614d8f40b1093f33d0b6ba838b6e9e9de5dbf086e8f1933bf8c986638963d421cf8bcce8b94c47c91b68503d84af154f693fc54eb044332ca81eccc74d250a7b2b5e8266a2bc3da6d19f891f059a49628da9152f88e4d6d36f49cb33db3fee65c996147fb0ab979d841647b4ed47b23d6c53c3f82c", 0xfffffffffffffe72}], 0x4, 0x0, 0x317}}], 0x1, 0x40800) ioctl$sock_inet_SIOCGIFNETMASK(r7, 0x891b, &(0x7f0000000580)={'veth1_to_hsr\x00', {0x2, 0x4e24, @multicast2}}) getsockname$packet(r4, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) 06:39:59 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)={0x18, r1, 0xe99, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1400100}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0xb0, r1, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x3c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6b}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1e2a}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x38}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fffffff}]}, @TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8edd}]}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4028}, 0x20004040) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0xf6) connect$inet(r3, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r3, &(0x7f0000007fc0), 0x400000000000030, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000080)) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)={0x18, r7, 0xe99, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}}, 0x0) sendmsg$TIPC_NL_LINK_SET(r5, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000049}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="d5d21b3c", @ANYRES16=r7, @ANYBLOB="100029bd7000fcdbdf2509000000"], 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x6a199bd52aad978) ioctl(r4, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$RTC_ALM_SET(r4, 0x40247007, &(0x7f0000000000)={0x26, 0x1b, 0xe, 0x7, 0x4, 0x0, 0x0, 0x15f, 0x1}) [ 489.874201][ T39] audit: type=1800 audit(1579070399.664:85): pid=22506 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17618 res=0 06:39:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xc7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:39:59 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket(0x200000000000011, 0x3, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r8, &(0x7f0000000240)={0x11, 0x0, r10}, 0x14) getsockname$packet(r8, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) r11 = socket(0x200000000000011, 0x3, 0x0) r12 = socket(0x200000000000011, 0x3, 0x0) r13 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r12, &(0x7f0000000240)={0x11, 0x0, r14}, 0x14) getsockname$packet(r12, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r11, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r15, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) sendmmsg$sock(r11, &(0x7f0000000840)=[{{0x0, 0x3e8, &(0x7f00000007c0)=[{&(0x7f00000005c0)="fc7650842f55e19a270ea5031f62aa10b5b382ce502b753f1f47f86fb749db8604f7048a1765423db86fa1cccc657a0477b6b4f2c6f1f3a32f640cd1ba7fa1a0", 0x263}, {&(0x7f0000000600)="c06bb004b2c100a4618fb49e7a78246d04e4d749c5e5932fc23cf13722f8bcff91e151aa043f9f30d61918661cab8d6c7b3b00c2eb897ff9e8b60b8fc7dd844d7e4d0dc5ab1356346826ad4555a0643814875b01a9b2683edf64a754497f158dc87e65f7b115f1eff5e16c48987b3def3be0e9ebc57ba06865056c535699dc2e4db32843e6b8751230734b73e7e2fddac7aea4c772324bc2242b", 0x9a}, {&(0x7f00000006c0)="cf5b96003c92c57f504ab8105a79e8dc5f58d9b62993ab36b150b45a0cdcb916", 0x20}, {&(0x7f0000000700)="bef0ae58042bbdb3df1586b3a4e79b9828c5532bf13af63d6a1acbfd0195e5b7a61ec7df0d6c27bc6a5f30f697eeb4d51f41471c00f6cc68bb5c894bc0423111241063af614d8f40b1093f33d0b6ba838b6e9e9de5dbf086e8f1933bf8c986638963d421cf8bcce8b94c47c91b68503d84af154f693fc54eb044332ca81eccc74d250a7b2b5e8266a2bc3da6d19f891f059a49628da9152f88e4d6d36f49cb33db3fee65c996147fb0ab979d841647b4ed47b23d6c53c3f82c", 0xfffffffffffffe72}], 0x4, 0x0, 0x317}}], 0x1, 0x40800) ioctl$sock_inet_SIOCGIFNETMASK(r7, 0x891b, &(0x7f0000000580)={'veth1_to_hsr\x00', {0x2, 0x4e24, @multicast2}}) getsockname$packet(r4, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) ioctl$SIOCX25SCALLUSERDATA(r4, 0x89e5, &(0x7f0000000480)={0x22, "6355491889a1e750645f79c667004ca24aa570374855df02a5c6f7b84addf291da8684cc8a46c9c543ecf8bf437b73000058dfaefc857c66941e5f79cc13810e9c131b94c4e4f38ca0ef2754a11b8a56d4bfd6e2b04315d063f9588abb454911af030b9e6ea2016b66ecdc9f95ee84f63e7ebac117a9836382697c65730c38f4"}) 06:39:59 executing program 0: request_key(&(0x7f0000000140)='dns_resolver\x00', 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r1, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r1) add_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000180)="8ad1fe4cd3a3a5476981259d513933b52f137cb354399e4c251c1b7054c2cccb92b2eb25f092fca1ea2fc5fc2744dbb303f47074b4bf03833174f7c8bb728d8cd9f9266059dbe1b5e83d60a07410c3ceb1c0ff7b523092f11d33fbd32aaaa4cf3f66cfbb1210109c02ee89c38f6c788c9fd634edec8f39463b952f707bf6f6497d326f247a2cea5b83346fda61abd07c86efcd1501c6a51fbd826f9d32a7caa36acc8c0f", 0xa4, r2) [ 490.101309][T22519] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1777721599 > max in inode 17627 [ 490.102554][T22523] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1777721599 > max in inode 17628 [ 490.166500][T22527] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 06:40:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xf0}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 490.213286][T22527] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 06:40:00 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket(0x200000000000011, 0x3, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r8, &(0x7f0000000240)={0x11, 0x0, r10}, 0x14) getsockname$packet(r8, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) r11 = socket(0x200000000000011, 0x3, 0x0) r12 = socket(0x200000000000011, 0x3, 0x0) r13 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r12, &(0x7f0000000240)={0x11, 0x0, r14}, 0x14) getsockname$packet(r12, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r11, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r15, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) sendmmsg$sock(r11, &(0x7f0000000840)=[{{0x0, 0x3e8, &(0x7f00000007c0)=[{&(0x7f00000005c0)="fc7650842f55e19a270ea5031f62aa10b5b382ce502b753f1f47f86fb749db8604f7048a1765423db86fa1cccc657a0477b6b4f2c6f1f3a32f640cd1ba7fa1a0", 0x263}, {&(0x7f0000000600)="c06bb004b2c100a4618fb49e7a78246d04e4d749c5e5932fc23cf13722f8bcff91e151aa043f9f30d61918661cab8d6c7b3b00c2eb897ff9e8b60b8fc7dd844d7e4d0dc5ab1356346826ad4555a0643814875b01a9b2683edf64a754497f158dc87e65f7b115f1eff5e16c48987b3def3be0e9ebc57ba06865056c535699dc2e4db32843e6b8751230734b73e7e2fddac7aea4c772324bc2242b", 0x9a}, {&(0x7f00000006c0)="cf5b96003c92c57f504ab8105a79e8dc5f58d9b62993ab36b150b45a0cdcb916", 0x20}, {&(0x7f0000000700)="bef0ae58042bbdb3df1586b3a4e79b9828c5532bf13af63d6a1acbfd0195e5b7a61ec7df0d6c27bc6a5f30f697eeb4d51f41471c00f6cc68bb5c894bc0423111241063af614d8f40b1093f33d0b6ba838b6e9e9de5dbf086e8f1933bf8c986638963d421cf8bcce8b94c47c91b68503d84af154f693fc54eb044332ca81eccc74d250a7b2b5e8266a2bc3da6d19f891f059a49628da9152f88e4d6d36f49cb33db3fee65c996147fb0ab979d841647b4ed47b23d6c53c3f82c", 0xfffffffffffffe72}], 0x4, 0x0, 0x317}}], 0x1, 0x40800) ioctl$sock_inet_SIOCGIFNETMASK(r7, 0x891b, &(0x7f0000000580)={'veth1_to_hsr\x00', {0x2, 0x4e24, @multicast2}}) getsockname$packet(r4, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) ioctl$SIOCX25SCALLUSERDATA(r4, 0x89e5, &(0x7f0000000480)={0x22, "6355491889a1e750645f79c667004ca24aa570374855df02a5c6f7b84addf291da8684cc8a46c9c543ecf8bf437b73000058dfaefc857c66941e5f79cc13810e9c131b94c4e4f38ca0ef2754a11b8a56d4bfd6e2b04315d063f9588abb454911af030b9e6ea2016b66ecdc9f95ee84f63e7ebac117a9836382697c65730c38f4"}) 06:40:00 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket(0x200000000000011, 0x3, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r8, &(0x7f0000000240)={0x11, 0x0, r10}, 0x14) getsockname$packet(r8, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) r11 = socket(0x200000000000011, 0x3, 0x0) r12 = socket(0x200000000000011, 0x3, 0x0) r13 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r12, &(0x7f0000000240)={0x11, 0x0, r14}, 0x14) getsockname$packet(r12, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r11, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r15, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) sendmmsg$sock(r11, &(0x7f0000000840)=[{{0x0, 0x3e8, &(0x7f00000007c0)=[{&(0x7f00000005c0)="fc7650842f55e19a270ea5031f62aa10b5b382ce502b753f1f47f86fb749db8604f7048a1765423db86fa1cccc657a0477b6b4f2c6f1f3a32f640cd1ba7fa1a0", 0x263}, {&(0x7f0000000600)="c06bb004b2c100a4618fb49e7a78246d04e4d749c5e5932fc23cf13722f8bcff91e151aa043f9f30d61918661cab8d6c7b3b00c2eb897ff9e8b60b8fc7dd844d7e4d0dc5ab1356346826ad4555a0643814875b01a9b2683edf64a754497f158dc87e65f7b115f1eff5e16c48987b3def3be0e9ebc57ba06865056c535699dc2e4db32843e6b8751230734b73e7e2fddac7aea4c772324bc2242b", 0x9a}, {&(0x7f00000006c0)="cf5b96003c92c57f504ab8105a79e8dc5f58d9b62993ab36b150b45a0cdcb916", 0x20}, {&(0x7f0000000700)="bef0ae58042bbdb3df1586b3a4e79b9828c5532bf13af63d6a1acbfd0195e5b7a61ec7df0d6c27bc6a5f30f697eeb4d51f41471c00f6cc68bb5c894bc0423111241063af614d8f40b1093f33d0b6ba838b6e9e9de5dbf086e8f1933bf8c986638963d421cf8bcce8b94c47c91b68503d84af154f693fc54eb044332ca81eccc74d250a7b2b5e8266a2bc3da6d19f891f059a49628da9152f88e4d6d36f49cb33db3fee65c996147fb0ab979d841647b4ed47b23d6c53c3f82c", 0xfffffffffffffe72}], 0x4, 0x0, 0x317}}], 0x1, 0x40800) ioctl$sock_inet_SIOCGIFNETMASK(r7, 0x891b, &(0x7f0000000580)={'veth1_to_hsr\x00', {0x2, 0x4e24, @multicast2}}) [ 490.484302][T22544] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1777721599 > max in inode 17627 [ 490.501673][T22542] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1777721599 > max in inode 17628 06:40:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x2e4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x300}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x222f80, 0x0) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000240)) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000200)={0x0, &(0x7f0000000280)}, 0x7) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000100)=[{0xff7f, 0x4, 0x20, 0x6}]}, 0x10) 06:40:00 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ftruncate(r4, 0x208200) write$UHID_CREATE(r3, &(0x7f0000000400), 0x120) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xe0b7}) r5 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r6, &(0x7f0000000280), 0x1033b) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000040)) fdatasync(r6) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000200)={0x0, r6}) fcntl$setstatus(r0, 0x4, 0x44800) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 06:40:00 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket(0x200000000000011, 0x3, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r8, &(0x7f0000000240)={0x11, 0x0, r10}, 0x14) getsockname$packet(r8, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) r11 = socket(0x200000000000011, 0x3, 0x0) r12 = socket(0x200000000000011, 0x3, 0x0) r13 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r12, &(0x7f0000000240)={0x11, 0x0, r14}, 0x14) getsockname$packet(r12, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r11, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r15, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) sendmmsg$sock(r11, &(0x7f0000000840)=[{{0x0, 0x3e8, &(0x7f00000007c0)=[{&(0x7f00000005c0)="fc7650842f55e19a270ea5031f62aa10b5b382ce502b753f1f47f86fb749db8604f7048a1765423db86fa1cccc657a0477b6b4f2c6f1f3a32f640cd1ba7fa1a0", 0x263}, {&(0x7f0000000600)="c06bb004b2c100a4618fb49e7a78246d04e4d749c5e5932fc23cf13722f8bcff91e151aa043f9f30d61918661cab8d6c7b3b00c2eb897ff9e8b60b8fc7dd844d7e4d0dc5ab1356346826ad4555a0643814875b01a9b2683edf64a754497f158dc87e65f7b115f1eff5e16c48987b3def3be0e9ebc57ba06865056c535699dc2e4db32843e6b8751230734b73e7e2fddac7aea4c772324bc2242b", 0x9a}, {&(0x7f00000006c0)="cf5b96003c92c57f504ab8105a79e8dc5f58d9b62993ab36b150b45a0cdcb916", 0x20}, {&(0x7f0000000700)="bef0ae58042bbdb3df1586b3a4e79b9828c5532bf13af63d6a1acbfd0195e5b7a61ec7df0d6c27bc6a5f30f697eeb4d51f41471c00f6cc68bb5c894bc0423111241063af614d8f40b1093f33d0b6ba838b6e9e9de5dbf086e8f1933bf8c986638963d421cf8bcce8b94c47c91b68503d84af154f693fc54eb044332ca81eccc74d250a7b2b5e8266a2bc3da6d19f891f059a49628da9152f88e4d6d36f49cb33db3fee65c996147fb0ab979d841647b4ed47b23d6c53c3f82c", 0xfffffffffffffe72}], 0x4, 0x0, 0x317}}], 0x1, 0x40800) ioctl$sock_inet_SIOCGIFNETMASK(r7, 0x891b, &(0x7f0000000580)={'veth1_to_hsr\x00', {0x2, 0x4e24, @multicast2}}) getsockname$packet(r4, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) ioctl$SIOCX25SCALLUSERDATA(r4, 0x89e5, &(0x7f0000000480)={0x22, "6355491889a1e750645f79c667004ca24aa570374855df02a5c6f7b84addf291da8684cc8a46c9c543ecf8bf437b73000058dfaefc857c66941e5f79cc13810e9c131b94c4e4f38ca0ef2754a11b8a56d4bfd6e2b04315d063f9588abb454911af030b9e6ea2016b66ecdc9f95ee84f63e7ebac117a9836382697c65730c38f4"}) 06:40:00 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r7, &(0x7f0000000240)={0x11, 0x0, r9}, 0x14) getsockname$packet(r7, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) r10 = socket(0x200000000000011, 0x3, 0x0) r11 = socket(0x200000000000011, 0x3, 0x0) r12 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r11, &(0x7f0000000240)={0x11, 0x0, r13}, 0x14) getsockname$packet(r11, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r10, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r14, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) sendmmsg$sock(r10, &(0x7f0000000840)=[{{0x0, 0x3e8, &(0x7f00000007c0)=[{&(0x7f00000005c0)="fc7650842f55e19a270ea5031f62aa10b5b382ce502b753f1f47f86fb749db8604f7048a1765423db86fa1cccc657a0477b6b4f2c6f1f3a32f640cd1ba7fa1a0", 0x263}, {&(0x7f0000000600)="c06bb004b2c100a4618fb49e7a78246d04e4d749c5e5932fc23cf13722f8bcff91e151aa043f9f30d61918661cab8d6c7b3b00c2eb897ff9e8b60b8fc7dd844d7e4d0dc5ab1356346826ad4555a0643814875b01a9b2683edf64a754497f158dc87e65f7b115f1eff5e16c48987b3def3be0e9ebc57ba06865056c535699dc2e4db32843e6b8751230734b73e7e2fddac7aea4c772324bc2242b", 0x9a}, {&(0x7f00000006c0)="cf5b96003c92c57f504ab8105a79e8dc5f58d9b62993ab36b150b45a0cdcb916", 0x20}, {&(0x7f0000000700)="bef0ae58042bbdb3df1586b3a4e79b9828c5532bf13af63d6a1acbfd0195e5b7a61ec7df0d6c27bc6a5f30f697eeb4d51f41471c00f6cc68bb5c894bc0423111241063af614d8f40b1093f33d0b6ba838b6e9e9de5dbf086e8f1933bf8c986638963d421cf8bcce8b94c47c91b68503d84af154f693fc54eb044332ca81eccc74d250a7b2b5e8266a2bc3da6d19f891f059a49628da9152f88e4d6d36f49cb33db3fee65c996147fb0ab979d841647b4ed47b23d6c53c3f82c", 0xfffffffffffffe72}], 0x4, 0x0, 0x317}}], 0x1, 0x40800) 06:40:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x500}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 490.974988][T22574] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1777721599 > max in inode 17631 06:40:00 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ftruncate(r4, 0x208200) write$UHID_CREATE(r3, &(0x7f0000000400), 0x120) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xe0b7}) r5 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r6, &(0x7f0000000280), 0x1033b) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000040)) fdatasync(r6) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000200)={0x0, r6}) fcntl$setstatus(r0, 0x4, 0x44800) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) [ 490.976579][T22576] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1777721599 > max in inode 17632 06:40:00 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket(0x200000000000011, 0x3, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r8, &(0x7f0000000240)={0x11, 0x0, r10}, 0x14) getsockname$packet(r8, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) r11 = socket(0x200000000000011, 0x3, 0x0) r12 = socket(0x200000000000011, 0x3, 0x0) r13 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r12, &(0x7f0000000240)={0x11, 0x0, r14}, 0x14) getsockname$packet(r12, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r11, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r15, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) sendmmsg$sock(r11, &(0x7f0000000840)=[{{0x0, 0x3e8, &(0x7f00000007c0)=[{&(0x7f00000005c0)="fc7650842f55e19a270ea5031f62aa10b5b382ce502b753f1f47f86fb749db8604f7048a1765423db86fa1cccc657a0477b6b4f2c6f1f3a32f640cd1ba7fa1a0", 0x263}, {&(0x7f0000000600)="c06bb004b2c100a4618fb49e7a78246d04e4d749c5e5932fc23cf13722f8bcff91e151aa043f9f30d61918661cab8d6c7b3b00c2eb897ff9e8b60b8fc7dd844d7e4d0dc5ab1356346826ad4555a0643814875b01a9b2683edf64a754497f158dc87e65f7b115f1eff5e16c48987b3def3be0e9ebc57ba06865056c535699dc2e4db32843e6b8751230734b73e7e2fddac7aea4c772324bc2242b", 0x9a}, {&(0x7f00000006c0)="cf5b96003c92c57f504ab8105a79e8dc5f58d9b62993ab36b150b45a0cdcb916", 0x20}, {&(0x7f0000000700)="bef0ae58042bbdb3df1586b3a4e79b9828c5532bf13af63d6a1acbfd0195e5b7a61ec7df0d6c27bc6a5f30f697eeb4d51f41471c00f6cc68bb5c894bc0423111241063af614d8f40b1093f33d0b6ba838b6e9e9de5dbf086e8f1933bf8c986638963d421cf8bcce8b94c47c91b68503d84af154f693fc54eb044332ca81eccc74d250a7b2b5e8266a2bc3da6d19f891f059a49628da9152f88e4d6d36f49cb33db3fee65c996147fb0ab979d841647b4ed47b23d6c53c3f82c", 0xfffffffffffffe72}], 0x4, 0x0, 0x317}}], 0x1, 0x40800) ioctl$sock_inet_SIOCGIFNETMASK(r7, 0x891b, &(0x7f0000000580)={'veth1_to_hsr\x00', {0x2, 0x4e24, @multicast2}}) getsockname$packet(r4, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) 06:40:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x600}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 491.174368][T22589] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1777721599 > max in inode 17631 06:40:01 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r7, &(0x7f0000000240)={0x11, 0x0, r9}, 0x14) getsockname$packet(r7, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) r10 = socket(0x200000000000011, 0x3, 0x0) r11 = socket(0x200000000000011, 0x3, 0x0) r12 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r11, &(0x7f0000000240)={0x11, 0x0, r13}, 0x14) getsockname$packet(r11, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r10, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r14, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) 06:40:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x700}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:01 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$fb(r0, &(0x7f00000000c0)='m', 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x4000, 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r2, 0xc0305615, &(0x7f0000000140)={0x0, {0x2, 0x8}}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") write$midi(r3, &(0x7f0000000100)="f53f47ced3b5b595f71c0664b5657cff3fd1deb1bc4d97d163036f035a3f4169f211c039ee6b8411c5fd881e11c0b2f53f3e820967d037fff327b3f240", 0x3d) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r4, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) ioctl(r4, 0x1, &(0x7f0000000180)="ffe0f5") ioctl$MON_IOCH_MFLUSH(r1, 0x9208, 0x4) 06:40:01 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket(0x200000000000011, 0x3, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r8, &(0x7f0000000240)={0x11, 0x0, r10}, 0x14) getsockname$packet(r8, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) r11 = socket(0x200000000000011, 0x3, 0x0) r12 = socket(0x200000000000011, 0x3, 0x0) r13 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r12, &(0x7f0000000240)={0x11, 0x0, r14}, 0x14) getsockname$packet(r12, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r11, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r15, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) sendmmsg$sock(r11, &(0x7f0000000840)=[{{0x0, 0x3e8, &(0x7f00000007c0)=[{&(0x7f00000005c0)="fc7650842f55e19a270ea5031f62aa10b5b382ce502b753f1f47f86fb749db8604f7048a1765423db86fa1cccc657a0477b6b4f2c6f1f3a32f640cd1ba7fa1a0", 0x263}, {&(0x7f0000000600)="c06bb004b2c100a4618fb49e7a78246d04e4d749c5e5932fc23cf13722f8bcff91e151aa043f9f30d61918661cab8d6c7b3b00c2eb897ff9e8b60b8fc7dd844d7e4d0dc5ab1356346826ad4555a0643814875b01a9b2683edf64a754497f158dc87e65f7b115f1eff5e16c48987b3def3be0e9ebc57ba06865056c535699dc2e4db32843e6b8751230734b73e7e2fddac7aea4c772324bc2242b", 0x9a}, {&(0x7f00000006c0)="cf5b96003c92c57f504ab8105a79e8dc5f58d9b62993ab36b150b45a0cdcb916", 0x20}, {&(0x7f0000000700)="bef0ae58042bbdb3df1586b3a4e79b9828c5532bf13af63d6a1acbfd0195e5b7a61ec7df0d6c27bc6a5f30f697eeb4d51f41471c00f6cc68bb5c894bc0423111241063af614d8f40b1093f33d0b6ba838b6e9e9de5dbf086e8f1933bf8c986638963d421cf8bcce8b94c47c91b68503d84af154f693fc54eb044332ca81eccc74d250a7b2b5e8266a2bc3da6d19f891f059a49628da9152f88e4d6d36f49cb33db3fee65c996147fb0ab979d841647b4ed47b23d6c53c3f82c", 0xfffffffffffffe72}], 0x4, 0x0, 0x317}}], 0x1, 0x40800) ioctl$sock_inet_SIOCGIFNETMASK(r7, 0x891b, &(0x7f0000000580)={'veth1_to_hsr\x00', {0x2, 0x4e24, @multicast2}}) [ 491.360013][T22598] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1777721599 > max in inode 17623 06:40:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000000)="eb3c906d6b66732e666174000204010002000270fff8", 0x2eae}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000040)=0x8) write$9p(r1, &(0x7f0000001400)="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", 0x1c8) sendfile(r1, r2, 0x0, 0x10000) 06:40:01 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r7, &(0x7f0000000240)={0x11, 0x0, r9}, 0x14) getsockname$packet(r7, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) socket(0x200000000000011, 0x3, 0x0) r10 = socket(0x200000000000011, 0x3, 0x0) r11 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r10, &(0x7f0000000240)={0x11, 0x0, r12}, 0x14) getsockname$packet(r10, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) 06:40:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x900}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 491.544394][ T39] audit: type=1804 audit(1579070401.334:86): pid=22613 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir544772161/syzkaller.I13vwx/622/file0/file0" dev="loop0" ino=69 res=1 06:40:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xa00}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 491.648343][T22613] FAT-fs (loop0): error, fat_free: invalid cluster chain (i_pos 17) 06:40:01 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r7, &(0x7f0000000240)={0x11, 0x0, r9}, 0x14) getsockname$packet(r7, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) socket(0x200000000000011, 0x3, 0x0) r10 = socket(0x200000000000011, 0x3, 0x0) r11 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r10, &(0x7f0000000240)={0x11, 0x0, r12}, 0x14) 06:40:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xb00}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 491.670067][T22613] FAT-fs (loop0): Filesystem has been set read-only 06:40:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000000)="eb3c906d6b66732e666174000204010002000270fff8", 0x2eae}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000040)=0x8) write$9p(r1, &(0x7f0000001400)="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", 0x1c8) sendfile(r1, r2, 0x0, 0x10000) 06:40:01 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r7, &(0x7f0000000240)={0x11, 0x0, r9}, 0x14) getsockname$packet(r7, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) r10 = socket(0x200000000000011, 0x3, 0x0) r11 = socket(0x200000000000011, 0x3, 0x0) r12 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r11, &(0x7f0000000240)={0x11, 0x0, r13}, 0x14) getsockname$packet(r11, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r10, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r14, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) sendmmsg$sock(r10, &(0x7f0000000840)=[{{0x0, 0x3e8, &(0x7f00000007c0)=[{&(0x7f00000005c0)="fc7650842f55e19a270ea5031f62aa10b5b382ce502b753f1f47f86fb749db8604f7048a1765423db86fa1cccc657a0477b6b4f2c6f1f3a32f640cd1ba7fa1a0", 0x263}, {&(0x7f0000000600)="c06bb004b2c100a4618fb49e7a78246d04e4d749c5e5932fc23cf13722f8bcff91e151aa043f9f30d61918661cab8d6c7b3b00c2eb897ff9e8b60b8fc7dd844d7e4d0dc5ab1356346826ad4555a0643814875b01a9b2683edf64a754497f158dc87e65f7b115f1eff5e16c48987b3def3be0e9ebc57ba06865056c535699dc2e4db32843e6b8751230734b73e7e2fddac7aea4c772324bc2242b", 0x9a}, {&(0x7f00000006c0)="cf5b96003c92c57f504ab8105a79e8dc5f58d9b62993ab36b150b45a0cdcb916", 0x20}, {&(0x7f0000000700)="bef0ae58042bbdb3df1586b3a4e79b9828c5532bf13af63d6a1acbfd0195e5b7a61ec7df0d6c27bc6a5f30f697eeb4d51f41471c00f6cc68bb5c894bc0423111241063af614d8f40b1093f33d0b6ba838b6e9e9de5dbf086e8f1933bf8c986638963d421cf8bcce8b94c47c91b68503d84af154f693fc54eb044332ca81eccc74d250a7b2b5e8266a2bc3da6d19f891f059a49628da9152f88e4d6d36f49cb33db3fee65c996147fb0ab979d841647b4ed47b23d6c53c3f82c", 0xfffffffffffffe72}], 0x4, 0x0, 0x317}}], 0x1, 0x40800) 06:40:01 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r7, &(0x7f0000000240)={0x11, 0x0, r9}, 0x14) getsockname$packet(r7, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) socket(0x200000000000011, 0x3, 0x0) socket(0x200000000000011, 0x3, 0x0) r10 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) 06:40:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xc00}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 491.972324][ T39] audit: type=1804 audit(1579070401.754:87): pid=22645 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir544772161/syzkaller.I13vwx/623/file0/file0" dev="sda1" ino=17628 res=1 06:40:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000000)={0x669c, 0x9, 0x4, 0x20000, 0x10000, {}, {0x7, 0x1, 0x9, 0x95, 0x9, 0x3, "8097d856"}, 0x65, 0x1, @offset, 0x2, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000100)) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x14, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_ENCAP_LIMIT={0x8}]]}}}]}, 0x44}}, 0x0) 06:40:01 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r7, &(0x7f0000000240)={0x11, 0x0, r9}, 0x14) getsockname$packet(r7, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) socket(0x200000000000011, 0x3, 0x0) socket(0x200000000000011, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 06:40:01 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r7, &(0x7f0000000240)={0x11, 0x0, r9}, 0x14) getsockname$packet(r7, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) r10 = socket(0x200000000000011, 0x3, 0x0) r11 = socket(0x200000000000011, 0x3, 0x0) r12 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r11, &(0x7f0000000240)={0x11, 0x0, r13}, 0x14) getsockname$packet(r11, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r10, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r14, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) 06:40:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xe00}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x10db}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 492.341347][T22676] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 06:40:02 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r7, &(0x7f0000000240)={0x11, 0x0, r9}, 0x14) getsockname$packet(r7, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) socket(0x200000000000011, 0x3, 0x0) socket(0x200000000000011, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 06:40:02 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r7, &(0x7f0000000240)={0x11, 0x0, r9}, 0x14) getsockname$packet(r7, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) socket(0x200000000000011, 0x3, 0x0) r10 = socket(0x200000000000011, 0x3, 0x0) r11 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r10, &(0x7f0000000240)={0x11, 0x0, r12}, 0x14) getsockname$packet(r10, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) [ 492.565788][T22693] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 06:40:02 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r7, &(0x7f0000000240)={0x11, 0x0, r9}, 0x14) getsockname$packet(r7, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) socket(0x200000000000011, 0x3, 0x0) socket(0x200000000000011, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 06:40:02 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r7, &(0x7f0000000240)={0x11, 0x0, r9}, 0x14) getsockname$packet(r7, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) socket(0x200000000000011, 0x3, 0x0) socket(0x200000000000011, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 06:40:02 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r7, &(0x7f0000000240)={0x11, 0x0, r9}, 0x14) getsockname$packet(r7, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) socket(0x200000000000011, 0x3, 0x0) r10 = socket(0x200000000000011, 0x3, 0x0) r11 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r10, &(0x7f0000000240)={0x11, 0x0, r12}, 0x14) 06:40:02 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r7, &(0x7f0000000240)={0x11, 0x0, r9}, 0x14) getsockname$packet(r7, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) socket(0x200000000000011, 0x3, 0x0) socket(0x200000000000011, 0x3, 0x0) 06:40:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x1100}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:02 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r7, &(0x7f0000000240)={0x11, 0x0, r9}, 0x14) getsockname$packet(r7, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) socket(0x200000000000011, 0x3, 0x0) r10 = socket(0x200000000000011, 0x3, 0x0) r11 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r10, &(0x7f0000000240)={0x11, 0x0, r12}, 0x14) 06:40:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x1200}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:02 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r7, &(0x7f0000000240)={0x11, 0x0, r9}, 0x14) getsockname$packet(r7, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) socket(0x200000000000011, 0x3, 0x0) 06:40:02 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r7, &(0x7f0000000240)={0x11, 0x0, r9}, 0x14) getsockname$packet(r7, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) socket(0x200000000000011, 0x3, 0x0) socket(0x200000000000011, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 06:40:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x1300}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:03 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r7, &(0x7f0000000240)={0x11, 0x0, r9}, 0x14) getsockname$packet(r7, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) socket(0x200000000000011, 0x3, 0x0) socket(0x200000000000011, 0x3, 0x0) r10 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) 06:40:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x1400}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:03 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r7, &(0x7f0000000240)={0x11, 0x0, r9}, 0x14) getsockname$packet(r7, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) 06:40:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x1c00}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:03 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r7, &(0x7f0000000240)={0x11, 0x0, r9}, 0x14) getsockname$packet(r7, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) r10 = socket(0x200000000000011, 0x3, 0x0) r11 = socket(0x200000000000011, 0x3, 0x0) r12 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r11, &(0x7f0000000240)={0x11, 0x0, r13}, 0x14) getsockname$packet(r11, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r10, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r14, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) 06:40:03 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r7, &(0x7f0000000240)={0x11, 0x0, r9}, 0x14) getsockname$packet(r7, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) socket(0x200000000000011, 0x3, 0x0) socket(0x200000000000011, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 06:40:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x1f00}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:03 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r7, &(0x7f0000000240)={0x11, 0x0, r9}, 0x14) 06:40:03 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r7, &(0x7f0000000240)={0x11, 0x0, r9}, 0x14) getsockname$packet(r7, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) socket(0x200000000000011, 0x3, 0x0) socket(0x200000000000011, 0x3, 0x0) 06:40:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x2000}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:03 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r7, &(0x7f0000000240)={0x11, 0x0, r9}, 0x14) getsockname$packet(r7, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) socket(0x200000000000011, 0x3, 0x0) socket(0x200000000000011, 0x3, 0x0) r10 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) 06:40:03 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) socket(0x200000000000011, 0x3, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) 06:40:03 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r7, &(0x7f0000000240)={0x11, 0x0, r9}, 0x14) getsockname$packet(r7, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) socket(0x200000000000011, 0x3, 0x0) 06:40:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x3f00}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:04 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) socket(0x200000000000011, 0x3, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) 06:40:04 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r7, &(0x7f0000000240)={0x11, 0x0, r9}, 0x14) getsockname$packet(r7, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) socket(0x200000000000011, 0x3, 0x0) 06:40:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x4800}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:04 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r7, &(0x7f0000000240)={0x11, 0x0, r9}, 0x14) getsockname$packet(r7, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) r10 = socket(0x200000000000011, 0x3, 0x0) r11 = socket(0x200000000000011, 0x3, 0x0) r12 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r11, &(0x7f0000000240)={0x11, 0x0, r13}, 0x14) getsockname$packet(r11, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r10, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r14, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) [ 494.560361][T22828] EXT4-fs warning: 25 callbacks suppressed [ 494.560412][T22828] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1777721599 > max in inode 17657 [ 494.562294][T22830] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1777721599 > max in inode 17656 06:40:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x4a00}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 494.602366][T22833] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1777721599 > max in inode 17658 06:40:04 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) socket(0x200000000000011, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 06:40:04 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r7, &(0x7f0000000240)={0x11, 0x0, r9}, 0x14) getsockname$packet(r7, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) 06:40:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x4c00}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:04 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r7, &(0x7f0000000240)={0x11, 0x0, r9}, 0x14) getsockname$packet(r7, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) socket(0x200000000000011, 0x3, 0x0) socket(0x200000000000011, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 06:40:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x5865}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 495.072152][T22856] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1777721599 > max in inode 17654 [ 495.094189][T22854] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1777721599 > max in inode 17657 [ 495.137243][T22864] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1777721599 > max in inode 17658 06:40:04 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) socket(0x200000000000011, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 06:40:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x6000}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 495.284605][T22876] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1777721599 > max in inode 17667 06:40:05 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r7, &(0x7f0000000240)={0x11, 0x0, r9}, 0x14) 06:40:05 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) socket(0x200000000000011, 0x3, 0x0) 06:40:05 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r7, &(0x7f0000000240)={0x11, 0x0, r9}, 0x14) getsockname$packet(r7, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) r10 = socket(0x200000000000011, 0x3, 0x0) r11 = socket(0x200000000000011, 0x3, 0x0) r12 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r11, &(0x7f0000000240)={0x11, 0x0, r13}, 0x14) getsockname$packet(r11, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r10, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r14, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) sendmmsg$sock(r10, &(0x7f0000000840)=[{{0x0, 0x3e8, &(0x7f00000007c0)=[{&(0x7f00000005c0)="fc7650842f55e19a270ea5031f62aa10b5b382ce502b753f1f47f86fb749db8604f7048a1765423db86fa1cccc657a0477b6b4f2c6f1f3a32f640cd1ba7fa1a0", 0x263}, {&(0x7f0000000600)="c06bb004b2c100a4618fb49e7a78246d04e4d749c5e5932fc23cf13722f8bcff91e151aa043f9f30d61918661cab8d6c7b3b00c2eb897ff9e8b60b8fc7dd844d7e4d0dc5ab1356346826ad4555a0643814875b01a9b2683edf64a754497f158dc87e65f7b115f1eff5e16c48987b3def3be0e9ebc57ba06865056c535699dc2e4db32843e6b8751230734b73e7e2fddac7aea4c772324bc2242b", 0x9a}, {&(0x7f00000006c0)="cf5b96003c92c57f504ab8105a79e8dc5f58d9b62993ab36b150b45a0cdcb916", 0x20}, {&(0x7f0000000700)="bef0ae58042bbdb3df1586b3a4e79b9828c5532bf13af63d6a1acbfd0195e5b7a61ec7df0d6c27bc6a5f30f697eeb4d51f41471c00f6cc68bb5c894bc0423111241063af614d8f40b1093f33d0b6ba838b6e9e9de5dbf086e8f1933bf8c986638963d421cf8bcce8b94c47c91b68503d84af154f693fc54eb044332ca81eccc74d250a7b2b5e8266a2bc3da6d19f891f059a49628da9152f88e4d6d36f49cb33db3fee65c996147fb0ab979d841647b4ed47b23d6c53c3f82c", 0xfffffffffffffe72}], 0x4, 0x0, 0x317}}], 0x1, 0x40800) 06:40:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x6558}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 495.605856][T22886] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1777721599 > max in inode 17635 [ 495.712147][T22895] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1777721599 > max in inode 17669 [ 495.732061][T22896] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1777721599 > max in inode 17667 06:40:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x6800}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:05 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) 06:40:05 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r7, &(0x7f0000000240)={0x11, 0x0, r9}, 0x14) 06:40:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="390000001000090468fe07f02a0000000100ff0722000000450001070300001419001a00120002000d00010020002500"/57, 0x39}], 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) ioctl$CDROMSTART(r1, 0x5308) 06:40:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x6c00}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:05 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) socket(0x200000000000011, 0x3, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) 06:40:06 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) 06:40:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x7400}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:06 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) socket(0x200000000000011, 0x3, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) 06:40:06 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket(0x200000000000011, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) 06:40:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x7a00}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:06 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket(0x200000000000011, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 06:40:06 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) socket(0x200000000000011, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 06:40:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x8100}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:06 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket(0x200000000000011, 0x3, 0x0) 06:40:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xc700}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:07 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket(0x200000000000011, 0x3, 0x0) 06:40:07 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) socket(0x200000000000011, 0x3, 0x0) 06:40:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xdb10}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:07 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket(0x200000000000011, 0x3, 0x0) 06:40:07 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) 06:40:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xe402}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:07 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 06:40:07 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) 06:40:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xf000}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:07 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) 06:40:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xfeff}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:08 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:08 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket(0x200000000000011, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) 06:40:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xff0f}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:08 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000300)={'mangle\x00'}, &(0x7f0000000380)=0x54) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f0000000180)={0x0, 0xa, 0x4, 0x80000, 0xf51, {0x0, 0x2710}, {0x3, 0x0, 0xb3, 0x4, 0x8, 0x7, "e6323523"}, 0x8, 0xaf2391dfddf61d82, @fd, 0x401, 0x0, r1}) sendmsg$nl_route(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100202}, 0xc, &(0x7f0000000280)={&(0x7f0000000740)=@getlink={0x1d8, 0x12, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x200, 0x410a0}, [@IFLA_LINKMODE={0x5, 0x11, 0x20}, @IFLA_EVENT={0x8, 0x2c, 0x80000001}, @IFLA_VFINFO_LIST={0x11c, 0x16, [{0x58, 0x1, [@IFLA_VF_VLAN={0x10, 0x2, {0x9, 0xb65, 0x3f}}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x8, 0xc0}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x0, 0x100000000}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x1, 0x6}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x400, 0x7f}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0x3f}}]}, {0x1c, 0x1, [@IFLA_VF_VLAN_LIST={0x4}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0xfffffff6}}]}, {0x28, 0x1, [@IFLA_VF_SPOOFCHK={0xc, 0x4, {0x48, 0x8}}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x35, 0x80000001}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x1000, 0xa1f3}}]}, {0x38, 0x1, [@IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0xfff}}, @IFLA_VF_MAC={0x28, 0x1, {0x3, @dev={[], 0xa}}}]}, {0x44, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x9, 0x330}}, @IFLA_VF_TRUST={0xc, 0x9, {0x6, 0x4}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x7fff, 0x10000}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6}}]}]}, @IFLA_ALT_IFNAME={0x14, 0x35, 'ip_vti0\x00'}, @IFLA_PHYS_SWITCH_ID={0x9, 0x24, "28af948ac3"}, @IFLA_PHYS_SWITCH_ID={0x18, 0x24, "c6ac87ac34d7c4e10aed61a400c9d6313dc68a96"}, @IFLA_LINKINFO={0x28, 0x12, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x18, 0x2, @val={0x14, 0x1, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x80}}}}}}, @IFLA_ALT_IFNAME={0x14, 0x35, 'vlan1\x00'}, @IFLA_PHYS_SWITCH_ID={0x17, 0x24, "2721d6b106d36f85715ffb8307e207d6b63982"}]}, 0x1d8}, 0x1, 0x0, 0x0, 0x14000}, 0x805) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000140)=ANY=[@ANYRESHEX], 0x1}}, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000080)) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_DIRENT(r6, &(0x7f00000004c0)={0x38, 0x8be717668941a8f8, 0x7, [{0x4, 0x6, 0xc, 0x7ff, '^,eth1wlan1('}]}, 0x38) ioctl(r5, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$VHOST_GET_VRING_ENDIAN(r5, 0x4008af14, &(0x7f0000000440)={0x2, 0x4}) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000080)) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r8, 0x40086602, &(0x7f0000000080)) ioctl(r8, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r5, 0xc0145401, &(0x7f0000000480)={0x0, 0x3, 0x1, 0x0, 0x7fff}) ioctl$SNDRV_TIMER_IOCTL_STOP(r8, 0x54a1) ioctl(r7, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$DRM_IOCTL_RES_CTX(r7, 0xc0106426, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x0}]}) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000080)={r9, 0x1}) 06:40:08 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket(0x200000000000011, 0x3, 0x0) 06:40:08 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket(0x200000000000011, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 06:40:08 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xfffe}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:08 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000240)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) socket(0x200000000000011, 0x3, 0x0) socket(0x200000000000011, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 06:40:08 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket(0x200000000000011, 0x3, 0x0) 06:40:08 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) ioctl(0xffffffffffffffff, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0xffff}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:08 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) ioctl(0xffffffffffffffff, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:08 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 06:40:08 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:09 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 06:40:09 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:09 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) ioctl(0xffffffffffffffff, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:09 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x80002002}) 06:40:09 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x10, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000000)=0x6, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000340), &(0x7f0000000400)='\a'}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000c88000)={r0, &(0x7f0000847f95), &(0x7f000089b000)}, 0x18) 06:40:09 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:09 executing program 0: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000240)={0x0, 0x4002ff, 0x5}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) ioctl(r0, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$CDROMREADALL(r0, 0x5318, &(0x7f0000000280)) prctl$PR_CAP_AMBIENT(0x2f, 0x2, 0x0) [ 499.573700][T23120] EXT4-fs warning: 28 callbacks suppressed [ 499.574453][T23120] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1777721599 > max in inode 17684 [ 499.588547][T23121] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1777721599 > max in inode 17685 06:40:09 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") [ 499.657922][T23137] capability: warning: `syz-executor.0' uses 32-bit capabilities (legacy support in use) 06:40:09 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:09 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 499.683686][T23140] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1777721599 > max in inode 17687 06:40:09 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:09 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) ioctl(r0, 0x1, &(0x7f0000000100)="ffe0f5") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) ioctl$I2C_TIMEOUT(r0, 0x702, 0x8) wait4(0x0, 0x0, 0x80000002, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x10, r1) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x400000, 0x0) ioctl$FBIOPUTCMAP(r2, 0x4605, &(0x7f0000000280)={0x9, 0x1, &(0x7f0000000180)=[0xfff9], &(0x7f00000001c0)=[0x1, 0x9, 0xbf75, 0x1, 0x0, 0x1ff, 0x401], &(0x7f0000000200)=[0x4], &(0x7f0000000240)=[0x7199, 0x0, 0x3ff, 0x101, 0x8000, 0x1, 0x3, 0x7, 0x81]}) ptrace$getsig(0x2, r1, 0xffffffffff600003, &(0x7f0000000000)) 06:40:09 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 499.951723][T23161] QAT: Invalid ioctl 06:40:09 executing program 0: socket(0xa, 0x1, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r2}, 0x14) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r3, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r4 = dup3(0xffffffffffffffff, r3, 0x80000) ioctl$EVIOCGEFFECTS(r4, 0x80044584, &(0x7f0000000080)=""/200) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"/424]}, 0x220) socket$inet6(0xa, 0x0, 0x0) [ 499.958464][T23162] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1777721599 > max in inode 17688 06:40:09 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") [ 499.966071][T23159] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1777721599 > max in inode 17689 06:40:09 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:09 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:10 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:10 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 500.349870][T23187] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1777721599 > max in inode 16593 [ 500.356618][T23194] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1777721599 > max in inode 16609 [ 500.490648][T23195] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1777721599 > max in inode 16673 06:40:10 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) ioctl(r0, 0x1, &(0x7f0000000100)="ffe0f5") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r1, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r0, 0x40084146, &(0x7f0000000000)=0x3) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:10 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:10 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:10 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:10 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 500.807120][T23222] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1777721599 > max in inode 16817 06:40:10 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:10 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) ioctl(r0, 0x1, &(0x7f0000000100)="ffe0f5") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r1, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r0, 0x40084146, &(0x7f0000000000)=0x3) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") [ 500.812333][T23217] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1777721599 > max in inode 16801 06:40:10 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) ioctl(0xffffffffffffffff, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}}, 0x0) r1 = getpid() pidfd_open(r1, 0x0) r2 = gettid() r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r4, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000040)={r3, r4, 0x72a}) 06:40:10 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xb}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:10 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) ioctl(r0, 0x1, &(0x7f0000000100)="ffe0f5") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r1, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r0, 0x40084146, &(0x7f0000000000)=0x3) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:10 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)) fcntl$addseals(r0, 0x409, 0x4) 06:40:10 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) ioctl(0xffffffffffffffff, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:11 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:11 executing program 0: syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="636f6e3565faf89c8dccc5a62a95e2ee998fc575f7e6746578742c"]) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r0, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r1, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000040)='./file0\x00', 0x4, 0xaaaaaaaaaaaaacc, &(0x7f00000003c0)=[{&(0x7f0000000080)="2a3329e3593ec0da3b8c819515387fda44c7a5599408f3d4031385dd62d98b9493885abaea6fb30d7280ada0aafe19cad301e13d3b2d010c824203529b0085455d8d5a06d632034cb53152d3bb56465e72", 0xfffffe7c, 0x100}, {&(0x7f0000000200)="14023f5dcf23c4ab7b0cf0811e75245ca456daf220cf8480f9dcd4c37772cec9bb755c7ec442db3ac4aea249fdb2b563cae488ad013cbfcc4bed170204853d900e1c6c5c90d37d0f3e4226b8aa3745f3a543893194a9b2247064ec86f0d668dfb3772a4864840006c9831fdb5e80e89a0f4f8e1d913d2660ae1185521d0f9087884a13bbcbfd0d5d8deb8e3b9a630652084d4e8995ce567a09b218b2b5a93ef78036b09d563c638cddcfd8a1", 0xac, 0x800}, {&(0x7f00000002c0)="19737845a41726ecc91b9070b4fdc5c4e69d68ee8f5e896a91bbab3506d51919998cf4e0e30f84b4db33b0c4103b7400659df830352a1461cf04b0c773f03ef1a91175d2bfa84432d5d152dd206a2f4212ed80be004f828d1ce0c8e48d635024a3be0aa190f27d642fcc6e8b016a8c8f7a6b46ff5ebdd9c91d8945b8d7ed9793eaf307b2427e1b6324306183536d23383c8493689dcf545c0b1e6f2ad58cea662b84c44cbc8cc7a233c85c49bca8b573204b20eaa478e10fd3b5cd85c406e98669142232fef6273147", 0xc9, 0x7f}, {&(0x7f00000006c0)="429460e7455f1fde0a72ef7f1519ad98f111ff738333f9de135b04a6eeb411718aac09d59f8e07219024f048e1f9f1d20aacea48aaac4ad24834bfe88f10689f6febc56e6ff1e035a4a6256da228d42e8e5cf9ff41fc3a0649ee1fd7eff629f3b57193d5e9d77d10a55a0eed8d5c1da93d9d7bc93a187273f2fa7ad80d8741fca88f1bdc3a592cfd681f6e6153e7f258e90a86d993da53084356903066a54767eee4b72b18c48bffa68bd6af7a0f35008357637b4d843b8cbee54c608d9754d873ddf0774e", 0xffffffffffffff6d, 0x7ff}, {&(0x7f0000000140)="a9b381abbabd87ff077dca5ab733716a33590e2ad7ffd03c3dab3cc7906cb36e6dc1900124523667ef53de9d7142e243ca2c62a3d8d0d547f3d9e7ab1905", 0x3f, 0xfff}], 0x100000, &(0x7f00000007c0)=ANY=[@ANYBLOB="757365725f78617474722c6f626a5f747970653d2c736d61636b66737472616e736d7574653d73746166665f752c6f626a5f747970653d636f6e746578742c726f6f74636f6e746578743d73746166665f752c00c91d80773252b337adf5ed3c90f98c69568c2c8b75a0adf472e03d45b28984c80dde9cf02fc54e98056dc30dba00790108a709f0131b3b2543bc16bfe3c6c2039322df7052ea323bffd108e5b81dcfa8efc72238dc73d4113c656c7a608088", @ANYPTR=&(0x7f0000000480)=ANY=[@ANYRESOCT, @ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES64=r0, @ANYBLOB="2ad116f7a2fb746b61f91e2539", @ANYRESOCT=r1], @ANYRES32, @ANYRES32], @ANYBLOB="295e0cefb4f24c0cb491529ac0650e6d777cfe4ff42f317385031415f90f9fde27a636741416cfe9"]) 06:40:11 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) fchdir(r0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:11 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) ioctl(0xffffffffffffffff, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:11 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 501.512921][T23267] FAT-fs (loop0): Unrecognized mount option "con5eúøœÌŦ*•âî™Åu÷ætext" or missing value 06:40:11 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") fchdir(r0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:11 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:11 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:11 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") fchdir(r0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") [ 502.219565][T23267] FAT-fs (loop0): Unrecognized mount option "con5eúøœÌŦ*•âî™Åu÷ætext" or missing value 06:40:12 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") fchdir(r0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:12 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$VIDIOC_S_EDID(r3, 0xc0285629, &(0x7f00000001c0)={0x0, 0xeddb, 0x1, [], &(0x7f0000000100)=0x22}) close(r2) socket(0x10, 0x80002, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="240000001e0007041dfffd946f610500070000001f00000000000400060005", 0x1f}], 0x1}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfcfa) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r4, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f00000000c0)={{0x3, 0x0, @identifier="7d7189adf3eacdc848358f6e42c1cf07"}}) r5 = socket(0x200000000000011, 0x3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r5, &(0x7f0000000240)={0x11, 0x0, r7}, 0x14) getsockname$packet(r5, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) setsockopt$inet6_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000080)='bic\x00', 0x4) 06:40:12 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x11}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:12 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r1, 0x40084146, &(0x7f0000000000)=0x3) fchdir(r0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") [ 502.489486][T23321] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23321 comm=syz-executor.0 06:40:12 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) ioctl(r0, 0x1, &(0x7f0000000100)="ffe0f5") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r1, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r0, 0x40084146, &(0x7f0000000000)=0x3) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:12 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) fchdir(r0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") [ 502.627265][T23321] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23321 comm=syz-executor.0 [ 502.747964][T23321] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23321 comm=syz-executor.0 06:40:12 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x12}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 502.847790][T23321] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23321 comm=syz-executor.0 [ 502.950861][T23321] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23321 comm=syz-executor.0 [ 503.050909][T23321] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23321 comm=syz-executor.0 [ 503.165400][T23321] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23321 comm=syz-executor.0 06:40:13 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 503.271294][T23321] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23321 comm=syz-executor.0 [ 503.370996][T23321] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23321 comm=syz-executor.0 [ 503.464725][T23321] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23321 comm=syz-executor.0 06:40:13 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) ioctl(r0, 0x1, &(0x7f0000000100)="ffe0f5") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r1, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r0, 0x40084146, &(0x7f0000000000)=0x3) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:13 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fchdir(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:13 executing program 0: writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000100)="39000000130009006900000000000000ab008048050000000000000007000014190001001000000800005068000000000000ef38bf461e59d7", 0x39}], 0x1) r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in, 0x4e23, 0x200, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in=@broadcast}, 0x0, @in6=@rand_addr="39a6008ec0a5d69f00"}}, 0xe4) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) r1 = socket(0x10, 0x2, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x7, 0x0, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r4}, 0x14) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x4400, 0x0) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x75, &(0x7f0000000280)={r8}, &(0x7f00000002c0)=0x18) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f00000000c0)={'sit0\x00', 0x5783}) setsockopt$inet_sctp6_SCTP_RTOINFO(r5, 0x84, 0x0, &(0x7f0000000340)={r8, 0x10001, 0x4, 0x3}, 0x10) getsockname$packet(r2, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) fcntl$getflags(r3, 0xc10) getsockopt$PNPIPE_HANDLE(r2, 0x113, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000000), 0xa, &(0x7f0000000100)}], 0x34b27d6b3bc536b, 0x0) 06:40:13 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:13 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) ioctl(r0, 0x1, &(0x7f0000000100)="ffe0f5") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r1, 0x80044dfe, &(0x7f0000000800)) ioctl$SNDRV_PCM_IOCTL_REWIND(r0, 0x40084146, &(0x7f0000000000)=0x3) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:13 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") fchdir(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:13 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000800)) fchdir(r0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:13 executing program 0: writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000100)="39000000130009006900000000000000ab008048050000000000000007000014190001001000000800005068000000000000ef38bf461e59d7", 0x39}], 0x1) r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in, 0x4e23, 0x200, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in=@broadcast}, 0x0, @in6=@rand_addr="39a6008ec0a5d69f00"}}, 0xe4) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) r1 = socket(0x10, 0x2, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x7, 0x0, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r4}, 0x14) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x4400, 0x0) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x75, &(0x7f0000000280)={r8}, &(0x7f00000002c0)=0x18) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f00000000c0)={'sit0\x00', 0x5783}) setsockopt$inet_sctp6_SCTP_RTOINFO(r5, 0x84, 0x0, &(0x7f0000000340)={r8, 0x10001, 0x4, 0x3}, 0x10) getsockname$packet(r2, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) fcntl$getflags(r3, 0xc10) getsockopt$PNPIPE_HANDLE(r2, 0x113, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000000), 0xa, &(0x7f0000000100)}], 0x34b27d6b3bc536b, 0x0) 06:40:13 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1c}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:13 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") fchdir(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:13 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") fchdir(r0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:13 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x48}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400218) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) ioctl$VIDIOC_G_OUTPUT(r3, 0x8004562e, &(0x7f0000000080)) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="000000000000000024001200110001006272696467655f736c617665000000000c00"/44], 0x3}}, 0x4000) 06:40:14 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000000)) clone(0x49b96b00, 0x0, 0x0, 0x0, 0x0) 06:40:14 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) fchdir(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:14 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4a}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:14 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) fchdir(r0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") [ 504.378672][T23400] IPVS: ftp: loaded support on port[0] = 21 06:40:14 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4c}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:14 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fchdir(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:14 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:14 executing program 0: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='#\x00', 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x80, 0x0) ioctl$TIOCSBRK(r2, 0x5427) write(r1, &(0x7f0000000380)="92", 0x1) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r3, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f4a8d09", 0x6}], 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000000004, 0x8010, r3, 0x67a39000) ioctl$RNDADDENTROPY(r0, 0x5452, &(0x7f0000000000)) 06:40:14 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x60}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 504.737457][T23422] EXT4-fs warning: 22 callbacks suppressed [ 504.737469][T23422] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1777721599 > max in inode 16657 [ 504.897601][ T39] audit: type=1400 audit(1579070414.684:88): avc: denied { map } for pid=23424 comm="syz-executor.0" path="/dev/tty20" dev="devtmpfs" ino=3088 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:tty_device_t:s0 tclass=chr_file permissive=1 06:40:14 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fchdir(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:14 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000280)=ANY=[@ANYRES64=0x0], 0x8) mount(&(0x7f0000000000)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='exofs\x00', 0x0, &(0x7f0000000100)='\x00') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4000005, 0x10, r1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000080)) [ 505.052175][ T9578] tipc: TX() has been purged, node left! 06:40:14 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x68}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:14 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:14 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="621edf"], 0x3) perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x801}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 505.157633][T23447] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1777721599 > max in inode 17185 06:40:15 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fchdir(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:15 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6c}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 505.394368][T23461] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1777721599 > max in inode 17073 06:40:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x74}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:15 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r0, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:15 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") fchdir(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x7a}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:15 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r0, 0x1, &(0x7f0000000100)="ffe0f5") [ 505.714477][T23485] EXT4-fs warning (device sda1): ext4_block_to_path:105: block 1777721599 > max in inode 17489 06:40:15 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) fchdir(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:15 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r0, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:15 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:15 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:15 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xf0}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:15 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:15 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:16 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:16 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) ioctl(r0, 0x1, &(0x7f0000000100)="ffe0f5") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001240)={r1, 0x10, &(0x7f0000001200)={&(0x7f0000000200)=""/4096, 0x1000, 0x0}}, 0x10) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001280)='/dev/dlm-monitor\x00', 0x4000, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000080)) ioctl(r4, 0x1, &(0x7f0000000100)="ffe0f5") r5 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/ocfs2_control\x00', 0x40, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) r7 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r7, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) lseek(r7, 0x101, 0x3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r6, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r8}, 0xc) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001300)={r8, 0x81}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x4, &(0x7f0000001340)=@raw=[@map={0x18, 0x5, 0x1, 0x0, r3}, @map_val={0x18, 0xa, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x200}, @call={0x85, 0x0, 0x0, 0x5f}, @exit, @ldst={0x3, 0x3, 0x3, 0x3, 0xf, 0x41, 0x4}, @map_val={0x18, 0x6, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x9b3}, @jmp={0x5, 0x1, 0x6, 0x9, 0x9, 0xfffffffffffffffc, 0x8}, @map_val={0x18, 0x9, 0x2, 0x0, r9, 0x0, 0x0, 0x0, 0x8c}], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x7d48716675f7e2a6, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xffffffffffffffe2, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x4, 0xffffffff}, 0x10, r2, r0}, 0x33b) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r10, 0x40086602, &(0x7f0000000080)) ioctl(r10, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$EVIOCGMASK(r10, 0x80104592, &(0x7f0000000140)={0x16, 0xb2, &(0x7f0000000080)="2e419640405e9dbcbbfdf4b8c9012e7855dabfb97232498d7b3e9ec6893cae386b1d154739ab0cf3dc9327ea419d54aa0b1146f7fb02000f233058f9c5823f7a48a83833348a22ed8a960319d1948d8e36c6e4796839c73343eae713803a30c86aa8795a74184075e4149faaec05e94d26e18d21f58d39037e67019b7980e29778c321e0850f8ccc40c5717c8d4f99f77a85a9ca2382dabaf215fedcc57bc0c60b7e2a148fe85fd629610fff282d54e8c5c7"}) 06:40:16 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r0, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:16 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2e4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:16 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'syz_tun\x00', 0x2000000000000001}) socket$netlink(0x10, 0x3, 0xc) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = socket(0x200000000000011, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000080)) ioctl(r4, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$CDROM_CHANGER_NSLOTS(r4, 0x5328) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r3, &(0x7f0000000240)={0x11, 0x0, r6}, 0x14) getsockname$packet(r3, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r2, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r7, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000080)={0x0, 'lo\x00', 0x1}, 0x18) writev(r0, &(0x7f000037d000)=[{&(0x7f0000000040)="1f0000000203190000000700000000000000853b09000100010100ff3ffe58c8bde0abe7d11e5842ebc53161e00e01", 0x3}], 0x1) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'rose0\x00'}) 06:40:16 executing program 2: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:16 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r0, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:16 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x300}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:16 executing program 0: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)}}], 0x2, 0x4040008) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000000), 0x4) 06:40:16 executing program 2: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:16 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r0, 0x1, &(0x7f0000000100)="ffe0f5") [ 506.610414][T23564] device veth3503 entered promiscuous mode 06:40:16 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x500}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:16 executing program 0: ioctl$sock_bt_hci(0xffffffffffffffff, 0x0, &(0x7f0000000140)="dc1de0b24e1a1ada15f24bd84ed07b6de6979fc0826c028f3e08d3b50c4930ec0d3e8915449e61314dbeeb4614a2c77a81278879c146ed7c199d4c4e491869e8ef41c09ea425f37c4f06666ffc78f5d6244e71a2") syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x6db, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) ioctl(r0, 0x1, &(0x7f0000000100)="ffe0f5") mknodat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x10001) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r4}, 0x14) getsockname$packet(r2, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r1, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) r6 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000200)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_VERSION(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4040203}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x4c, r6, 0x800, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @empty}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @broadcast}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x15}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x1}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x5}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @empty}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4}, 0xae83491ab474f61b) [ 506.740414][T23577] device veth3505 entered promiscuous mode 06:40:16 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x600}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:16 executing program 2: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 506.838423][T23588] EXT4-fs (loop0): filesystem too large to mount safely on this system 06:40:16 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x700}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:16 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:16 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 507.017539][T23604] device veth3509 entered promiscuous mode 06:40:16 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x900}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:16 executing program 0: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x101, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getpeername$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000240)=0x1c) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)) ioctl(r3, 0x1, &(0x7f0000000100)="ffe0f5") bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x9, 0x9, &(0x7f00000000c0)=ANY=[@ANYBLOB="18190000", @ANYRES32=r0, @ANYBLOB="00000000000000004e150c000000000079e8ffff00000000811902008b0e1f0000000000", @ANYRES32=r2, @ANYBLOB="000000000000000018190000", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x41100, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:40:16 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:16 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0xf5f6d12cad0e598b, 0x800, 0x3) bind(r1, &(0x7f0000000300)=@nfc={0x27, 0x21, 0x0, 0xe}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x16b, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x4b1b2c85d2319093}, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket(0x200000000000011, 0x3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r5, &(0x7f0000000240)={0x11, 0x0, r7}, 0x14) getsockname$packet(r5, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r4, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r8, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0)='nl80211\x00') sendmsg$NL80211_CMD_GET_MPP(r4, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x28, r9, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@NL80211_ATTR_MAC={0xa, 0x6, @remote}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x400c008) [ 507.202651][T23623] device veth3511 entered promiscuous mode 06:40:17 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:17 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 507.303396][T23629] device veth3513 entered promiscuous mode 06:40:17 executing program 0: socket$xdp(0x2c, 0x3, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r0, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) mmap$xdp(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0xc7250ea55fe09ef7) 06:40:17 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:17 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa00}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:17 executing program 0: symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') 06:40:17 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:17 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000300)=[{&(0x7f0000000340)="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", 0x82, 0x8000}, {&(0x7f0000000240)="5ab37b03a87e3114ecd5f7c02c08993abe363f8ccf6e", 0xffffffffffffff4d, 0x4}], 0x0, 0x0) 06:40:17 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xb00}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:17 executing program 3: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:17 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 507.597279][T23666] device veth3517 entered promiscuous mode [ 507.636880][T23673] FAT-fs (loop2): bogus number of reserved sectors [ 507.662205][T23673] FAT-fs (loop2): Can't find a valid FAT filesystem [ 507.668529][T23672] device veth3519 entered promiscuous mode 06:40:17 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc00}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:17 executing program 3: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:17 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 507.886777][T23690] FAT-fs (loop2): bogus number of reserved sectors 06:40:17 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe00}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 507.915836][T23690] FAT-fs (loop2): Can't find a valid FAT filesystem [ 508.091157][T23665] ISOFS: Unable to identify CD-ROM format. 06:40:17 executing program 0: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454c46025f323c795badd3cdc474fbca38af9f"], 0x14) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsa\x00', 0x8000, 0x0) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000080)={0x80, 0x8}) 06:40:17 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:17 executing program 3: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:17 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10db}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:18 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1100}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 508.298643][T23713] FAT-fs (loop2): bogus number of reserved sectors [ 508.348347][T23727] ERROR: Domain ' /sbin/init /sbin/init /etc/init.d/rc /sbin/startpar /etc/init.d/ssh /sbin/start-stop-daemon /usr/sbin/sshd /usr/sbin/sshd /bin/bash /syz-fuzzer /syz-executor.0 proc:/self/fd/3' not defined. [ 508.396251][T23713] FAT-fs (loop2): Can't find a valid FAT filesystem 06:40:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r4}, 0x14) getsockname$packet(r2, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r1, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) sendmsg$NFNL_MSG_CTHELPER_GET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x1, 0x9, 0x100, 0x70bd29, 0x25dfdbfe, {0x5}, [@NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x15}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 508.505281][T23733] device veth3529 entered promiscuous mode 06:40:18 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:18 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 508.596559][T23739] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 508.615639][T23737] device veth3531 entered promiscuous mode [ 508.626362][T23739] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 06:40:18 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1200}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 508.636334][T23742] FAT-fs (loop2): bogus number of reserved sectors [ 508.664459][T23742] FAT-fs (loop2): Can't find a valid FAT filesystem [ 508.667105][T23739] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:18 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:18 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r4}, 0x14) getsockname$packet(r2, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r1, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) sendmsg$NFNL_MSG_CTHELPER_GET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x1, 0x9, 0x100, 0x70bd29, 0x25dfdbfe, {0x5}, [@NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x15}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:18 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1300}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 508.894530][T23760] FAT-fs (loop2): bogus number of reserved sectors [ 508.935740][T23769] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 508.936006][T23760] FAT-fs (loop2): Can't find a valid FAT filesystem [ 508.987743][T23767] device veth3537 entered promiscuous mode 06:40:18 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 508.990963][T23769] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 509.027568][T23769] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 509.045151][T23775] device veth3539 entered promiscuous mode 06:40:18 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1400}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:18 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r4}, 0x14) getsockname$packet(r2, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r1, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) sendmsg$NFNL_MSG_CTHELPER_GET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x1, 0x9, 0x100, 0x70bd29, 0x25dfdbfe, {0x5}, [@NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x15}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 509.178629][T23787] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 509.188496][T23789] FAT-fs (loop3): bogus number of reserved sectors 06:40:19 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 509.256391][T23794] FAT-fs (loop2): bogus number of reserved sectors [ 509.269830][T23789] FAT-fs (loop3): Can't find a valid FAT filesystem [ 509.290727][T23787] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 509.290936][T23787] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 509.292724][T23794] FAT-fs (loop2): Can't find a valid FAT filesystem 06:40:19 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1c00}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r4}, 0x14) getsockname$packet(r2, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r1, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) sendmsg$NFNL_MSG_CTHELPER_GET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x1, 0x9, 0x100, 0x70bd29, 0x25dfdbfe, {0x5}, [@NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x15}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:19 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 509.538618][T23806] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 509.577543][T23806] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 06:40:19 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1f00}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 509.608161][T23806] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:19 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 509.696168][T23813] FAT-fs (loop3): bogus number of reserved sectors [ 509.727230][T23813] FAT-fs (loop3): Can't find a valid FAT filesystem 06:40:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r4}, 0x14) getsockname$packet(r2, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r1, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 509.731818][T23811] device veth3549 entered promiscuous mode [ 509.734635][T23818] FAT-fs (loop2): bogus number of reserved sectors [ 509.734644][T23818] FAT-fs (loop2): Can't find a valid FAT filesystem 06:40:19 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2000}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:19 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 509.926721][T23827] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:40:19 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 509.966863][T23832] FAT-fs (loop2): bogus number of reserved sectors [ 509.975637][T23827] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 509.989274][T23832] FAT-fs (loop2): Can't find a valid FAT filesystem [ 510.005964][T23827] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 510.047855][T23837] FAT-fs (loop3): bogus number of reserved sectors 06:40:19 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 510.094288][T23837] FAT-fs (loop3): Can't find a valid FAT filesystem 06:40:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) socket(0x200000000000011, 0x3, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:19 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2088}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 510.234971][T23842] FAT-fs (loop2): bogus number of reserved sectors [ 510.253219][T23853] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:20 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:20 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3f00}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 510.282080][T23842] FAT-fs (loop2): Can't find a valid FAT filesystem 06:40:20 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 510.318481][T23859] FAT-fs (loop3): bogus number of reserved sectors [ 510.332611][T23859] FAT-fs (loop3): Can't find a valid FAT filesystem [ 510.356323][T23862] device veth3557 entered promiscuous mode 06:40:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) socket(0x200000000000011, 0x3, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:20 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:20 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 510.423848][T23870] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 510.441300][T23866] FAT-fs (loop2): bogus number of reserved sectors [ 510.463523][T23873] FAT-fs (loop3): bogus number of reserved sectors [ 510.465067][T23866] FAT-fs (loop2): Can't find a valid FAT filesystem [ 510.485490][T23873] FAT-fs (loop3): Can't find a valid FAT filesystem 06:40:20 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4800}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) socket(0x200000000000011, 0x3, 0x0) socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:20 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:20 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 510.689104][T23890] FAT-fs (loop3): bogus number of reserved sectors [ 510.699122][T23892] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 510.702731][T23890] FAT-fs (loop3): Can't find a valid FAT filesystem [ 510.728571][T23896] FAT-fs (loop2): bogus number of reserved sectors 06:40:20 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4a00}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 510.757680][T23896] FAT-fs (loop2): Can't find a valid FAT filesystem 06:40:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) socket(0x200000000000011, 0x3, 0x0) socket(0x200000000000011, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:20 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:20 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4c00}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:20 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 510.924955][T23911] FAT-fs (loop3): bogus number of reserved sectors [ 510.948414][T23910] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 510.958245][T23911] FAT-fs (loop3): Can't find a valid FAT filesystem 06:40:20 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 511.016644][T23919] FAT-fs (loop2): bogus number of reserved sectors [ 511.048106][T23919] FAT-fs (loop2): Can't find a valid FAT filesystem 06:40:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) socket(0x200000000000011, 0x3, 0x0) socket(0x200000000000011, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:20 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5865}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:20 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 511.160708][T23933] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:21 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) socket(0x200000000000011, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 511.210728][T23939] FAT-fs (loop2): bogus number of reserved sectors [ 511.229382][T23939] FAT-fs (loop2): Can't find a valid FAT filesystem [ 511.243746][T23943] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:21 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 511.340849][T23953] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 511.342263][T23947] FAT-fs (loop3): bogus number of reserved sectors 06:40:21 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6000}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 511.382976][T23956] FAT-fs (loop2): bogus number of reserved sectors 06:40:21 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 511.439406][T23956] FAT-fs (loop2): Can't find a valid FAT filesystem 06:40:21 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 511.499532][T23947] FAT-fs (loop3): Can't find a valid FAT filesystem 06:40:21 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:21 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:21 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:21 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6558}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 511.650505][T23970] FAT-fs (loop2): bogus number of reserved sectors 06:40:21 executing program 0: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 511.668931][T23970] FAT-fs (loop2): Can't find a valid FAT filesystem [ 511.682586][T23983] FAT-fs (loop3): bogus number of reserved sectors [ 511.695793][T23983] FAT-fs (loop3): Can't find a valid FAT filesystem 06:40:21 executing program 0: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 511.727266][T23982] device veth3579 entered promiscuous mode [ 511.776895][T23990] device veth3581 entered promiscuous mode 06:40:21 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6800}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:21 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:21 executing program 0: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:21 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:21 executing program 0: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 511.909257][T24004] FAT-fs (loop2): bogus number of reserved sectors [ 511.930708][T24008] FAT-fs (loop3): bogus number of reserved sectors [ 511.939874][T24008] FAT-fs (loop3): Can't find a valid FAT filesystem [ 511.949034][T24004] FAT-fs (loop2): Can't find a valid FAT filesystem 06:40:21 executing program 0: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:21 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6c00}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:21 executing program 0: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:21 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:21 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) 06:40:21 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x7400}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 512.115981][T24030] FAT-fs (loop3): bogus number of reserved sectors [ 512.130611][T24030] FAT-fs (loop3): Can't find a valid FAT filesystem 06:40:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) [ 512.144775][T24038] FAT-fs (loop2): bogus number of reserved sectors [ 512.156731][T24038] FAT-fs (loop2): Can't find a valid FAT filesystem 06:40:21 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:22 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) 06:40:22 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x7a00}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) [ 512.336735][T24048] FAT-fs (loop3): bogus number of reserved sectors [ 512.359148][T24048] FAT-fs (loop3): Can't find a valid FAT filesystem [ 512.360527][T24049] FAT-fs (loop2): bogus number of reserved sectors 06:40:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) [ 512.390850][T24049] FAT-fs (loop2): Can't find a valid FAT filesystem 06:40:22 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8100}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:22 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) [ 512.494615][T24069] device veth3597 entered promiscuous mode 06:40:22 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 512.539225][T24075] FAT-fs (loop2): invalid media value (0x00) [ 512.547702][T24075] FAT-fs (loop2): Can't find a valid FAT filesystem [ 512.554239][T24073] device veth3599 entered promiscuous mode 06:40:22 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc700}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) [ 512.616391][T24084] FAT-fs (loop3): bogus number of reserved sectors [ 512.629695][T24084] FAT-fs (loop3): Can't find a valid FAT filesystem 06:40:22 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) [ 512.683205][T24088] device veth3601 entered promiscuous mode 06:40:22 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) [ 512.735719][T24094] device veth3603 entered promiscuous mode [ 512.744064][T24099] FAT-fs (loop2): invalid media value (0x00) [ 512.753817][T24099] FAT-fs (loop2): Can't find a valid FAT filesystem 06:40:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) 06:40:22 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xdb10}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 512.759089][T24104] FAT-fs (loop3): bogus number of reserved sectors [ 512.774107][T24104] FAT-fs (loop3): Can't find a valid FAT filesystem 06:40:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) 06:40:22 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 512.897521][T24115] device veth3605 entered promiscuous mode 06:40:22 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) [ 512.960371][T24123] FAT-fs (loop2): invalid media value (0x00) [ 512.980449][T24128] FAT-fs (loop3): bogus number of reserved sectors [ 512.985265][T24123] FAT-fs (loop2): Can't find a valid FAT filesystem [ 512.997177][T24128] FAT-fs (loop3): Can't find a valid FAT filesystem 06:40:22 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 513.004239][T24126] device veth3607 entered promiscuous mode 06:40:22 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe402}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)}], 0x1}, 0x0) 06:40:22 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 513.162069][T24138] FAT-fs (loop2): invalid media value (0x00) 06:40:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)}], 0x1}, 0x0) [ 513.201646][T24138] FAT-fs (loop2): Can't find a valid FAT filesystem 06:40:23 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xf000}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)}], 0x1}, 0x0) [ 513.294232][T24152] FAT-fs (loop3): bogus number of reserved sectors 06:40:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b0001", 0x17}], 0x1}, 0x0) [ 513.345998][T24152] FAT-fs (loop3): Can't find a valid FAT filesystem 06:40:23 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b0001", 0x17}], 0x1}, 0x0) [ 513.394376][T24167] FAT-fs (loop2): invalid media value (0x00) [ 513.414866][T24167] FAT-fs (loop2): Can't find a valid FAT filesystem 06:40:23 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:23 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfeff}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:23 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 513.533708][T24177] FAT-fs (loop3): bogus number of reserved sectors [ 513.541958][T24177] FAT-fs (loop3): Can't find a valid FAT filesystem 06:40:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b0001", 0x17}], 0x1}, 0x0) 06:40:23 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff0f}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:23 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e0006", 0x23}], 0x1}, 0x0) [ 513.678024][T24193] FAT-fs (loop2): invalid media value (0x00) [ 513.710501][T24195] device veth3617 entered promiscuous mode [ 513.715742][T24193] FAT-fs (loop2): Can't find a valid FAT filesystem [ 513.733422][T24202] FAT-fs (loop3): invalid media value (0x00) 06:40:23 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 513.747236][T24202] FAT-fs (loop3): Can't find a valid FAT filesystem 06:40:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e0006", 0x23}], 0x1}, 0x0) [ 513.772581][T24205] device veth3619 entered promiscuous mode 06:40:23 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff7f}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 513.851065][T24209] FAT-fs (loop2): invalid media value (0x00) [ 513.855855][T24214] device veth3621 entered promiscuous mode 06:40:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e0006", 0x23}], 0x1}, 0x0) [ 513.880800][T24209] FAT-fs (loop2): Can't find a valid FAT filesystem 06:40:23 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 513.931730][T24219] device veth3623 entered promiscuous mode 06:40:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e0006000000000100", 0x29}], 0x1}, 0x0) 06:40:23 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfffe}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 513.980176][T24226] FAT-fs (loop3): invalid media value (0x00) [ 513.987914][T24226] FAT-fs (loop3): Can't find a valid FAT filesystem 06:40:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e0006000000000100", 0x29}], 0x1}, 0x0) 06:40:23 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 514.026688][T24234] device veth3625 entered promiscuous mode 06:40:23 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1354e}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:23 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 514.094708][T24241] FAT-fs (loop2): invalid media value (0x00) 06:40:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e0006000000000100", 0x29}], 0x1}, 0x0) [ 514.111369][T24241] FAT-fs (loop2): Can't find a valid FAT filesystem [ 514.126741][T24249] FAT-fs (loop3): invalid media value (0x00) [ 514.135378][T24249] FAT-fs (loop3): Can't find a valid FAT filesystem [ 514.154652][T24250] device veth3627 entered promiscuous mode 06:40:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e0006000000000100000001", 0x2c}], 0x1}, 0x0) 06:40:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:24 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 514.216609][T24252] device veth3629 entered promiscuous mode 06:40:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1354f}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 514.252299][T24260] FAT-fs (loop2): invalid media value (0x00) [ 514.280525][T24260] FAT-fs (loop2): Can't find a valid FAT filesystem 06:40:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e0006000000000100000001", 0x2c}], 0x1}, 0x0) [ 514.310479][T24267] device veth3631 entered promiscuous mode [ 514.340002][T24270] FAT-fs (loop3): invalid media value (0x00) [ 514.353222][T24270] FAT-fs (loop3): Can't find a valid FAT filesystem 06:40:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e0006000000000100000001", 0x2c}], 0x1}, 0x0) [ 514.362758][T24275] device veth3633 entered promiscuous mode 06:40:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13550}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153", 0x2d}], 0x1}, 0x0) 06:40:24 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153", 0x2d}], 0x1}, 0x0) 06:40:24 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 514.542061][T24298] FAT-fs (loop3): invalid media value (0x00) [ 514.542931][T24288] device veth3635 entered promiscuous mode 06:40:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153", 0x2d}], 0x1}, 0x0) [ 514.561210][T24298] FAT-fs (loop3): Can't find a valid FAT filesystem 06:40:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 514.617902][T24305] device veth3637 entered promiscuous mode 06:40:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13551}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:24 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 514.765865][T24320] FAT-fs (loop3): invalid media value (0x00) 06:40:24 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 514.776760][T24316] device veth3639 entered promiscuous mode [ 514.778137][T24320] FAT-fs (loop3): Can't find a valid FAT filesystem 06:40:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13552}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 514.824059][T24323] FAT-fs (loop0): invalid media value (0x00) [ 514.834994][T24323] FAT-fs (loop0): Can't find a valid FAT filesystem 06:40:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 514.921250][T24333] device veth3641 entered promiscuous mode 06:40:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) socket(0x200000000000011, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 514.994289][T24338] FAT-fs (loop3): invalid media value (0x00) 06:40:24 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r0, 0x1, &(0x7f0000000100)="ffe0f5") [ 515.012271][T24336] device veth3643 entered promiscuous mode 06:40:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13553}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 515.029598][T24338] FAT-fs (loop3): Can't find a valid FAT filesystem [ 515.114928][T24348] validate_nla: 14 callbacks suppressed [ 515.114935][T24348] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:40:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 515.151598][T24348] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 06:40:24 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r0, 0x1, &(0x7f0000000100)="ffe0f5") [ 515.167555][T24348] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 515.195189][T24353] device veth3645 entered promiscuous mode 06:40:25 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) socket(0x200000000000011, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13554}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 515.300613][T24361] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 515.344217][T24361] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 515.385432][T24361] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 515.480076][T24363] FAT-fs (loop3): invalid media value (0x00) [ 515.541576][T24363] FAT-fs (loop3): Can't find a valid FAT filesystem 06:40:25 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r0, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:25 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 515.622690][T24373] device veth3647 entered promiscuous mode 06:40:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) socket(0x200000000000011, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 515.707510][T24376] device veth3649 entered promiscuous mode 06:40:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13555}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 515.741658][T24384] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 515.788049][T24384] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 06:40:25 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 515.855670][T24384] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:25 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:25 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 515.871836][T24388] device veth3651 entered promiscuous mode 06:40:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 516.036907][T24396] device veth3653 entered promiscuous mode 06:40:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13556}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 516.099567][T24400] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:40:25 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 516.156145][T24400] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 516.181687][T24408] device veth3655 entered promiscuous mode [ 516.202782][T24400] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 516.302202][T24410] device veth3657 entered promiscuous mode 06:40:26 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:26 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13557}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:26 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:26 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r0, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:26 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 516.449109][T24423] device veth3659 entered promiscuous mode 06:40:26 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 516.495222][T24431] device veth3661 entered promiscuous mode 06:40:26 executing program 0: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:26 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13558}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:26 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(0xffffffffffffffff, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:26 executing program 0: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:26 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r0, 0x1, &(0x7f0000000100)="ffe0f5") [ 516.622694][T24442] device veth3663 entered promiscuous mode 06:40:26 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13559}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:26 executing program 0: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:26 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(0xffffffffffffffff, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:26 executing program 0: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 516.763570][T24458] device veth3665 entered promiscuous mode 06:40:26 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r0, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:26 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1355a}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:26 executing program 0: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:26 executing program 0: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 516.907419][T24477] device veth3667 entered promiscuous mode 06:40:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) 06:40:26 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:26 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(0xffffffffffffffff, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) [ 517.002015][T24485] device veth3669 entered promiscuous mode 06:40:26 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1355b}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) 06:40:26 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) [ 517.166947][T24501] device veth3671 entered promiscuous mode 06:40:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 06:40:27 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x0, &(0x7f0000000100)="ffe0f5") [ 517.273510][T24511] device veth3673 entered promiscuous mode 06:40:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 06:40:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1355c}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) [ 517.440252][T24533] device veth3675 entered promiscuous mode 06:40:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(0xffffffffffffffff, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 06:40:27 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x0, &(0x7f0000000100)="ffe0f5") [ 517.515269][T24537] device veth3677 entered promiscuous mode 06:40:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1355d}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) [ 517.601512][T24547] device veth3679 entered promiscuous mode 06:40:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) 06:40:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(0xffffffffffffffff, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:27 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x0, &(0x7f0000000100)="ffe0f5") 06:40:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) [ 517.699241][T24557] device veth3681 entered promiscuous mode 06:40:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1355e}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:27 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, 0x0) 06:40:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) 06:40:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(0xffffffffffffffff, 0x1, &(0x7f0000000100)="ffe0f5") [ 517.802604][T24572] device veth3683 entered promiscuous mode 06:40:27 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, 0x0) 06:40:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x0, &(0x7f0000000100)="ffe0f5") 06:40:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)}], 0x1}, 0x0) [ 517.872750][T24582] device veth3685 entered promiscuous mode 06:40:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1355f}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)}], 0x1}, 0x0) [ 517.972352][T24594] device veth3687 entered promiscuous mode 06:40:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x0, &(0x7f0000000100)="ffe0f5") 06:40:27 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, 0x0) 06:40:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)}], 0x1}, 0x0) [ 518.058259][T24599] device veth3689 entered promiscuous mode 06:40:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13560}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x0, &(0x7f0000000100)="ffe0f5") 06:40:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b0001", 0x17}], 0x1}, 0x0) [ 518.258378][T24612] device veth3691 entered promiscuous mode 06:40:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b0001", 0x17}], 0x1}, 0x0) 06:40:28 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)) 06:40:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, 0x0) 06:40:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b0001", 0x17}], 0x1}, 0x0) [ 518.412676][T24620] device veth3693 entered promiscuous mode 06:40:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13561}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e0006", 0x23}], 0x1}, 0x0) 06:40:28 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)) 06:40:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e0006", 0x23}], 0x1}, 0x0) [ 518.570975][T24647] device veth3695 entered promiscuous mode 06:40:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, 0x0) 06:40:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e0006", 0x23}], 0x1}, 0x0) [ 518.642059][T24653] device veth3697 entered promiscuous mode 06:40:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13562}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e0006000000000100", 0x29}], 0x1}, 0x0) 06:40:28 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)) 06:40:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, 0x0) 06:40:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e0006000000000100", 0x29}], 0x1}, 0x0) [ 518.863377][T24670] device veth3699 entered promiscuous mode 06:40:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13563}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e0006000000000100", 0x29}], 0x1}, 0x0) [ 518.949644][T24684] device veth3701 entered promiscuous mode 06:40:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13564}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)) 06:40:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e0006000000000100000001", 0x2c}], 0x1}, 0x0) 06:40:28 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") [ 519.046325][T24694] device veth3703 entered promiscuous mode 06:40:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e0006000000000100000001", 0x2c}], 0x1}, 0x0) 06:40:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13565}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e0006000000000100000001", 0x2c}], 0x1}, 0x0) 06:40:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") 06:40:29 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) socket(0x200000000000011, 0x3, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153", 0x2d}], 0x1}, 0x0) [ 519.262893][T24712] device veth3705 entered promiscuous mode 06:40:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153", 0x2d}], 0x1}, 0x0) [ 519.348070][T24722] device veth3707 entered promiscuous mode 06:40:29 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13566}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153", 0x2d}], 0x1}, 0x0) [ 519.381316][T24723] FAT-fs (loop3): invalid media value (0x00) [ 519.412101][T24731] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 519.428047][T24723] FAT-fs (loop3): Can't find a valid FAT filesystem [ 519.459588][T24731] netlink: 'syz-executor.2': attribute type 6 has an invalid length. 06:40:29 executing program 0 (fault-call:1 fault-nth:0): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 519.497763][T24731] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 519.533045][T24735] device veth3709 entered promiscuous mode [ 519.600218][T24744] FAULT_INJECTION: forcing a failure. 06:40:29 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) socket(0x200000000000011, 0x3, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:29 executing program 3 (fault-call:4 fault-nth:0): syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)) [ 519.600218][T24744] name failslab, interval 1, probability 0, space 0, times 0 [ 519.645235][T24744] CPU: 0 PID: 24744 Comm: syz-executor.0 Not tainted 5.5.0-rc6-syzkaller #0 [ 519.671057][T24748] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:29 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13567}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 519.676140][T24742] device veth3711 entered promiscuous mode [ 519.654085][T24744] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 519.654085][T24744] Call Trace: [ 519.654085][T24744] dump_stack+0x197/0x210 [ 519.654085][T24744] should_fail.cold+0xa/0x15 [ 519.654085][T24744] ? fault_create_debugfs_attr+0x180/0x180 [ 519.654085][T24744] ? ___might_sleep+0x163/0x2c0 [ 519.654085][T24744] __should_failslab+0x121/0x190 [ 519.654085][T24744] should_failslab+0x9/0x14 [ 519.654085][T24744] kmem_cache_alloc_node_trace+0x274/0x750 [ 519.654085][T24744] ? _raw_spin_unlock_bh+0x2c/0x30 [ 519.654085][T24744] ? release_sock+0x156/0x1c0 [ 519.654085][T24744] __get_vm_area_node+0x12f/0x3b0 [ 519.654085][T24744] __vmalloc_node_range+0xce/0x790 [ 519.654085][T24744] ? netlink_sendmsg+0x685/0xea0 [ 519.654085][T24744] ? netlink_sendmsg+0x685/0xea0 [ 519.654085][T24744] vmalloc+0x6b/0x90 [ 519.654085][T24744] ? netlink_sendmsg+0x685/0xea0 [ 519.654085][T24744] netlink_sendmsg+0x685/0xea0 [ 519.654085][T24744] ? netlink_unicast+0x7d0/0x7d0 [ 519.654085][T24744] ? tomoyo_socket_sendmsg+0x26/0x30 [ 519.654085][T24744] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 519.654085][T24744] ? security_socket_sendmsg+0x8d/0xc0 [ 519.654085][T24744] ? netlink_unicast+0x7d0/0x7d0 [ 519.654085][T24744] sock_sendmsg+0xd7/0x130 [ 519.654085][T24744] ____sys_sendmsg+0x753/0x880 [ 519.654085][T24744] ? kernel_sendmsg+0x50/0x50 [ 519.654085][T24744] ? __fget+0x35d/0x550 06:40:29 executing program 3 (fault-call:4 fault-nth:1): syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)) [ 519.654085][T24744] ? find_held_lock+0x35/0x130 06:40:29 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13568}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 519.654085][T24744] ___sys_sendmsg+0x100/0x170 [ 519.654085][T24744] ? sendmsg_copy_msghdr+0x70/0x70 [ 519.654085][T24744] ? __kasan_check_read+0x11/0x20 [ 519.678925][T24744] ? __fget+0x37f/0x550 [ 519.678925][T24744] ? ksys_dup3+0x3e0/0x3e0 [ 519.678925][T24744] ? __fget_light+0x1a9/0x230 [ 519.678925][T24744] ? __fdget+0x1b/0x20 [ 519.678925][T24744] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 519.678925][T24744] __sys_sendmsg+0x105/0x1d0 [ 519.678925][T24744] ? __sys_sendmsg_sock+0xc0/0xc0 [ 519.678925][T24744] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 519.678925][T24744] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 519.678925][T24744] ? do_syscall_64+0x26/0x790 06:40:30 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13569}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 519.678925][T24744] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 519.678925][T24744] ? do_syscall_64+0x26/0x790 [ 519.678925][T24744] __x64_sys_sendmsg+0x78/0xb0 [ 519.678925][T24744] do_syscall_64+0xfa/0x790 [ 519.678925][T24744] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 519.678925][T24744] RIP: 0033:0x45afd9 [ 519.678925][T24744] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 519.841594][T24759] FAULT_INJECTION: forcing a failure. [ 519.841594][T24759] name failslab, interval 1, probability 0, space 0, times 0 [ 519.808979][T24744] RSP: 002b:00007f92e7080c88 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 519.808979][T24744] RAX: ffffffffffffffda RBX: 000000000072bf00 RCX: 000000000045afd9 [ 519.808979][T24744] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 519.808979][T24744] RBP: 00007f92e7080ca0 R08: 0000000000000000 R09: 0000000000000000 [ 519.808979][T24744] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f92e70816d4 [ 519.808979][T24744] R13: 00000000004b1ac8 R14: 00000000006f83d8 R15: 0000000000000004 06:40:30 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) socket(0x200000000000011, 0x3, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 519.852313][T24744] syz-executor.0: vmalloc: allocation failure: 213312 bytes, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=syz0,mems_allowed=0-1 [ 519.866953][T24759] CPU: 3 PID: 24759 Comm: syz-executor.3 Not tainted 5.5.0-rc6-syzkaller #0 [ 519.917472][T24761] device veth3713 entered promiscuous mode [ 519.908826][T24759] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 519.908826][T24759] Call Trace: [ 519.908826][T24759] dump_stack+0x197/0x210 [ 519.908826][T24759] should_fail.cold+0xa/0x15 [ 519.908826][T24759] ? fault_create_debugfs_attr+0x180/0x180 [ 519.908826][T24759] ? ___might_sleep+0x163/0x2c0 [ 519.908826][T24759] __should_failslab+0x121/0x190 [ 519.908826][T24759] should_failslab+0x9/0x14 [ 519.908826][T24759] __kmalloc+0x2e0/0x770 [ 519.908826][T24759] ? mark_held_locks+0xf0/0xf0 [ 519.908826][T24759] ? avc_has_perm+0x3fc/0x610 [ 519.908826][T24759] ? tomoyo_realpath_from_path+0xc5/0x660 [ 519.908826][T24759] tomoyo_realpath_from_path+0xc5/0x660 [ 519.908826][T24759] ? tomoyo_path_number_perm+0x193/0x520 [ 519.908826][T24759] tomoyo_path_number_perm+0x1dd/0x520 [ 519.908826][T24759] ? tomoyo_path_number_perm+0x193/0x520 [ 519.908826][T24759] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 519.908826][T24759] ? inode_has_perm+0x1b0/0x230 [ 519.908826][T24759] ? selinux_file_open+0x4e0/0x4e0 [ 519.908826][T24759] ? selinux_file_mprotect+0x620/0x620 [ 519.908826][T24759] ? __fget+0x37f/0x550 [ 519.908826][T24759] ? ksys_dup3+0x3e0/0x3e0 [ 520.047572][T24765] device veth3715 entered promiscuous mode [ 520.039111][T24759] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 520.039111][T24759] ? fput_many+0x12c/0x1a0 [ 520.039111][T24759] tomoyo_file_ioctl+0x23/0x30 [ 520.039111][T24759] security_file_ioctl+0x77/0xc0 [ 520.039111][T24759] ksys_ioctl+0x57/0xd0 [ 520.039111][T24759] __x64_sys_ioctl+0x73/0xb0 [ 520.039111][T24759] do_syscall_64+0xfa/0x790 [ 520.039111][T24759] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 520.039111][T24759] RIP: 0033:0x45afd9 [ 520.039111][T24759] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 520.039111][T24759] RSP: 002b:00007fb889c69c88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 520.039111][T24759] RAX: ffffffffffffffda RBX: 000000000072bfa8 RCX: 000000000045afd9 [ 520.039111][T24759] RDX: 0000000020000100 RSI: 0000000000000001 RDI: 0000000000000006 [ 520.039111][T24759] RBP: 00007fb889c69ca0 R08: 0000000000000000 R09: 0000000000000000 [ 520.039111][T24759] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb889c6a6d4 [ 520.039111][T24759] R13: 00000000004a97d8 R14: 00000000006ecf90 R15: 0000000000000007 [ 520.050952][T24744] CPU: 0 PID: 24744 Comm: syz-executor.0 Not tainted 5.5.0-rc6-syzkaller #0 [ 520.050961][T24744] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 520.050964][T24744] Call Trace: [ 520.050984][T24744] dump_stack+0x197/0x210 [ 520.050998][T24744] warn_alloc.cold+0x87/0x164 [ 520.051007][T24744] ? zone_watermark_ok_safe+0x260/0x260 [ 520.051017][T24744] ? kmem_cache_alloc_node_trace+0x398/0x750 [ 520.051033][T24744] ? __get_vm_area_node+0x2e7/0x3b0 [ 520.051046][T24744] __vmalloc_node_range+0x44c/0x790 [ 520.051059][T24744] ? netlink_sendmsg+0x685/0xea0 [ 520.051069][T24744] vmalloc+0x6b/0x90 [ 520.051078][T24744] ? netlink_sendmsg+0x685/0xea0 [ 520.051090][T24744] netlink_sendmsg+0x685/0xea0 [ 520.051107][T24744] ? netlink_unicast+0x7d0/0x7d0 [ 520.051120][T24744] ? tomoyo_socket_sendmsg+0x26/0x30 [ 520.051130][T24744] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 520.051140][T24744] ? security_socket_sendmsg+0x8d/0xc0 [ 520.051148][T24744] ? netlink_unicast+0x7d0/0x7d0 [ 520.051158][T24744] sock_sendmsg+0xd7/0x130 [ 520.051167][T24744] ____sys_sendmsg+0x753/0x880 [ 520.051177][T24744] ? kernel_sendmsg+0x50/0x50 [ 520.051186][T24744] ? __fget+0x35d/0x550 [ 520.051195][T24744] ? find_held_lock+0x35/0x130 [ 520.051209][T24744] ___sys_sendmsg+0x100/0x170 [ 520.051220][T24744] ? sendmsg_copy_msghdr+0x70/0x70 [ 520.051228][T24744] ? __kasan_check_read+0x11/0x20 [ 520.051245][T24744] ? __fget+0x37f/0x550 [ 520.051257][T24744] ? ksys_dup3+0x3e0/0x3e0 [ 520.051278][T24744] ? __fget_light+0x1a9/0x230 [ 520.057510][T24759] ERROR: Out of memory at tomoyo_realpath_from_path. [ 520.196112][T24770] device veth3717 entered promiscuous mode [ 520.107889][T24744] ? __fdget+0x1b/0x20 [ 520.107889][T24744] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 520.107889][T24744] __sys_sendmsg+0x105/0x1d0 [ 520.107889][T24744] ? __sys_sendmsg_sock+0xc0/0xc0 [ 520.107889][T24744] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 520.107889][T24744] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 520.107889][T24744] ? do_syscall_64+0x26/0x790 [ 520.107889][T24744] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 520.107889][T24744] ? do_syscall_64+0x26/0x790 [ 520.107889][T24744] __x64_sys_sendmsg+0x78/0xb0 [ 520.107889][T24744] do_syscall_64+0xfa/0x790 [ 520.107889][T24744] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 520.107889][T24744] RIP: 0033:0x45afd9 [ 520.107889][T24744] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 520.107889][T24744] RSP: 002b:00007f92e7080c88 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 520.107889][T24744] RAX: ffffffffffffffda RBX: 000000000072bf00 RCX: 000000000045afd9 [ 520.107889][T24744] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 520.107889][T24744] RBP: 00007f92e7080ca0 R08: 0000000000000000 R09: 0000000000000000 [ 520.107889][T24744] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f92e70816d4 [ 520.372622][T24778] device veth3719 entered promiscuous mode [ 520.107889][T24744] R13: 00000000004b1ac8 R14: 00000000006f83d8 R15: 0000000000000004 [ 520.380938][T24744] Mem-Info: [ 520.426092][T24781] device veth3721 entered promiscuous mode [ 520.431512][T24744] active_anon:80916 inactive_anon:252 isolated_anon:0 [ 520.431512][T24744] active_file:6739 inactive_file:19171 isolated_file:0 [ 520.431512][T24744] unevictable:768 dirty:197 writeback:0 unstable:0 [ 520.431512][T24744] slab_reclaimable:16157 slab_unreclaimable:120932 [ 520.431512][T24744] mapped:40695 shmem:1152 pagetables:839 bounce:0 [ 520.431512][T24744] free:41663 free_pcp:1023 free_cma:0 [ 520.499692][T24788] validate_nla: 2 callbacks suppressed [ 520.499698][T24788] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 520.511811][T24744] Node 0 active_anon:212120kB inactive_anon:900kB active_file:11292kB inactive_file:2048kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:13304kB dirty:24kB writeback:0kB shmem:2732kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 79872kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 520.513219][T24788] netlink: 'syz-executor.2': attribute type 6 has an invalid length. [ 520.537269][T24744] Node 1 active_anon:111344kB inactive_anon:408kB active_file:15964kB inactive_file:74736kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:149876kB dirty:764kB writeback:0kB shmem:1876kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 520.538667][T24788] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 520.547217][T24744] Node 0 DMA free:2596kB min:704kB low:880kB high:1056kB reserved_highatomic:2048KB active_anon:12896kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:16kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 520.547240][T24744] lowmem_reserve[]: 0 530 530 530 530 [ 520.547253][T24744] Node 0 DMA32 free:36264kB min:78216kB low:84232kB high:90248kB reserved_highatomic:2048KB active_anon:199224kB inactive_anon:900kB active_file:11292kB inactive_file:2048kB unevictable:1536kB writepending:24kB present:1032192kB managed:546140kB mlocked:0kB kernel_stack:7888kB pagetables:1604kB bounce:0kB free_pcp:496kB local_pcp:108kB free_cma:0kB [ 520.547280][T24744] lowmem_reserve[]: 0 0 0 0 0 [ 520.569604][T24784] FAULT_INJECTION: forcing a failure. [ 520.569604][T24784] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 520.578966][T24744] Node 1 DMA32 free:128276kB min:42808kB low:53508kB high:64208kB reserved_highatomic:0KB active_anon:111344kB inactive_anon:208kB active_file:15964kB inactive_file:75036kB unevictable:1536kB writepending:764kB present:1048436kB managed:965476kB mlocked:0kB kernel_stack:1228kB pagetables:1884kB bounce:0kB free_pcp:2752kB local_pcp:1292kB free_cma:0kB [ 520.578740][T24784] CPU: 3 PID: 24784 Comm: syz-executor.3 Not tainted 5.5.0-rc6-syzkaller #0 [ 520.578740][T24784] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 520.578740][T24784] Call Trace: [ 520.578740][T24784] dump_stack+0x197/0x210 [ 520.578740][T24784] should_fail.cold+0xa/0x15 [ 520.578740][T24784] ? fault_create_debugfs_attr+0x180/0x180 [ 520.578740][T24784] ? mark_lock+0xc2/0x1220 [ 520.578740][T24784] ? lock_downgrade+0x920/0x920 [ 520.578740][T24784] should_fail_alloc_page+0x50/0x60 [ 520.578740][T24784] __alloc_pages_nodemask+0x1a1/0x910 [ 520.578740][T24784] ? __alloc_pages_slowpath+0x2900/0x2900 [ 520.578740][T24784] ? __kasan_check_read+0x11/0x20 [ 520.578740][T24784] ? fault_create_debugfs_attr+0x180/0x180 [ 520.578740][T24784] cache_grow_begin+0x90/0xc60 [ 520.578740][T24784] ? tomoyo_realpath_from_path+0xc5/0x660 [ 520.578740][T24784] ? trace_hardirqs_off+0x62/0x240 [ 520.578740][T24784] __kmalloc+0x6b2/0x770 [ 520.578740][T24784] ? mark_held_locks+0xf0/0xf0 [ 520.578740][T24784] ? avc_has_perm+0x3fc/0x610 [ 520.578740][T24784] ? tomoyo_realpath_from_path+0xc5/0x660 [ 520.578740][T24784] tomoyo_realpath_from_path+0xc5/0x660 [ 520.578740][T24784] ? tomoyo_path_number_perm+0x193/0x520 [ 520.578740][T24784] tomoyo_path_number_perm+0x1dd/0x520 [ 520.578740][T24784] ? tomoyo_path_number_perm+0x193/0x520 [ 520.578740][T24784] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 520.578740][T24784] ? inode_has_perm+0x1b0/0x230 [ 520.578740][T24784] ? selinux_file_open+0x4e0/0x4e0 [ 520.578740][T24784] ? selinux_file_mprotect+0x620/0x620 [ 520.578740][T24784] ? __fget+0x37f/0x550 [ 520.578740][T24784] ? ksys_dup3+0x3e0/0x3e0 [ 520.578740][T24784] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 520.578740][T24784] ? fput_many+0x12c/0x1a0 [ 520.603862][T24744] lowmem_reserve[]: 0 0 0 0 0 [ 520.608912][T24784] tomoyo_file_ioctl+0x23/0x30 [ 520.608912][T24784] security_file_ioctl+0x77/0xc0 [ 520.608912][T24784] ksys_ioctl+0x57/0xd0 [ 520.608912][T24784] __x64_sys_ioctl+0x73/0xb0 [ 520.608912][T24784] do_syscall_64+0xfa/0x790 [ 520.608912][T24784] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 520.608912][T24784] RIP: 0033:0x45afd9 [ 520.608912][T24784] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 520.608912][T24784] RSP: 002b:00007fb889c8ac88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 520.608912][T24784] RAX: ffffffffffffffda RBX: 000000000072bf00 RCX: 000000000045afd9 [ 520.608912][T24784] RDX: 0000000020000100 RSI: 0000000000000001 RDI: 0000000000000004 [ 520.608912][T24784] RBP: 00007fb889c8aca0 R08: 0000000000000000 R09: 0000000000000000 [ 520.608912][T24784] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb889c8b6d4 [ 520.624236][T24744] Node 0 DMA: 1*4kB (H) 2*8kB (H) 3*16kB (UH) 3*32kB (UMH) 2*64kB (H) 2*128kB (MH) 2*256kB (MH) 1*512kB (H) 1*1024kB (M) 0*2048kB 0*4096kB = 2596kB [ 520.628977][T24784] R13: 00000000004a97d8 R14: 00000000006ecf90 R15: 0000000000000005 [ 522.851766][T24744] Node 0 DMA32: 1709*4kB (MEH) 1109*8kB (UMH) 424*16kB (UMEH) 157*32kB (M) 50*64kB (UME) 14*128kB (UM) 0*256kB 1*512kB (U) 1*1024kB (U) 1*2048kB (M) 0*4096kB = 36092kB [ 522.872439][T24744] Node 1 DMA32: 84*4kB (UM) 124*8kB (UM) 183*16kB (UME) 71*32kB (UME) 66*64kB (UM) 22*128kB (UME) 6*256kB (M) 8*512kB (UME) 6*1024kB (UME) 2*2048kB (UE) 24*4096kB (M) = 127744kB [ 522.902789][T24744] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 522.918921][T24744] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 522.936248][T24744] 27125 total pagecache pages [ 522.949043][T24744] 0 pages in swap cache [ 522.958548][T24744] Swap cache stats: add 0, delete 0, find 0/0 [ 522.973384][T24744] Free swap = 0kB [ 522.980179][T24744] Total swap = 0kB [ 522.989271][T24744] 524155 pages RAM [ 522.996912][T24744] 0 pages HighMem/MovableOnly [ 523.007654][T24744] 142274 pages reserved [ 523.017673][T24744] 0 pages cma reserved 06:40:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:32 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1356a}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:32 executing program 2 (fault-call:4 fault-nth:0): syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)) 06:40:32 executing program 3 (fault-call:4 fault-nth:2): syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)) [ 523.064924][T24806] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 523.073396][T24800] FAULT_INJECTION: forcing a failure. [ 523.073396][T24800] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 523.084729][T24803] FAULT_INJECTION: forcing a failure. [ 523.084729][T24803] name failslab, interval 1, probability 0, space 0, times 0 06:40:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="0a0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 523.089729][T24806] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 06:40:32 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1356b}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 523.090118][T24806] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="0f0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 523.089594][T24800] CPU: 1 PID: 24800 Comm: syz-executor.3 Not tainted 5.5.0-rc6-syzkaller #0 [ 523.089594][T24800] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 523.089594][T24800] Call Trace: [ 523.089594][T24800] dump_stack+0x197/0x210 [ 523.089594][T24800] should_fail.cold+0xa/0x15 [ 523.089594][T24800] ? __kasan_check_read+0x11/0x20 [ 523.089594][T24800] ? fault_create_debugfs_attr+0x180/0x180 [ 523.089594][T24800] ? __kasan_check_read+0x11/0x20 [ 523.089594][T24800] ? __lock_acquire+0x16f2/0x4a00 [ 523.089594][T24800] should_fail_alloc_page+0x50/0x60 [ 523.089594][T24800] __alloc_pages_nodemask+0x1a1/0x910 [ 523.089594][T24800] ? ____cache_alloc_node+0x160/0x1d0 [ 523.089594][T24800] ? __alloc_pages_slowpath+0x2900/0x2900 [ 523.089594][T24800] ? ____cache_alloc_node+0x160/0x1d0 [ 523.089594][T24800] ? lock_downgrade+0x920/0x920 [ 523.089594][T24800] cache_grow_begin+0x90/0xc60 [ 523.089594][T24800] ? do_raw_spin_unlock+0x181/0x270 06:40:33 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1356c}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 523.089594][T24800] ____cache_alloc_node+0x17a/0x1d0 [ 523.089594][T24800] ? trace_hardirqs_off+0x62/0x240 [ 523.089594][T24800] __kmalloc+0x220/0x770 [ 523.089594][T24800] ? mark_held_locks+0xf0/0xf0 [ 523.089594][T24800] ? avc_has_perm+0x3fc/0x610 [ 523.089594][T24800] ? tomoyo_realpath_from_path+0xc5/0x660 [ 523.089594][T24800] tomoyo_realpath_from_path+0xc5/0x660 [ 523.089594][T24800] ? tomoyo_path_number_perm+0x193/0x520 [ 523.089594][T24800] tomoyo_path_number_perm+0x1dd/0x520 [ 523.089594][T24800] ? tomoyo_path_number_perm+0x193/0x520 [ 523.111640][T24798] device veth3723 entered promiscuous mode [ 523.249970][T24815] device veth3725 entered promiscuous mode [ 523.218932][T24800] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 523.218932][T24800] ? inode_has_perm+0x1b0/0x230 [ 523.218932][T24800] ? selinux_file_open+0x4e0/0x4e0 [ 523.218932][T24800] ? selinux_file_mprotect+0x620/0x620 [ 523.218932][T24800] ? __fget+0x37f/0x550 [ 523.218932][T24800] ? ksys_dup3+0x3e0/0x3e0 [ 523.218932][T24800] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 523.218932][T24800] ? fput_many+0x12c/0x1a0 [ 523.305265][T24816] device veth3727 entered promiscuous mode [ 523.218932][T24800] tomoyo_file_ioctl+0x23/0x30 [ 523.218932][T24800] security_file_ioctl+0x77/0xc0 [ 523.218932][T24800] ksys_ioctl+0x57/0xd0 [ 523.218932][T24800] __x64_sys_ioctl+0x73/0xb0 [ 523.218932][T24800] do_syscall_64+0xfa/0x790 [ 523.218932][T24800] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 523.218932][T24800] RIP: 0033:0x45afd9 [ 523.218932][T24800] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 523.218932][T24800] RSP: 002b:00007fb889c8ac88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 523.218932][T24800] RAX: ffffffffffffffda RBX: 000000000072bf00 RCX: 000000000045afd9 [ 523.218932][T24800] RDX: 0000000020000100 RSI: 0000000000000001 RDI: 0000000000000004 [ 523.218932][T24800] RBP: 00007fb889c8aca0 R08: 0000000000000000 R09: 0000000000000000 [ 523.218932][T24800] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb889c8b6d4 [ 523.699000][T24800] R13: 00000000004a97d8 R14: 00000000006ecf90 R15: 0000000000000005 [ 523.838061][T24803] CPU: 0 PID: 24803 Comm: syz-executor.2 Not tainted 5.5.0-rc6-syzkaller #0 06:40:33 executing program 3 (fault-call:4 fault-nth:3): syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)) [ 523.839133][T24803] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 523.839133][T24803] Call Trace: [ 523.839133][T24803] dump_stack+0x197/0x210 [ 523.839133][T24803] should_fail.cold+0xa/0x15 [ 523.839133][T24803] ? fault_create_debugfs_attr+0x180/0x180 [ 523.839133][T24803] ? ___might_sleep+0x163/0x2c0 [ 523.839133][T24803] __should_failslab+0x121/0x190 [ 523.839133][T24803] should_failslab+0x9/0x14 [ 523.839133][T24803] __kmalloc+0x2e0/0x770 [ 523.839133][T24803] ? mark_held_locks+0xf0/0xf0 [ 523.839133][T24803] ? avc_has_perm+0x3fc/0x610 [ 523.839133][T24803] ? tomoyo_realpath_from_path+0xc5/0x660 [ 523.839133][T24803] tomoyo_realpath_from_path+0xc5/0x660 [ 523.839133][T24803] ? tomoyo_path_number_perm+0x193/0x520 [ 523.839133][T24803] tomoyo_path_number_perm+0x1dd/0x520 [ 523.839133][T24803] ? tomoyo_path_number_perm+0x193/0x520 [ 523.839133][T24803] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 523.839133][T24803] ? inode_has_perm+0x1b0/0x230 [ 523.839133][T24803] ? selinux_file_open+0x4e0/0x4e0 [ 523.839133][T24803] ? selinux_file_mprotect+0x620/0x620 [ 523.839133][T24803] ? __fget+0x37f/0x550 [ 523.839133][T24803] ? ksys_dup3+0x3e0/0x3e0 [ 523.839133][T24803] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 523.839133][T24803] ? fput_many+0x12c/0x1a0 [ 523.839133][T24803] tomoyo_file_ioctl+0x23/0x30 [ 523.839133][T24803] security_file_ioctl+0x77/0xc0 [ 523.839133][T24803] ksys_ioctl+0x57/0xd0 [ 523.839133][T24803] __x64_sys_ioctl+0x73/0xb0 [ 523.839133][T24803] do_syscall_64+0xfa/0x790 [ 523.839133][T24803] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 523.839133][T24803] RIP: 0033:0x45afd9 [ 523.839133][T24803] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 523.839133][T24803] RSP: 002b:00007f197e0a9c88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 523.839133][T24803] RAX: ffffffffffffffda RBX: 000000000072bf00 RCX: 000000000045afd9 [ 523.839133][T24803] RDX: 0000000020000100 RSI: 0000000000000001 RDI: 0000000000000004 [ 523.839133][T24803] RBP: 00007f197e0a9ca0 R08: 0000000000000000 R09: 0000000000000000 [ 523.839133][T24803] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f197e0aa6d4 [ 523.839133][T24803] R13: 00000000004a97d8 R14: 00000000006ecf90 R15: 0000000000000005 [ 524.265628][T24803] ERROR: Out of memory at tomoyo_realpath_from_path. 06:40:34 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)) 06:40:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="140000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 524.728660][T24826] FAULT_INJECTION: forcing a failure. [ 524.728660][T24826] name failslab, interval 1, probability 0, space 0, times 0 [ 524.752799][T24825] device veth3729 entered promiscuous mode [ 524.785613][T24834] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 524.793619][T24826] CPU: 1 PID: 24826 Comm: syz-executor.3 Not tainted 5.5.0-rc6-syzkaller #0 06:40:34 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x2, &(0x7f0000000100)) [ 524.798827][T24826] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 524.798827][T24826] Call Trace: 06:40:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="250000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 524.798827][T24826] dump_stack+0x197/0x210 [ 524.798827][T24826] should_fail.cold+0xa/0x15 06:40:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1356d}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 524.798827][T24826] ? fault_create_debugfs_attr+0x180/0x180 [ 524.798827][T24826] ? ___might_sleep+0x163/0x2c0 [ 524.798827][T24826] __should_failslab+0x121/0x190 [ 524.878217][T24837] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 524.798827][T24826] should_failslab+0x9/0x14 [ 524.798827][T24826] __kmalloc+0x2e0/0x770 [ 524.798827][T24826] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 524.798827][T24826] ? d_absolute_path+0x11b/0x170 [ 524.798827][T24826] ? __d_path+0x140/0x140 [ 524.798827][T24826] ? tomoyo_encode2.part.0+0xf5/0x400 [ 524.798827][T24826] tomoyo_encode2.part.0+0xf5/0x400 06:40:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="350000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 524.798827][T24826] tomoyo_encode+0x2b/0x50 [ 524.798827][T24826] tomoyo_realpath_from_path+0x19c/0x660 [ 524.798827][T24826] tomoyo_path_number_perm+0x1dd/0x520 [ 524.798827][T24826] ? tomoyo_path_number_perm+0x193/0x520 [ 524.798827][T24826] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 524.798827][T24826] ? inode_has_perm+0x1b0/0x230 [ 524.798827][T24826] ? selinux_file_open+0x4e0/0x4e0 [ 524.893547][T24837] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 524.798827][T24826] ? selinux_file_mprotect+0x620/0x620 [ 524.798827][T24826] ? __fget+0x37f/0x550 [ 524.798827][T24826] ? ksys_dup3+0x3e0/0x3e0 06:40:34 executing program 3 (fault-call:4 fault-nth:4): syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)) [ 524.798827][T24826] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 524.798827][T24826] ? fput_many+0x12c/0x1a0 [ 524.798827][T24826] tomoyo_file_ioctl+0x23/0x30 [ 524.798827][T24826] security_file_ioctl+0x77/0xc0 [ 524.798827][T24826] ksys_ioctl+0x57/0xd0 [ 524.798827][T24826] __x64_sys_ioctl+0x73/0xb0 [ 524.798827][T24826] do_syscall_64+0xfa/0x790 [ 524.798827][T24826] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 524.909546][T24837] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 524.798827][T24826] RIP: 0033:0x45afd9 [ 524.798827][T24826] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 524.798827][T24826] RSP: 002b:00007fb889c8ac88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 524.798827][T24826] RAX: ffffffffffffffda RBX: 000000000072bf00 RCX: 000000000045afd9 [ 524.798827][T24826] RDX: 0000000020000100 RSI: 0000000000000001 RDI: 0000000000000004 [ 524.798827][T24826] RBP: 00007fb889c8aca0 R08: 0000000000000000 R09: 0000000000000000 [ 524.798827][T24826] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb889c8b6d4 [ 524.798827][T24826] R13: 00000000004a97d8 R14: 00000000006ecf90 R15: 0000000000000005 [ 524.930189][T24826] ERROR: Out of memory at tomoyo_realpath_from_path. [ 525.022527][T24842] device veth3731 entered promiscuous mode 06:40:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1356e}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 525.248177][T24848] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 525.259496][T24848] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 525.270894][T24848] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 525.285609][T24848] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="5a0000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 525.358287][T24855] FAULT_INJECTION: forcing a failure. 06:40:35 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x3, &(0x7f0000000100)) [ 525.358287][T24855] name failslab, interval 1, probability 0, space 0, times 0 [ 525.381381][T24861] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 525.412307][T24855] CPU: 2 PID: 24855 Comm: syz-executor.3 Not tainted 5.5.0-rc6-syzkaller #0 [ 525.423027][T24857] device veth3733 entered promiscuous mode [ 525.445751][T24861] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 525.445416][T24855] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 525.445416][T24855] Call Trace: 06:40:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1356f}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 525.445416][T24855] dump_stack+0x197/0x210 06:40:35 executing program 3 (fault-call:4 fault-nth:5): syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)) [ 525.445416][T24855] should_fail.cold+0xa/0x15 [ 525.445416][T24855] ? fault_create_debugfs_attr+0x180/0x180 [ 525.445416][T24855] ? ___might_sleep+0x163/0x2c0 [ 525.445416][T24855] __should_failslab+0x121/0x190 [ 525.445416][T24855] should_failslab+0x9/0x14 [ 525.445416][T24855] __kmalloc+0x2e0/0x770 [ 525.445416][T24855] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 525.445416][T24855] ? d_absolute_path+0x11b/0x170 [ 525.445416][T24855] ? __d_path+0x140/0x140 [ 525.445416][T24855] ? tomoyo_encode2.part.0+0xf5/0x400 [ 525.445416][T24855] tomoyo_encode2.part.0+0xf5/0x400 [ 525.445416][T24855] tomoyo_encode+0x2b/0x50 [ 525.445416][T24855] tomoyo_realpath_from_path+0x19c/0x660 [ 525.445416][T24855] tomoyo_path_number_perm+0x1dd/0x520 [ 525.445416][T24855] ? tomoyo_path_number_perm+0x193/0x520 [ 525.445416][T24855] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 525.445416][T24855] ? inode_has_perm+0x1b0/0x230 [ 525.445416][T24855] ? selinux_file_open+0x4e0/0x4e0 [ 525.445416][T24855] ? selinux_file_mprotect+0x620/0x620 [ 525.489942][T24861] netlink: 42 bytes leftover after parsing attributes in process `syz-executor.0'. [ 525.475495][T24855] ? __fget+0x37f/0x550 [ 525.475495][T24855] ? ksys_dup3+0x3e0/0x3e0 [ 525.475495][T24855] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 525.475495][T24855] ? fput_many+0x12c/0x1a0 [ 525.475495][T24855] tomoyo_file_ioctl+0x23/0x30 [ 525.475495][T24855] security_file_ioctl+0x77/0xc0 [ 525.475495][T24855] ksys_ioctl+0x57/0xd0 [ 525.475495][T24855] __x64_sys_ioctl+0x73/0xb0 [ 525.475495][T24855] do_syscall_64+0xfa/0x790 [ 525.475495][T24855] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 525.475495][T24855] RIP: 0033:0x45afd9 [ 525.475495][T24855] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 525.475495][T24855] RSP: 002b:00007fb889c8ac88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 525.475495][T24855] RAX: ffffffffffffffda RBX: 000000000072bf00 RCX: 000000000045afd9 [ 525.475495][T24855] RDX: 0000000020000100 RSI: 0000000000000001 RDI: 0000000000000004 [ 525.475495][T24855] RBP: 00007fb889c8aca0 R08: 0000000000000000 R09: 0000000000000000 [ 525.475495][T24855] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb889c8b6d4 [ 525.475495][T24855] R13: 00000000004a97d8 R14: 00000000006ecf90 R15: 0000000000000005 [ 525.504841][T24855] ERROR: Out of memory at tomoyo_realpath_from_path. [ 525.541311][T24861] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="b30100001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 526.026773][T24868] device veth3735 entered promiscuous mode [ 526.064645][T24878] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:40:35 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x5, &(0x7f0000000100)) 06:40:35 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)) [ 526.099986][T24878] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 526.114559][T24878] netlink: 387 bytes leftover after parsing attributes in process `syz-executor.0'. [ 526.158142][T24872] device veth3737 entered promiscuous mode 06:40:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13570}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 526.160853][T24878] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="e03f03001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 526.327475][T24888] device veth3739 entered promiscuous mode 06:40:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13571}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 526.391155][T24896] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 526.419217][T24896] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 526.439144][T24896] netlink: 212912 bytes leftover after parsing attributes in process `syz-executor.0'. [ 526.463932][T24896] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:36 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x10, &(0x7f0000000100)) [ 526.506809][T24900] device veth3741 entered promiscuous mode 06:40:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000000f008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 526.559716][T24906] device veth3743 entered promiscuous mode 06:40:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0200001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x2, &(0x7f0000000100)) 06:40:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13572}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:36 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x44, &(0x7f0000000100)) [ 526.611682][T24916] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 526.625783][T24916] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 526.637275][T24916] netlink: 510 bytes leftover after parsing attributes in process `syz-executor.0'. [ 526.656837][T24916] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 526.675491][T24919] device veth3745 entered promiscuous mode 06:40:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0300001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 526.748416][T24922] device veth3747 entered promiscuous mode 06:40:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13573}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 526.796674][T24925] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 526.814998][T24925] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 06:40:36 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x707, &(0x7f0000000100)) [ 526.826068][T24925] netlink: 766 bytes leftover after parsing attributes in process `syz-executor.0'. 06:40:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x3, &(0x7f0000000100)) [ 526.849958][T24937] device veth3749 entered promiscuous mode [ 526.852284][T24925] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0400001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 526.904588][T24940] device veth3751 entered promiscuous mode 06:40:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13574}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 526.940295][T24949] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 526.951551][T24949] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 526.965314][T24949] netlink: 1022 bytes leftover after parsing attributes in process `syz-executor.0'. [ 526.983264][T24949] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0500001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:36 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x2288, &(0x7f0000000100)) [ 527.044594][T24958] netlink: 1278 bytes leftover after parsing attributes in process `syz-executor.0'. [ 527.058297][T24958] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0600001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 527.080516][T24954] device veth3753 entered promiscuous mode 06:40:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x5, &(0x7f0000000100)) 06:40:36 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x3b72, &(0x7f0000000100)) [ 527.146026][T24968] netlink: 1534 bytes leftover after parsing attributes in process `syz-executor.0'. 06:40:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13575}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 527.164381][T24968] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0700001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 527.231640][T24975] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0a00001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x6, &(0x7f0000000100)) [ 527.333090][T24987] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:37 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x4b47, &(0x7f0000000100)) [ 527.342919][T24981] device veth3755 entered promiscuous mode 06:40:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0e00001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13576}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 527.411900][T24999] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:37 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x4b49, &(0x7f0000000100)) 06:40:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0f00001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 527.454393][T24997] device veth3757 entered promiscuous mode 06:40:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x10, &(0x7f0000000100)) [ 527.497646][T25004] device veth3759 entered promiscuous mode 06:40:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13577}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 527.501868][T25007] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e4800001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 527.601165][T25011] device veth3761 entered promiscuous mode [ 527.602833][T25017] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:37 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x4b69, &(0x7f0000000100)) 06:40:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e4c00001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 527.670392][T25026] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 527.679228][T25022] device veth3763 entered promiscuous mode 06:40:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e6000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13578}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 527.733142][T25031] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e6800001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x44, &(0x7f0000000100)) [ 527.777609][T25034] device veth3765 entered promiscuous mode [ 527.788098][T25041] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e6c00001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 527.820735][T25042] device veth3767 entered promiscuous mode 06:40:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13579}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 527.854041][T25047] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:37 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x4c00, &(0x7f0000000100)) 06:40:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e7400001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 527.925851][T25053] device veth3769 entered promiscuous mode 06:40:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x600, &(0x7f0000000100)) [ 527.960237][T25063] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:37 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x4c01, &(0x7f0000000100)) 06:40:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e7a00001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 527.995281][T25057] device veth3771 entered promiscuous mode 06:40:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1357a}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 528.057499][T25070] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2ef000001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 528.146302][T25083] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 528.170603][T25081] device veth3773 entered promiscuous mode 06:40:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0003001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:38 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x4b47, &(0x7f0000000100)) [ 528.212926][T25089] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0005001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 528.248000][T25085] device veth3775 entered promiscuous mode 06:40:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1357b}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:38 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x530d, &(0x7f0000000100)) 06:40:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0006001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:38 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x4b49, &(0x7f0000000100)) [ 528.355401][T25101] device veth3777 entered promiscuous mode 06:40:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0007001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 528.437475][T25108] device veth3779 entered promiscuous mode 06:40:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e3b09001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1357c}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:38 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x541b, &(0x7f0000000100)) 06:40:38 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x4c00, &(0x7f0000000100)) 06:40:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e000a001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e000e001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 528.565176][T25124] device veth3781 entered promiscuous mode 06:40:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1357d}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:38 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x4c01, &(0x7f0000000100)) 06:40:38 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x541c, &(0x7f0000000100)) 06:40:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e000f001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 528.672953][T25141] device veth3783 entered promiscuous mode [ 528.719532][T25145] device veth3785 entered promiscuous mode 06:40:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1357e}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e093b001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:38 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x5421, &(0x7f0000000100)) [ 528.836840][T25159] device veth3787 entered promiscuous mode 06:40:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0040001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:38 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x5450, &(0x7f0000000100)) 06:40:38 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x5411, &(0x7f0000000100)) 06:40:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0048001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1357f}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e004c001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:38 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x5451, &(0x7f0000000100)) [ 529.005923][T25185] device veth3789 entered promiscuous mode 06:40:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13580}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:38 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x541b, &(0x7f0000000100)) 06:40:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0060001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:38 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x5452, &(0x7f0000000100)) [ 529.137773][T25199] device veth3791 entered promiscuous mode 06:40:38 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x5421, &(0x7f0000000100)) 06:40:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0068001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13581}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e006c001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 529.300706][T25219] device veth3793 entered promiscuous mode 06:40:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0074001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x5450, &(0x7f0000000100)) 06:40:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x5460, &(0x7f0000000100)) [ 529.385102][T25227] device veth3795 entered promiscuous mode 06:40:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e007a001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13582}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x5451, &(0x7f0000000100)) [ 529.476706][T25238] device veth3797 entered promiscuous mode [ 529.522860][T25241] device veth3799 entered promiscuous mode 06:40:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13583}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e00f0001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x560a, &(0x7f0000000100)) 06:40:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e00000035008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x5452, &(0x7f0000000100)) [ 529.665998][T25253] device veth3801 entered promiscuous mode 06:40:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13584}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000003f008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 529.809883][T25273] device veth3803 entered promiscuous mode 06:40:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x6364, &(0x7f0000000100)) 06:40:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e00000040008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x5460, &(0x7f0000000100)) 06:40:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13585}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000005a008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 529.992596][T25297] device veth3805 entered promiscuous mode 06:40:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x6364, &(0x7f0000000100)) 06:40:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0002001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000100)) [ 530.036789][T25306] __nla_validate_parse: 13 callbacks suppressed [ 530.036796][T25306] netlink: 131070 bytes leftover after parsing attributes in process `syz-executor.0'. [ 530.056425][T25304] device veth3807 entered promiscuous mode [ 530.060146][T25306] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13586}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0003001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 530.128626][T25310] device veth3809 entered promiscuous mode 06:40:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x8933, &(0x7f0000000100)) 06:40:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x8903, &(0x7f0000000100)) [ 530.183066][T25320] netlink: 196606 bytes leftover after parsing attributes in process `syz-executor.0'. [ 530.187368][T25318] device veth3811 entered promiscuous mode 06:40:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13587}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 530.198247][T25320] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0004001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:40 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x89e0, &(0x7f0000000100)) 06:40:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000100)) [ 530.407901][T25331] device veth3813 entered promiscuous mode 06:40:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0005001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 530.474271][T25341] device veth3815 entered promiscuous mode 06:40:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13588}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0006001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x8914, &(0x7f0000000100)) 06:40:40 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0xff00, &(0x7f0000000100)) 06:40:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0007001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 530.641530][T25355] device veth3817 entered promiscuous mode 06:40:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e000a001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 530.715771][T25371] device veth3819 entered promiscuous mode 06:40:40 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x400442c8, &(0x7f0000000100)) 06:40:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13589}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e000e001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x8933, &(0x7f0000000100)) [ 530.835036][T25385] device veth3821 entered promiscuous mode 06:40:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e000f001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1358a}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:40 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x400454ca, &(0x7f0000000100)) 06:40:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0048001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 530.975915][T25398] device veth3823 entered promiscuous mode 06:40:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e004c001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:40 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x40047451, &(0x7f0000000100)) 06:40:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x89e0, &(0x7f0000000100)) [ 531.079820][T25405] device veth3825 entered promiscuous mode 06:40:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1358b}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0060001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 531.230569][T25420] device veth3827 entered promiscuous mode 06:40:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0068001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:41 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0xff00, &(0x7f0000000100)) 06:40:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x40049409, &(0x7f0000000100)) [ 531.316435][T25430] device veth3829 entered promiscuous mode 06:40:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1358c}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e006c001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x40086602, &(0x7f0000000100)) 06:40:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0074001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e007a001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 531.564384][T25447] device veth3831 entered promiscuous mode 06:40:41 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x400454ca, &(0x7f0000000100)) 06:40:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x40087602, &(0x7f0000000100)) 06:40:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e00f0001d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 531.644373][T25465] device veth3833 entered promiscuous mode 06:40:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1358d}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000031d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000051d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 531.732546][T25469] device veth3835 entered promiscuous mode 06:40:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x4008af04, &(0x7f0000000100)) 06:40:41 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x40049409, &(0x7f0000000100)) 06:40:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1358e}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000061d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000071d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 531.869100][T25496] device veth3837 entered promiscuous mode 06:40:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x40104593, &(0x7f0000000100)) 06:40:41 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x4008240b, &(0x7f0000000100)) 06:40:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e003b091d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 531.923195][T25505] device veth3839 entered promiscuous mode 06:40:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1358f}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e00000a1d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x40186366, &(0x7f0000000100)) 06:40:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e00000e1d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:41 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x40086602, &(0x7f0000000100)) 06:40:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e00000f1d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 532.119821][T25522] device veth3841 entered promiscuous mode 06:40:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e00093b1d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x4020940d, &(0x7f0000000100)) [ 532.192880][T25535] device veth3843 entered promiscuous mode 06:40:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13590}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000401d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:42 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x40305828, &(0x7f0000000100)) 06:40:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x40087602, &(0x7f0000000100)) [ 532.332054][T25551] device veth3845 entered promiscuous mode 06:40:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000481d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 532.375707][T25559] device veth3847 entered promiscuous mode 06:40:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13591}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e00004c1d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:42 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x40305829, &(0x7f0000000100)) 06:40:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x40186366, &(0x7f0000000100)) [ 532.490419][T25568] device veth3849 entered promiscuous mode 06:40:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000601d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 532.542010][T25583] device veth3851 entered promiscuous mode 06:40:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13592}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:42 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x4030582a, &(0x7f0000000100)) 06:40:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000681d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x4020940d, &(0x7f0000000100)) 06:40:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e00006c1d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 532.649624][T25595] device veth3853 entered promiscuous mode [ 532.692036][T25601] device veth3855 entered promiscuous mode 06:40:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13593}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000741d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 532.783994][T25611] device veth3857 entered promiscuous mode 06:40:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e00007a1d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x40305828, &(0x7f0000000100)) 06:40:42 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x4030582b, &(0x7f0000000100)) 06:40:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000f01d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13594}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000000f008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:42 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x40305839, &(0x7f0000000100)) 06:40:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x40305829, &(0x7f0000000100)) 06:40:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000021d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 533.044227][T25635] device veth3859 entered promiscuous mode 06:40:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13595}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000031d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:43 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x8004500b, &(0x7f0000000100)) 06:40:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000041d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x4030582a, &(0x7f0000000100)) [ 533.283963][T25665] device veth3861 entered promiscuous mode 06:40:43 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x80045430, &(0x7f0000000100)) 06:40:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000051d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 533.362317][T25678] device veth3863 entered promiscuous mode 06:40:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13596}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:43 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x800454d2, &(0x7f0000000100)) 06:40:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x4030582b, &(0x7f0000000100)) 06:40:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000061d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 533.507393][T25689] device veth3865 entered promiscuous mode 06:40:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000071d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 533.557206][T25702] device veth3867 entered promiscuous mode 06:40:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e00000a1d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13597}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x40305839, &(0x7f0000000100)) 06:40:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e00000e1d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 533.662607][T25714] device veth3869 entered promiscuous mode 06:40:43 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x80086301, &(0x7f0000000100)) 06:40:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13598}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e00000f1d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x404c534a, &(0x7f0000000100)) 06:40:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000481d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 533.839568][T25735] device veth3871 entered promiscuous mode [ 533.888385][T25739] device veth3873 entered promiscuous mode 06:40:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13599}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e00004c1d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000601d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:43 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x80086601, &(0x7f0000000100)) 06:40:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x80045430, &(0x7f0000000100)) 06:40:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000681d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 534.026764][T25753] device veth3875 entered promiscuous mode 06:40:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1359a}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e00006c1d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 534.227767][T25770] device veth3877 entered promiscuous mode 06:40:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000741d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x800454d2, &(0x7f0000000100)) 06:40:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x80087601, &(0x7f0000000100)) 06:40:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e00007a1d008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 534.289492][T25782] device veth3879 entered promiscuous mode 06:40:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1359b}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e00000035008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x80404507, &(0x7f0000000100)) 06:40:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x8004745a, &(0x7f0000000100)) [ 534.396299][T25797] device veth3881 entered promiscuous mode 06:40:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000003f008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e00000040008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 534.470410][T25807] device veth3883 entered promiscuous mode 06:40:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1359c}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000005a008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000000f008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x80086301, &(0x7f0000000100)) 06:40:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x80685600, &(0x7f0000000100)) 06:40:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e00000035008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 534.652152][T25825] device veth3885 entered promiscuous mode 06:40:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000005a008151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 534.710619][T25836] device veth3887 entered promiscuous mode 06:40:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1359d}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d028151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x80086601, &(0x7f0000000100)) 06:40:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0xc0045878, &(0x7f0000000100)) 06:40:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d038151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 534.873372][T25857] device veth3889 entered promiscuous mode [ 534.932905][T25862] device veth3891 entered promiscuous mode 06:40:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3ffff}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d048151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0xc0045878, &(0x7f0000000100)) 06:40:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d058151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x80087601, &(0x7f0000000100)) [ 535.143324][T25869] device veth3893 entered promiscuous mode 06:40:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d068151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x8010500d, &(0x7f0000000100)) 06:40:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0xc008551a, &(0x7f0000000100)) 06:40:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d078151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d0a8151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xf0ffff}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d0e8151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0xc0189436, &(0x7f0000000100)) 06:40:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x80404525, &(0x7f0000000100)) 06:40:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d0f8151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 535.581541][T25924] device veth3899 entered promiscuous mode 06:40:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d488151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0xc020660b, &(0x7f0000000100)) 06:40:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1000000}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0xc0045878, &(0x7f0000000100)) 06:40:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d4c8151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2000000}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d608151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0xc0406618, &(0x7f0000000100)) 06:40:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3000000}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d688151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d6c8151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0xc0045878, &(0x7f0000000100)) 06:40:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d748151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r4}, 0x14) getsockname$packet(r2, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r1, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) setsockopt$packet_int(r1, 0x107, 0xd71b3e8e26b0337c, &(0x7f0000000000)=0x3c40, 0x4) fchdir(r0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r6, 0x1, &(0x7f0000000100)) 06:40:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d7a8151e00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4000000}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0xc018643a, &(0x7f0000000100)) 06:40:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d00815ae00f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 536.260179][T26004] validate_nla: 34 callbacks suppressed [ 536.260186][T26004] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 536.279319][T26004] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 536.291661][T26004] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0xc0189436, &(0x7f0000000100)) 06:40:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151030f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 536.401644][T26020] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:40:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5000000}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 536.426814][T26020] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 536.455842][T26020] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:46 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16, 0x9}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) io_uring_setup(0x340, &(0x7f0000000040)={0x0, 0x0, 0xa, 0x3, 0xbf}) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)) pread64(r1, &(0x7f0000000000)=""/14, 0xe, 0xff) 06:40:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151040f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0xc020660b, &(0x7f0000000100)) 06:40:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6000000}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 536.733829][T26051] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 536.759346][T26051] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 536.781698][T26051] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x7000000}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151050f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 536.851085][T26059] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:40:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0xc0345642, &(0x7f0000000100)) [ 536.872147][T26055] FAT-fs (loop2): invalid media value (0x02) [ 536.881320][T26059] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 536.922689][T26055] FAT-fs (loop2): Can't find a valid FAT filesystem [ 536.951582][T26059] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151060f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 537.091062][T26074] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:40:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8000000}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0xc0585611, &(0x7f0000000100)) [ 537.149723][T26074] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 537.190233][T26074] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:47 executing program 2: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x24, &(0x7f0000000280)=[{&(0x7f00000001c0)="15dbf1c0876d857866ad689abac6f1e0eb727cd9516a7870064020485629671cc5ad6de621de3851b05a7e584627b9ce7b719b91fe7f4566a7aadf32a63c8c85a4e507eaac0b4473f1bad08e67cfe3dfd9a691b683a2", 0xfd4e, 0x1a47be2f}], 0x4000, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='cpuset.cpu_exclusive\x00', 0x2, 0x0) fchdir(r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0xc0000) sendfile(r0, r3, &(0x7f0000000040)=0x401, 0x1) r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket(0x200000000000011, 0x3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r5, &(0x7f0000000240)={0x11, 0x0, r7}, 0x14) r8 = socket(0x200000000000011, 0x3, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r8, &(0x7f0000000240)={0x11, 0x0, r10}, 0x14) getsockname$packet(r8, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) getsockopt$inet_sctp6_SCTP_MAXSEG(r8, 0x84, 0xd, &(0x7f0000000580), &(0x7f00000005c0)=0x4) getsockname$packet(r5, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r4, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r11, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) r12 = socket$inet6_sctp(0xa, 0x1, 0x84) r13 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r13, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r12, 0x84, 0x75, &(0x7f0000000280)={r14}, &(0x7f00000002c0)=0x18) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f00000004c0)={r14, 0x2}, 0x8) ioctl(r2, 0x6, &(0x7f0000000180)="80ea31dfc0aeb0133540d3795bd3877744cc3b040d39043a0600000000000000") getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000400)={'nat\x00', 0x0, 0x3, 0xe0, [], 0x2, &(0x7f0000000140)=[{}, {}], &(0x7f0000000300)=""/224}, &(0x7f0000000240)=0x78) 06:40:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9000000}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:47 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0xc058565d, &(0x7f0000000100)) [ 537.263208][T26091] FAT-fs (loop2): bogus number of reserved sectors 06:40:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151070f80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 537.291784][T26091] FAT-fs (loop2): Can't find a valid FAT filesystem 06:40:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa000000}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 537.327092][T26101] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00280ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 537.393274][T26109] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:47 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0xc080661a, &(0x7f0000000100)) 06:40:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00380ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 537.490032][T26120] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 537.536316][T26091] FAT-fs (loop2): bogus number of reserved sectors [ 537.559466][T26091] FAT-fs (loop2): Can't find a valid FAT filesystem 06:40:47 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r0, 0x1, &(0x7f0000000100)) 06:40:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xb000000}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00480ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:47 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f0000000180)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") r3 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl(r3, 0x1, &(0x7f0000000100)) [ 537.815970][T26141] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:47 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) socket$pppl2tp(0x18, 0x1, 0x1) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) r4 = accept4$phonet_pipe(r1, 0x0, &(0x7f0000000000), 0x1000) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, &(0x7f0000000040)=ANY=[@ANYBLOB="704a7bbe9cf4d4e7adab"]) fchdir(r0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r5, 0x1, &(0x7f0000000100)) munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) 06:40:47 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) ioctl(r0, 0x1, &(0x7f0000000100)="ffe0f5") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000000)="2751ec0070e519ee8b9772a2b8eeb40de36277ebb0337a104e35adc7c957e0d22470482cc75fd7", &(0x7f0000000040)}, 0x20) syz_mount_image$cifs(&(0x7f0000000040)='cifs\x00', &(0x7f0000000180)='./file0/file0\x00', 0xc1e, 0x4, &(0x7f0000000380)=[{&(0x7f0000000580)="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", 0x1000, 0x5}, {&(0x7f0000001580)="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", 0x1000, 0x2}, {&(0x7f00000001c0)="c611d2934f40f461085274fb55ffeacb6087bfc447b77cff68f161818a55e7e8db7f02fbb84243b96f7669d9eb6e26bcc8c524e00f53ea0ab2b36f039eed09f0308996f8e657aa09235833416c58a80e480ee06d78d5fdcc7608a21a5c6bb0729b1ef1c447c7f14b0fb66cb31c1d38bdc694e371dd2390976051e1259612a9447b3380a988802a", 0x87, 0x7}, {&(0x7f0000000300)="c654e6a56ccf33aae64f8ebb4e03d2e72fa4c496f3238f96b60ccc09201cbc4bf1367749409da6597acef1f208d57765608eb224b77fe5c78dc8501c3893e464c8abbeb5d47f389eebbcd5cb15ee87c48bea96c41c0ba3189494ea8134e35c54", 0x60, 0x9}], 0x80, &(0x7f0000000280)='^') r1 = open(&(0x7f0000000100)='./file1\x00', 0x504000, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r4}, 0x14) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000080)) ioctl(r5, 0x1, &(0x7f0000000100)="ffe0f5") epoll_pwait(r5, &(0x7f0000000440)=[{}], 0x1, 0x5, &(0x7f0000000480)={0xf0}, 0x8) getsockname$packet(r2, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) r6 = socket(0x200000000000011, 0x3, 0x0) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r7, &(0x7f0000000240)={0x11, 0x0, r9}, 0x14) getsockname$packet(r7, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r6, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r10, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000400)={r10, 0x1, 0x6}, 0x10) fchdir(r1) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r11, 0x1, &(0x7f0000000100)) 06:40:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00580ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc000000}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 537.943551][T26154] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00680ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 538.024737][T26165] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00780ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xe000000}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 538.173375][T26177] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00880ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:48 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) ioctl$UDMABUF_CREATE(r1, 0x7040, 0x0) fchdir(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r2, 0x1, &(0x7f0000000100)) [ 538.290664][T26186] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:48 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10000000}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00980ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r1, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/ubi_ctrl\x00', 0x2, 0x0) r8 = socket$inet6_sctp(0xa, 0x1, 0x84) socket$inet(0x2, 0x80001, 0x84) r9 = socket(0x200000000000011, 0x3, 0x0) r10 = socket(0x200000000000011, 0x3, 0x0) r11 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r10, &(0x7f0000000240)={0x11, 0x0, r12}, 0x14) getsockname$packet(r10, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r9, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r13, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000180)=[@txtime={{0x18, 0x1, 0x3d, 0x1}}, @mark={{0x14, 0x1, 0x24, 0xffffffff}}], 0x30}}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r9, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0xfffffffffffffcf7) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000000080)={0x5}) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r8, 0x84, 0x75, &(0x7f0000000280)={r14}, &(0x7f00000002c0)=0x18) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r7, 0x84, 0x1, &(0x7f0000000840)={r14, 0x952, 0x100, 0x0, 0x1, 0x6e}, 0x14) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x75, &(0x7f0000000280)={r6}, &(0x7f00000002c0)=0x18) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000000)={0x1, 0x6, 0x1, 0x6, 0x5, 0x5, 0x101, 0xbbe, r6}, &(0x7f0000000040)=0x20) r15 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r15, 0x1, &(0x7f0000000100)) [ 538.444187][T26199] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:48 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x11000000}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00a80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 538.604033][T26214] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00b80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:48 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x12000000}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:48 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e008, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)) [ 538.731372][T26226] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00c80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 538.785042][T26235] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00d80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='io.stat\x00', 0x26e1, 0x0) r2 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc7af4a9e30c4793a, 0x0) setsockopt$inet6_tcp_buf(r6, 0x6, 0x1f, &(0x7f0000000200)="0a1da150edf1a5118a4d6d80a536f94cd85d14fb9f9e3125efaeae9aae4e39f0f89c0baf5bbbe7dc74b4377594ef9663daa5b998d674ba1d9b1b796519125dbb6a080dff7fc8942450c14d47de", 0x4d) writev(r5, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) ioctl$VIDIOC_PREPARE_BUF(r2, 0xc058565d, &(0x7f0000000180)={0x8, 0x9, 0x4, 0x204a0008, 0x4, {r3, r4/1000+10000}, {0x5, 0x8, 0x3f, 0x40, 0x7, 0x0, "f807f5c5"}, 0x7, 0x4, @planes=&(0x7f0000000080)={0x308e, 0x20, @userptr=0x3ff, 0xd4}, 0x7f, 0x0, r5}) ioctl(r1, 0x1, &(0x7f0000000100)) 06:40:48 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13000000}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 538.881716][T26246] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:48 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r1, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x0, 0x0, 0x6e1, r1, 0x0, &(0x7f0000000040)={0x980912, 0x8, [], @p_u16=&(0x7f0000000000)=0xff5f}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r2, 0x1, &(0x7f0000000100)) 06:40:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00e80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 539.510021][T26257] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:49 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x14000000}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e01080ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) [ 539.681560][T26271] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:49 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1c000000}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e01180ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16, 0x2d58}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) ioctl(r2, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$SCSI_IOCTL_TEST_UNIT_READY(r2, 0x2) ioctl(r1, 0x1, &(0x7f0000000140)="608831a8233200fbce11835146c7f6730c0285f9a0df92cf6b957d64c40886301e8d360c075d24b3d2b25263743d8524aa04d5082c1293e990f32248a15e16ca17b5f88b7b496f92916f7e66ca7c2eea11bec3e3b18fdd0105790fa36f5de50d6513d9cf8433c41b963c6691dad300c78a5a") 06:40:49 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', 0x101101, 0x200) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0)='nl80211\x00') r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket(0x200000000000011, 0x3, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r8, &(0x7f0000000240)={0x11, 0x0, r10}, 0x14) getsockname$packet(r8, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r7, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r11, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) r12 = socket(0x200000000000011, 0x3, 0x0) r13 = socket(0x200000000000011, 0x3, 0x0) r14 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r14, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r13, &(0x7f0000000240)={0x11, 0x0, r15}, 0x14) getsockname$packet(r13, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r12, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r16, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) sendmsg$NL80211_CMD_GET_MPATH(r5, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000428}, 0xc, &(0x7f0000000280)={&(0x7f0000000400)=ANY=[@ANYBLOB="0300975c3ccd00", @ANYRES16=r6, @ANYBLOB="04002cbd7000fedbdf251500000008000300", @ANYRES32=r11, @ANYBLOB="08000300", @ANYRESHEX=0x0, @ANYBLOB="08000100010000000a000600aaaaaaaaaaaa0000"], 0x7}, 0x1, 0x0, 0x0, 0x10}, 0x4044000) sendmmsg$sock(r0, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) ioctl$SIOCAX25GETINFO(r0, 0x89ed, &(0x7f0000000000)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r17 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r17) r18 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r18, 0x1, &(0x7f0000000100)) [ 539.776233][T26282] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e01280ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:49 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1f000000}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 539.840904][T26290] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e03580ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 539.894038][T26302] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:49 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20000000}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 539.917340][T26289] FAT-fs (loop2): bogus number of reserved sectors 06:40:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e05a80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 539.944372][T26289] FAT-fs (loop2): Can't find a valid FAT filesystem [ 539.987622][T26308] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e06980ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 540.103977][T26289] FAT-fs (loop2): bogus number of reserved sectors [ 540.116894][T26321] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 540.137168][T26289] FAT-fs (loop2): Can't find a valid FAT filesystem 06:40:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x319}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)) 06:40:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e07e80ecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:50 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x20000, 0x40) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r4}, 0x14) getsockname$packet(r2, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000300)="988d006bbf60dbee52ff3d3d1b286ec2", 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r6 = socket(0x200000000000011, 0x3, 0x0) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r7, &(0x7f0000000240)={0x11, 0x0, r9}, 0x14) getsockname$packet(r7, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r6, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r10, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0xa01000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=@ipv4_newaddr={0x80, 0x14, 0x0, 0x70bd2d, 0x25dfdbff, {0x2, 0x18, 0x4, 0x0, r10}, [@IFA_ADDRESS={0x8, 0x1, @loopback}, @IFA_LABEL={0x14, 0x3, 'hsr0\x00'}, @IFA_LABEL={0x14, 0x3, 'xfrm0\x00'}, @IFA_LABEL={0x14, 0x3, 'bond0\x00'}, @IFA_FLAGS={0x8, 0x8, 0x343}, @IFA_FLAGS={0x8, 0x8, 0x108}, @IFA_CACHEINFO={0x14, 0x6, {0x5, 0x4, 0x7, 0x20}}]}, 0x80}, 0x1, 0x0, 0x0, 0x440d4}, 0x20000010) ioctl(r5, 0x1, &(0x7f0000000100)) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r11, 0x40086602, &(0x7f0000000080)) ioctl(r11, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$VHOST_SET_VRING_ADDR(r11, 0x4028af11, &(0x7f0000000280)={0x1, 0x0, &(0x7f0000000180)=""/107, &(0x7f0000000200)=""/24, &(0x7f0000000240)=""/13, 0x5000}) 06:40:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3f000000}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 540.274838][T26332] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f0aecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 540.341362][T26340] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00facecdb4cb9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000000}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:50 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)) setsockopt$llc_int(r0, 0x10c, 0x4, &(0x7f0000000000)=0x9, 0x4) 06:40:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_extract_tcp_res(&(0x7f0000000080), 0xcff5, 0x3) fchdir(r0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x2a0080, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000000c0)={0x2, [0x0, 0x0]}) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) r2 = openat$cgroup_ro(r0, &(0x7f0000000180)='memory.stat\x00', 0x26e1, 0x0) ioctl(r2, 0x1, &(0x7f0000000100)) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000040)) [ 540.400907][T26348] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb5ab9047e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x48000000}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 540.554313][T26365] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9027e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x193, 0x252, &(0x7f0000000000), 0x10, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)) 06:40:50 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r1, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmmsg$sock(r0, &(0x7f0000002640)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x50}}], 0x18}}], 0x1, 0x0) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r5, 0x84, 0x75, &(0x7f0000000280)={r7}, &(0x7f00000002c0)=0x18) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000180)={r7, 0x7}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000200)=@assoc_value={r8, 0x59}, &(0x7f0000000240)=0x8) r9 = semget(0x1, 0x1, 0x10) semctl$GETVAL(r9, 0x0, 0xc, &(0x7f0000000000)=""/142) r10 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r10) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r11, 0x1, &(0x7f0000000100)) [ 540.624798][T26374] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9037e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4a000000}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 540.756733][T26380] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9057e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4c000000}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 540.877030][T26395] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9067e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x1c, r2, 0x100, 0x70bd26, 0x25dfdbfb, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0xc050) [ 540.979441][T26409] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:50 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r2, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) write$binfmt_elf64(r2, &(0x7f00000010c0)=ANY=[@ANYBLOB="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"/2825], 0xb00) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r3}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) r4 = socket$tipc(0x1e, 0x2, 0x0) recvfrom(r4, &(0x7f0000000400)=""/214, 0xd6, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000200)={0x0, @local, @broadcast}, &(0x7f0000000240)=0xc) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r6, 0x1, &(0x7f0000000100)) r7 = accept4(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)=0x80, 0xbfc68d5d65dc8870) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r8, 0x40086602, &(0x7f0000000080)) ioctl(r8, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$VHOST_GET_VRING_ENDIAN(r8, 0x4008af14, &(0x7f0000000280)={0x3, 0x1}) getsockopt$bt_BT_CHANNEL_POLICY(r7, 0x112, 0xa, &(0x7f0000000180)=0xc4a, &(0x7f00000001c0)=0x4) 06:40:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9077e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4e350100}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 06:40:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$ndctl0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ndctl0\x00', 0x80, 0x0) sendmsg$NFT_MSG_GETTABLE(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0x78, 0x1, 0xa, 0x20, 0x70bd26, 0x25dfdbfe, {0x2, 0x0, 0x4}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x1}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x2}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x78}, 0x1, 0x0, 0x0, 0x8000}, 0x20054080) fchdir(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r2, 0x1, &(0x7f0000000100)) [ 541.125451][T26423] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9127e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 541.186422][T26427] device veth3981 entered promiscuous mode [ 541.213000][T26437] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:40:51 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x4000, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fcntl$getflags(0xffffffffffffffff, 0x1) ioctl(r1, 0x1, &(0x7f0000000100)) 06:40:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9357e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 541.258425][T26438] device veth3983 entered promiscuous mode 06:40:51 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4f350100}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 541.328372][T26448] validate_nla: 60 callbacks suppressed [ 541.328615][T26448] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 541.357347][T26448] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 541.371763][T26448] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 541.402630][T26453] device veth3985 entered promiscuous mode 06:40:51 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$VIDIOC_G_SLICED_VBI_CAP(0xffffffffffffffff, 0xc0745645, &(0x7f0000000000)={0xb2, [0x0, 0x1, 0x7, 0x200, 0x80, 0x200, 0x9, 0x7, 0x99b, 0xe3, 0x1fc0, 0x155, 0x2958, 0x84, 0x7, 0x6, 0x2, 0x3, 0x1, 0x5, 0x40, 0x8, 0xffe1, 0x2, 0x400, 0x87, 0x4, 0x9, 0x5, 0x4, 0xff, 0x1, 0x4, 0x2, 0x1f, 0x6, 0x0, 0x3, 0x0, 0x8000, 0xbc, 0x100, 0x3, 0xff0c, 0x2ed, 0x18c6, 0x6, 0xffff]}) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000004}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0xc, 0x6, 0x727122a551c27d9d, 0x70bd25, 0x25dfdbfd, {0xc, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x80) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = syz_open_dev$I2C(&(0x7f0000000240)='/dev/i2c-#\x00', 0xec8, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r3, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) dup3(r2, r3, 0xc0000) ioctl(r1, 0x1, &(0x7f0000000100)) 06:40:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb95a7e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:51 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)) 06:40:51 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x50350100}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 542.076580][T26499] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 542.087675][T26499] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 542.100174][T26499] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 542.117261][T26500] device veth3987 entered promiscuous mode 06:40:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9697e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) [ 542.173172][T26512] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:40:51 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r2, &(0x7f0000000540)=[{&(0x7f0000000340)="3fe70f31d7c62056532d2986488d09", 0xf}], 0x1) read(r2, &(0x7f0000000000)=""/99, 0x63) [ 542.189177][T26512] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 06:40:52 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x9b, 0x105001) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000180)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x802, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r2, 0x8, &(0x7f00000003c0)="7fdf893675343a009ebad0e2da8799981f4fbbbbc17c69cba79d0a0d4ae377f6a936da49686ab7fdd86121c046c049353747f544660c73c5c45435cfed582891c289759c64d347bcc1bc5b02f2c17f5e83bdfcf8b5e80248d7324ad53d6c19d3e69d98db5e614c705a261d87fbaeda6dd3a49405a8c8cef1bfad1e4ccfbb3d3e7b3fb4fd24993a39f59c5bc509cff8b21f0c48a306b5afc787448805bb2efcc6bd1923c47b3080e6a563f00bdcbf458642b617dc33db42040955e0fd270a4be448ef9b52") [ 542.203264][T26512] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 542.217231][T26505] device veth3989 entered promiscuous mode 06:40:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb9e07e4865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x51350100}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 542.353243][T26528] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 542.369850][T26528] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 542.387333][T26523] device veth3991 entered promiscuous mode [ 542.394644][T26528] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 542.482176][T26531] device veth3993 entered promiscuous mode 06:40:52 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) ioctl(r1, 0x1, &(0x7f0000000100)="ffe0f5") ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000000)={0xfffffe00, 0x8, 0x4, 0x1010, 0x9, {}, {0x4, 0x0, 0x20, 0x1f, 0x7f, 0x2, "aa4ab70f"}, 0xfff, 0x3, @fd=r0, 0x5, 0x0, 0xffffffffffffffff}) getsockopt$CAN_RAW_LOOPBACK(r2, 0x65, 0x3, &(0x7f0000000080), &(0x7f0000000180)=0x4) fchdir(r0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl(r3, 0x1, &(0x7f0000000100)) 06:40:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001d008151e00f80ecdb4cb904024865160b00010040000060030000190e000600000000010000000153b4", 0x33fe0}], 0x1}, 0x0) 06:40:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400218) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x52350100}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 542.537157][T26538] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 542.551955][T26538] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 542.567129][T26538] ------------[ cut here ]------------ [ 542.574848][T26538] lockdep bfs error:-1 [ 542.575956][T26538] WARNING: CPU: 3 PID: 26538 at kernel/locking/lockdep.c:1696 print_bfs_bug+0x5c/0x80 [ 542.575956][T26538] Kernel panic - not syncing: panic_on_warn set ... [ 542.575956][T26538] CPU: 3 PID: 26538 Comm: syz-executor.0 Not tainted 5.5.0-rc6-syzkaller #0 [ 542.575956][T26538] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 542.575956][T26538] Call Trace: [ 542.575956][T26538] dump_stack+0x197/0x210 [ 542.575956][T26538] ? trace_event_raw_event_lock+0x290/0x2d0 [ 542.575956][T26538] panic+0x2e3/0x75c [ 542.575956][T26538] ? add_taint.cold+0x16/0x16 [ 542.575956][T26538] ? __kasan_check_write+0x14/0x20 [ 542.575956][T26538] ? __warn.cold+0x14/0x3e [ 542.575956][T26538] ? print_bfs_bug+0x5c/0x80 [ 542.575956][T26538] __warn.cold+0x2f/0x3e [ 542.575956][T26538] ? print_bfs_bug+0x5c/0x80 [ 542.575956][T26538] report_bug+0x289/0x300 [ 542.575956][T26538] do_error_trap+0x11b/0x200 [ 542.575956][T26538] do_invalid_op+0x37/0x50 [ 542.575956][T26538] ? print_bfs_bug+0x5c/0x80 [ 542.575956][T26538] invalid_op+0x23/0x30 [ 542.575956][T26538] RIP: 0010:print_bfs_bug+0x5c/0x80 [ 542.575956][T26538] Code: 08 00 74 2d 48 c7 c7 40 d2 61 8b e8 d2 5e 01 00 66 90 85 db 75 05 5b 41 5c 5d c3 44 89 e6 48 c7 c7 e0 80 2b 88 e8 83 a1 eb ff <0f> 0b 5b 41 5c 5d c3 0f 0b 48 c7 c7 50 36 93 89 e8 3f b1 58 00 eb [ 542.575956][T26538] RSP: 0018:ffffc9002810f138 EFLAGS: 00010086 [ 542.575956][T26538] RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000000 [ 542.575956][T26538] RDX: 0000000000006e8b RSI: ffffffff815e5396 RDI: fffff52005021e19 [ 542.575956][T26538] RBP: ffffc9002810f148 R08: ffff8880456d8240 R09: ffffed1005a645c9 [ 542.575956][T26538] R10: ffffed1005a645c8 R11: ffff88802d322e43 R12: 00000000ffffffff [ 542.575956][T26538] R13: ffff8880456d8ad8 R14: ffffc9002810f1c0 R15: 0000000000000198 [ 542.575956][T26538] ? vprintk_func+0x86/0x189 [ 542.575956][T26538] ? print_bfs_bug+0x5c/0x80 [ 542.575956][T26538] check_path+0x36/0x40 [ 542.575956][T26538] ? __kasan_check_read+0x11/0x20 [ 542.575956][T26538] check_noncircular+0x16d/0x3e0 [ 542.575956][T26538] ? print_circular_bug.isra.0+0x230/0x230 [ 542.575956][T26538] ? mark_held_locks+0xa4/0xf0 [ 542.575956][T26538] ? alloc_list_entry+0xc0/0xc0 [ 542.575956][T26538] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 542.575956][T26538] ? find_first_zero_bit+0x9a/0xc0 [ 542.575956][T26538] __lock_acquire+0x2596/0x4a00 [ 542.575956][T26538] ? mark_held_locks+0xf0/0xf0 [ 542.575956][T26538] lock_acquire+0x190/0x410 [ 542.575956][T26538] ? rtnl_lock+0x17/0x20 [ 542.575956][T26538] __mutex_lock+0x156/0x13c0 [ 542.575956][T26538] ? rtnl_lock+0x17/0x20 [ 542.575956][T26538] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 542.575956][T26538] ? rtnl_lock+0x17/0x20 [ 542.575956][T26538] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 542.575956][T26538] ? mutex_trylock+0x2d0/0x2d0 [ 542.575956][T26538] ? nla_memcpy+0xb0/0xb0 [ 542.575956][T26538] mutex_lock_nested+0x16/0x20 [ 542.575956][T26538] ? mutex_lock_nested+0x16/0x20 [ 542.575956][T26538] rtnl_lock+0x17/0x20 [ 542.575956][T26538] nl80211_pre_doit+0x3fb/0x650 [ 542.575956][T26538] ? __cfg80211_rdev_from_attrs+0x710/0x710 [ 542.575956][T26538] genl_rcv_msg+0x63e/0xea0 [ 542.575956][T26538] ? genl_family_rcv_msg_attrs_parse+0x300/0x300 [ 543.133149][T26538] ? kmem_cache_alloc_node_trace+0x398/0x750 [ 543.133149][T26538] ? find_held_lock+0x35/0x130 [ 543.133149][T26538] netlink_rcv_skb+0x177/0x450 [ 543.133149][T26538] ? genl_family_rcv_msg_attrs_parse+0x300/0x300 [ 543.133149][T26538] ? netlink_ack+0xb50/0xb50 [ 543.133149][T26538] ? __kasan_check_write+0x14/0x20 [ 543.133149][T26538] ? netlink_deliver_tap+0x24a/0xbe0 [ 543.133149][T26538] genl_rcv+0x29/0x40 [ 543.133149][T26538] netlink_unicast+0x58c/0x7d0 [ 543.133149][T26538] ? netlink_attachskb+0x870/0x870 [ 543.133149][T26538] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 543.133149][T26538] netlink_sendmsg+0x91c/0xea0 [ 543.133149][T26538] ? netlink_unicast+0x7d0/0x7d0 [ 543.133149][T26538] ? tomoyo_socket_sendmsg+0x26/0x30 [ 543.428246][T26538] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 543.428246][T26538] ? security_socket_sendmsg+0x8d/0xc0 [ 543.428246][T26538] ? netlink_unicast+0x7d0/0x7d0 [ 543.428246][T26538] sock_sendmsg+0xd7/0x130 [ 543.428246][T26538] ____sys_sendmsg+0x753/0x880 [ 543.428246][T26538] ? kernel_sendmsg+0x50/0x50 [ 543.428246][T26538] ? __fget+0x35d/0x550 [ 543.428246][T26538] ? find_held_lock+0x35/0x130 [ 543.428246][T26538] ___sys_sendmsg+0x100/0x170 [ 543.428246][T26538] ? sendmsg_copy_msghdr+0x70/0x70 [ 543.428246][T26538] ? __kasan_check_read+0x11/0x20 [ 543.428246][T26538] ? __fget+0x37f/0x550 [ 543.428246][T26538] ? ksys_dup3+0x3e0/0x3e0 [ 543.428246][T26538] ? __fget_light+0x1a9/0x230 [ 543.428246][T26538] ? __fdget+0x1b/0x20 [ 543.428246][T26538] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 543.428246][T26538] __sys_sendmsg+0x105/0x1d0 [ 543.428246][T26538] ? __sys_sendmsg_sock+0xc0/0xc0 [ 543.428246][T26538] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 543.428246][T26538] ? do_syscall_64+0x26/0x790 [ 543.428246][T26538] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 543.428246][T26538] ? do_syscall_64+0x26/0x790 [ 543.428246][T26538] __x64_sys_sendmsg+0x78/0xb0 [ 543.428246][T26538] do_syscall_64+0xfa/0x790 [ 543.428246][T26538] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 543.428246][T26538] RIP: 0033:0x45afd9 [ 543.428246][T26538] Code: bd b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b b1 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 543.428246][T26538] RSP: 002b:00007f92e7080c88 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 543.428246][T26538] RAX: ffffffffffffffda RBX: 000000000072bf00 RCX: 000000000045afd9 [ 543.428246][T26538] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 543.428246][T26538] RBP: 0000000000000003 R08: 0000000000000000 R09: 0000000000000000 [ 543.428246][T26538] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f92e70816d4 [ 543.428246][T26538] R13: 00000000004b1ac8 R14: 00000000006f83d8 R15: 00000000ffffffff [ 543.428246][T26538] Kernel Offset: disabled [ 543.428246][T26538] Rebooting in 86400 seconds..