fffffffffff) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) fchdir(0xffffffffffffffff) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c80, 0x0) 20:17:07 executing program 4: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe900, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0xdd41, 0x7ff}) 20:17:07 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000847f95), &(0x7f000089b000)}, 0x20) [ 322.923192][T11286] IPVS: ftp: loaded support on port[0] = 21 20:17:07 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) [ 323.095041][ T28] audit: type=1804 audit(1589833027.623:23): pid=11297 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir474628279/syzkaller.7YSLam/44/file0/bus" dev="sda1" ino=15907 res=1 [ 323.126227][T11299] IPVS: ftp: loaded support on port[0] = 21 [ 323.212934][ T28] audit: type=1804 audit(1589833027.693:24): pid=11331 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir474628279/syzkaller.7YSLam/44/file0/bus" dev="sda1" ino=15907 res=1 [ 323.249551][ T7] tipc: TX() has been purged, node left! 20:17:07 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) 20:17:07 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000180)={0xb, {'syz0\x00', 'syz0\x00', 'syz1\x00', 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, ','}}, 0x119) write$UHID_CREATE2(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB='\n'], 0x12e) [ 323.402751][ T28] audit: type=1804 audit(1589833027.693:25): pid=11307 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir474628279/syzkaller.7YSLam/44/file0/file0" dev="sda1" ino=15775 res=1 [ 323.461613][T11363] dns_resolver: Unsupported server list version (0) [ 323.520750][ T9908] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz0] on syz0 [ 323.537195][ T9908] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz0] on syz0 20:17:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:17:08 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) unshare(0x40020400) 20:17:08 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) fchdir(0xffffffffffffffff) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) 20:17:08 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[], 0x18}}], 0x1, 0x0) close(r0) 20:17:08 executing program 1: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x40020400) 20:17:08 executing program 4: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @random="00000a5b1f00", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @dest_unreach={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @multicast2}}}}}}, 0x0) [ 323.909158][T11399] IPVS: ftp: loaded support on port[0] = 21 [ 323.933902][T11403] IPVS: ftp: loaded support on port[0] = 21 [ 323.937002][T11401] IPVS: ftp: loaded support on port[0] = 21 [ 324.096855][T11403] IPVS: ftp: loaded support on port[0] = 21 [ 324.111580][T11417] IPVS: ftp: loaded support on port[0] = 21 20:17:10 executing program 3: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe900, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) 20:17:10 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000180)={0xb, {'syz1\x00', 'syz1\x00', 'syz0\x00', 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, ','}}, 0x119) write$UHID_CREATE2(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="0e"], 0x12e) 20:17:10 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) 20:17:10 executing program 5: syz_emit_ethernet(0x4a, &(0x7f00000000c0)={@broadcast, @random="00000a5b1f00", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @redirect={0x5, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, {0x7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @multicast1, {[@rr={0x7, 0x7, 0x0, [@initdev={0xac, 0x1e, 0x0, 0x0}]}]}}, "66081aad"}}}}}, 0x0) 20:17:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r1, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 20:17:10 executing program 5: prlimit64(0x0, 0x0, &(0x7f00000001c0)={0x81}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r2 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r2, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0x0) [ 325.628430][ T7] tipc: TX() has been purged, node left! [ 325.636977][ T9897] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [syz1] on syz1 [ 325.664982][ T12] hid-generic 0000:0000:0000.0005: hidraw0: HID v0.00 Device [syz1] on syz1 20:17:10 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe900, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x60025, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x60025, 0x0) 20:17:10 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB='/dev/nbd0'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='xfs\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) 20:17:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r1, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) [ 325.791052][ T7] tipc: TX() has been purged, node left! 20:17:10 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) socket(0x0, 0x80005, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) r1 = epoll_create1(0x0) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000280)={0x4000201d, 0x3f000002}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) [ 325.952316][ T7] tipc: TX() has been purged, node left! [ 325.962337][ T3442] block nbd0: Attempted send on invalid socket [ 325.969644][ T3442] blk_update_request: I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 325.984720][T11539] XFS (nbd0): SB validate failed with error -5. 20:17:10 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB='/dev/nbd0'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='xfs\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) 20:17:10 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x95b6) sendto$inet(r0, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) sendto(r0, &(0x7f0000000040)="b2", 0x1, 0x8055, 0x0, 0x0) 20:17:10 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec57087037958e271f60d25b7977f0283923dd29c034055b67dafe6c8dc3d5d78c01f78604fb318e2ec0efd49897a74a0091ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c21486619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1ed777148ba532e6ea09c346dfebd31a08b32808b80200000000000000334d83239dd27080e711327ef01fb6c86adac12233faa13e9f3022d4a5bbfb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227db6436303767d2e24f29e5dad9796ec5697a6ea0182babc18cae2ed4b4390af9a9ceafd07fd00b0000002cab154ad029a119ca3c97278087001460af81c5f4adaddd1410e80207c14140c427dc16e8b00d5ee4e5e3ae703f8ea4c3dab45f912191f9df3d7c0cf0ea4f31d062d3d6e1d09f0679c9fb55010840331c9825f9386cb5c8f7e49348d27d915b8e9349b17f7aab0d75690d78d5f14805e127ca2aa3beea073a77127fbe389324001aaae7efad93aa48d33a01e41fb317227369a10fd7bfa641635e8077e71db299396591fb8197e4e84aa17ae2f75f4c49b552748a54d1ef8ee18449a2dbf3c778e86cc74307267206abb801426c3e956d42014a0bd51815e17b489de1461f3d79b87c3ac774f9bb79d88a089cddf2155073000000000000003dd380a1af2486d6ccf4918a47312c80810223f4586f29b0d012620e7e847daa3a0eebea812c70a0a1111a62ef04723649a40e134a70c0873643e4a6632d605e450d36ee321e02c6c1d5511c35f6652bae1b3512ac48c8479966ca333a3bbc3f20b693848458f8fe20a6f3263b4b1f96f08aa3b4c92fa4fa9f0569c0ec8395f95187e72a9e700352a3d46462ef3eb5beb7aec0b09f45b2f0ac6b494a822e0096dc6ee996b7f66eaa0922004bbc865214a3e921408d6b3f6d000aa7955729ac9098e28d733b9300000000000000000000000000000000000000000081f3d6e5cdaa8694f004cc890bcf"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x15, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f065581fffffff000040", 0x0, 0x102, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x2b, 'io'}, {0x2d, 'pids'}, {0x2d, 'memory'}, {0x2d, 'memory'}, {0x0, 'rdma'}, {0x2b, 'io'}]}, 0x24) [ 326.229754][ T3442] block nbd0: Attempted send on invalid socket [ 326.235994][ T3442] blk_update_request: I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 326.247952][T11557] XFS (nbd0): SB validate failed with error -5. 20:17:10 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) socket(0x15, 0x80005, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 20:17:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r3, 0x2}}, 0x18) 20:17:11 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xd) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) 20:17:11 executing program 1: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x16, 0x0, r0) 20:17:11 executing program 5: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[], 0x4}, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x37cb1133) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x77}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 20:17:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:11 executing program 3: sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0x0) 20:17:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r1, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 20:17:11 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000000200)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x0, 0x0) 20:17:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:11 executing program 3: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) [ 326.987424][ T28] audit: type=1800 audit(1589833031.513:26): pid=11619 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=15932 res=0 20:17:11 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) membarrier(0x0, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') 20:17:11 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "62ee464cfe770fe32db5e2ccafc88560d1de5db8", "953398bddc7100"}) 20:17:11 executing program 3: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) [ 327.048912][T11619] UBIFS error (pid: 11619): cannot open "/dev/nbd2", error -22 [ 327.298671][T11632] IPVS: ftp: loaded support on port[0] = 21 20:17:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) [ 327.409528][T11633] IPVS: ftp: loaded support on port[0] = 21 20:17:12 executing program 3: r0 = socket$kcm(0x10, 0x800000000000, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) personality(0x1bb2baf3005ac137) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) write$uinput_user_dev(r4, &(0x7f00000001c0)={'syz0\x00', {0x0, 0x0, 0xffff}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b08], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4202]}, 0x45c) ioctl$BINDER_GET_NODE_DEBUG_INFO(r4, 0x5101, 0x0) dup2(r3, r4) ioctl$PPPIOCGMRU(r4, 0x80047453, &(0x7f0000000000)) [ 328.518351][ T7] tipc: TX() has been purged, node left! [ 328.630859][ T7] tipc: TX() has been purged, node left! [ 328.788188][ T7] tipc: TX() has been purged, node left! 20:17:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:14 executing program 5: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000001440)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)='F', 0x1, r1) 20:17:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x4000000, 0x2000402) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0x0, r3}) 20:17:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:17:14 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='net/udp6\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r1) r2 = memfd_create(&(0x7f0000000780)='\x8e', 0x0) write(r2, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r2, 0x0) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000000040)='./control\x00', 0xa4000960) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 20:17:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) [ 329.671684][T11715] dns_resolver: Unsupported server list version (0) [ 329.799396][T11715] dns_resolver: Unsupported server list version (0) 20:17:14 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) socket(0x15, 0x80005, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) r1 = epoll_create1(0x0) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000280)={0x4000201d, 0x3f000002}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) 20:17:14 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x141142, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[], 0xc6) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) truncate(&(0x7f0000000180)='./bus\x00', 0x0) 20:17:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x4000000, 0x2000402) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0x0, r3}) 20:17:14 executing program 2: socket$inet6(0xa, 0x2, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0x0) 20:17:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:14 executing program 5: 20:17:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="7e493c78124dac9d6f446e9cf5ef247c2cffb18fd3023247a7da1ca797f6ce82861faeedc8b2c6567fdb6fb9b215d428da9d75e3fba9c1f4ffd006b4b02a47f3e70ecd0c8f8ecad898ab4390ad0b540cd4be5e01d2fd71a8b4271ff634f9276550f5aa337e39bdcbeb0bafbd58e0a0a7adba1ae1f31f59e33165834362786f35973e68a0aada5361ac171fc3b85835b6a3f53e1bd4cfcc6e0fc0c438d6dcc113bc633741ee493816eb92be1621abf6555e39bc514f219d1017624edf04ee05823bda4c3149998f820bbabe86d9ef11bc9577d0a355638403b0cf246699b58a445e3a078542b1a2be262e5f5bd64c16fcfc2d8303040b297ea2a3271e4c42d272fe5c26532d93292c5277890dda520bf0cfc9b622d22ced5f7f306fd88e0ca2234b7dc44a4cd09c395e6b60ac8c528b8c8b19d6c5af04381567aff2ce0610580d752a645dab69d0ab852e566997cf5f266d27888aba21b41e896d249bd8d55e7086e48a5eb8884c89904cb7b6d5ff16a141a01dbfd403463075b756ae26cedd25a8247934bf1c3fe8a95cc583d0a03b15f72e44434f65a5a401dcd3e5779920d7901f39a5a482cf871e56a700ebda75e939caf5f872c1313608368feb8db00c7397068d46777d73807405576ff753a006d73f5222097a6013f757d63a049d10b33226f852fb839572e5adcd21ee294d73df8e15ddc26316318e3157af17826e89c3e371fd78de2326e502b850861e8de0e5325fe6cff6da965e2132916952cc2dd049443830bd72710794304625da015c50b134e897ff81938034377d373850a007d7412459bd6ac2de181bde7df45348514a32202bf807635bdf128de2849bde6faaa09bd766bf2362f7091a8bfc528a6f37735d9e9d6fa8b910a372ada3819cc0ef8ee5719b59c50ce57008c4fbf6b8c31e0775dd81103eb8af1075ad17942323c53bd4d2193e3e50456c80f1cca6f596ef210ca3162b84af3e4ddbfa133fc6dee4fd7331308c1c41b8f3", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:14 executing program 3: 20:17:14 executing program 2: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x16, r0, r1) 20:17:15 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) unshare(0x40040400) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x20) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0}}, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000400)={0x0, 0x79}}, 0x0) write$FUSE_STATFS(0xffffffffffffffff, 0x0, 0x0) [ 330.661399][T11758] IPVS: ftp: loaded support on port[0] = 21 [ 330.707874][T11716] kvm_set_msr_common: 209 callbacks suppressed [ 330.707900][T11716] kvm [11709]: vcpu0, guest rIP: 0xcc ignored wrmsr: 0x11e data 0xbe702110 [ 330.725792][T11716] kvm [11709]: vcpu0, guest rIP: 0xcc ignored wrmsr: 0x11e data 0xbe702110 [ 330.736658][T11716] kvm [11709]: vcpu0, guest rIP: 0xcc ignored wrmsr: 0x11e data 0xbe702110 [ 330.747386][T11716] kvm [11709]: vcpu0, guest rIP: 0xcc ignored wrmsr: 0x11e data 0xbe702110 [ 330.767739][T11716] kvm [11709]: vcpu0, guest rIP: 0xcc ignored wrmsr: 0x11e data 0xbe702110 [ 330.779268][T11716] kvm [11709]: vcpu0, guest rIP: 0xcc ignored wrmsr: 0x11e data 0xbe702110 [ 330.791791][T11716] kvm [11709]: vcpu0, guest rIP: 0xcc ignored wrmsr: 0x11e data 0xbe702110 [ 330.802748][T11716] kvm [11709]: vcpu0, guest rIP: 0xcc ignored wrmsr: 0x11e data 0xbe702110 [ 330.815234][T11765] IPVS: ftp: loaded support on port[0] = 21 [ 330.827469][T11716] kvm [11709]: vcpu0, guest rIP: 0xcc ignored wrmsr: 0x11e data 0xbe702110 [ 330.838730][T11716] kvm [11709]: vcpu0, guest rIP: 0xcc ignored wrmsr: 0x11e data 0xbe702110 20:17:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:17:15 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000280)=ANY=[@ANYBLOB='/dev/nbd0'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='xfs\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:17:15 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 20:17:15 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:15 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) socket(0x15, 0x80005, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) r1 = epoll_create1(0x0) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000280)={0x4000201d, 0x3f000002}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) 20:17:15 executing program 2: [ 331.254170][ T3441] block nbd0: Attempted send on invalid socket [ 331.260525][ T3441] blk_update_request: I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 331.272812][T11813] XFS (nbd0): SB validate failed with error -5. [ 331.288468][ T7] tipc: TX() has been purged, node left! 20:17:15 executing program 2: 20:17:15 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="7e493c78124dac9d6f446e9cf5ef247c2cffb18fd3023247a7da1ca797f6ce82861faeedc8b2c6567fdb6fb9b215d428da9d75e3fba9c1f4ffd006b4b02a47f3e70ecd0c8f8ecad898ab4390ad0b540cd4be5e01d2fd71a8b4271ff634f9276550f5aa337e39bdcbeb0bafbd58e0a0a7adba1ae1f31f59e33165834362786f35973e68a0aada5361ac171fc3b85835b6a3f53e1bd4cfcc6e0fc0c438d6dcc113bc633741ee493816eb92be1621abf6555e39bc514f219d1017624edf04ee05823bda4c3149998f820bbabe86d9ef11bc9577d0a355638403b0cf246699b58a445e3a078542b1a2be262e5f5bd64c16fcfc2d8303040b297ea2a3271e4c42d272fe5c26532d93292c5277890dda520bf0cfc9b622d22ced5f7f306fd88e0ca2234b7dc44a4cd09c395e6b60ac8c528b8c8b19d6c5af04381567aff2ce0610580d752a645dab69d0ab852e566997cf5f266d27888aba21b41e896d249bd8d55e7086e48a5eb8884c89904cb7b6d5ff16a141a01dbfd403463075b756ae26cedd25a8247934bf1c3fe8a95cc583d0a03b15f72e44434f65a5a401dcd3e5779920d7901f39a5a482cf871e56a700ebda75e939caf5f872c1313608368feb8db00c7397068d46777d73807405576ff753a006d73f5222097a6013f757d63a049d10b33226f852fb839572e5adcd21ee294d73df8e15ddc26316318e3157af17826e89c3e371fd78de2326e502b850861e8de0e5325fe6cff6da965e2132916952cc2dd049443830bd72710794304625da015c50b134e897ff81938034377d373850a007d7412459bd6ac2de181bde7df45348514a32202bf807635bdf128de2849bde6faaa09bd766bf2362f7091a8bfc528a6f37735d9e9d6fa8b910a372ada3819cc0ef8ee5719b59c50ce57008c4fbf6b8c31e0775dd81103eb8af1075ad17942323c53bd4d2193e3e50456c80f1cca6f596ef210ca3162b84af3e4ddbfa133fc6dee4fd7331308c1c41b8f3", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) [ 331.336132][ T3441] block nbd0: Attempted send on invalid socket [ 331.342596][ T3441] blk_update_request: I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 331.357372][T11832] XFS (nbd0): SB validate failed with error -5. 20:17:16 executing program 3: [ 331.441302][ T7] tipc: TX() has been purged, node left! 20:17:16 executing program 5: 20:17:16 executing program 2: 20:17:16 executing program 3: 20:17:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:17:16 executing program 5: 20:17:16 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:16 executing program 2: 20:17:16 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) socket(0x15, 0x80005, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) r1 = epoll_create1(0x0) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000280)={0x4000201d, 0x3f000002}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) 20:17:16 executing program 3: 20:17:16 executing program 2: 20:17:16 executing program 5: 20:17:16 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:16 executing program 3: 20:17:16 executing program 2: 20:17:16 executing program 2: 20:17:17 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:17 executing program 5: 20:17:17 executing program 2: 20:17:17 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fchdir(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:17 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) socket(0x15, 0x80005, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) r1 = epoll_create1(0x0) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000280)={0x4000201d, 0x3f000002}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) 20:17:17 executing program 3: 20:17:17 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:17 executing program 3: 20:17:17 executing program 5: 20:17:17 executing program 2: 20:17:17 executing program 2: 20:17:17 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fchdir(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:17 executing program 3: 20:17:17 executing program 5: 20:17:17 executing program 4: 20:17:17 executing program 2: 20:17:17 executing program 5: 20:17:17 executing program 3: 20:17:17 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:17 executing program 2: 20:17:17 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fchdir(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:17 executing program 4: 20:17:17 executing program 5: 20:17:17 executing program 3: 20:17:17 executing program 2: 20:17:18 executing program 4: 20:17:18 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="7e493c78124dac9d6f446e9cf5ef247c2cffb18fd3023247a7da1ca797f6ce82861faeedc8b2c6567fdb6fb9b215d428da9d75e3fba9c1f4ffd006b4b02a47f3e70ecd0c8f8ecad898ab4390ad0b540cd4be5e01d2fd71a8b4271ff634f9276550f5aa337e39bdcbeb0bafbd58e0a0a7adba1ae1f31f59e33165834362786f35973e68a0aada5361ac171fc3b85835b6a3f53e1bd4cfcc6e0fc0c438d6dcc113bc633741ee493816eb92be1621abf6555e39bc514f219d1017624edf04ee05823bda4c3149998f820bbabe86d9ef11bc9577d0a355638403b0cf246699b58a445e3a078542b1a2be262e5f5bd64c16fcfc2d8303040b297ea2a3271e4c42d272fe5c26532d93292c5277890dda520bf0cfc9b622d22ced5f7f306fd88e0ca2234b7dc44a4cd09c395e6b60ac8c528b8c8b19d6c5af04381567aff2ce0610580d752a645dab69d0ab852e566997cf5f266d27888aba21b41e896d249bd8d55e7086e48a5eb8884c89904cb7b6d5ff16a141a01dbfd403463075b756ae26cedd25a8247934bf1c3fe8a95cc583d0a03b15f72e44434f65a5a401dcd3e5779920d7901f39a5a482cf871e56a700ebda75e939caf5f872c1313608368feb8db00c7397068d46777d73807405576ff753a006d73f5222097a6013f757d63a049d10b33226f852fb839572e5adcd21ee294d73df8e15ddc26316318e3157af17826e89c3e371fd78de2326e502b850861e8de0e5325fe6cff6da965e2132916952cc2dd049443830bd72710794304625da015c50b134e897ff81938034377d373850a007d7412459bd6ac2de181bde7df45348514a32202bf807635bdf128de2849bde6faaa09bd766bf2362f7091a8bfc528a6f37735d9e9d6fa8b910a372ada3819cc0ef8ee5719b59c50ce57008c4fbf6b8c31e0775dd81103eb8af1075ad17942323c53bd4d2193e3e50456c80f1cca6f596ef210ca3162b84af3e4ddbfa133fc6dee4fd7331308c1c41b8f3", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:18 executing program 2: 20:17:18 executing program 4: 20:17:18 executing program 3: 20:17:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:18 executing program 5: 20:17:18 executing program 2: 20:17:18 executing program 3: 20:17:18 executing program 2: 20:17:18 executing program 4: 20:17:18 executing program 3: 20:17:18 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:18 executing program 2: 20:17:18 executing program 5: 20:17:18 executing program 4: 20:17:18 executing program 2: 20:17:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:18 executing program 3: 20:17:18 executing program 5: 20:17:18 executing program 3: 20:17:18 executing program 2: 20:17:18 executing program 5: 20:17:18 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="7e493c78124dac9d6f446e9cf5ef247c2cffb18fd3023247a7da1ca797f6ce82861faeedc8b2c6567fdb6fb9b215d428da9d75e3fba9c1f4ffd006b4b02a47f3e70ecd0c8f8ecad898ab4390ad0b540cd4be5e01d2fd71a8b4271ff634f9276550f5aa337e39bdcbeb0bafbd58e0a0a7adba1ae1f31f59e33165834362786f35973e68a0aada5361ac171fc3b85835b6a3f53e1bd4cfcc6e0fc0c438d6dcc113bc633741ee493816eb92be1621abf6555e39bc514f219d1017624edf04ee05823bda4c3149998f820bbabe86d9ef11bc9577d0a355638403b0cf246699b58a445e3a078542b1a2be262e5f5bd64c16fcfc2d8303040b297ea2a3271e4c42d272fe5c26532d93292c5277890dda520bf0cfc9b622d22ced5f7f306fd88e0ca2234b7dc44a4cd09c395e6b60ac8c528b8c8b19d6c5af04381567aff2ce0610580d752a645dab69d0ab852e566997cf5f266d27888aba21b41e896d249bd8d55e7086e48a5eb8884c89904cb7b6d5ff16a141a01dbfd403463075b756ae26cedd25a8247934bf1c3fe8a95cc583d0a03b15f72e44434f65a5a401dcd3e5779920d7901f39a5a482cf871e56a700ebda75e939caf5f872c1313608368feb8db00c7397068d46777d73807405576ff753a006d73f5222097a6013f757d63a049d10b33226f852fb839572e5adcd21ee294d73df8e15ddc26316318e3157af17826e89c3e371fd78de2326e502b850861e8de0e5325fe6cff6da965e2132916952cc2dd049443830bd72710794304625da015c50b134e897ff81938034377d373850a007d7412459bd6ac2de181bde7df45348514a32202bf807635bdf128de2849bde6faaa09bd766bf2362f7091a8bfc528a6f37735d9e9d6fa8b910a372ada3819cc0ef8ee5719b59c50ce57008c4fbf6b8c31e0775dd81103eb8af1075ad17942323c53bd4d2193e3e50456c80f1cca6f596ef210ca3162b84af3e4ddbfa133fc6dee4fd7331308c1c41b8f3", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:18 executing program 4: 20:17:18 executing program 3: 20:17:18 executing program 5: 20:17:18 executing program 2: socket$inet6(0xa, 0x80002, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet6(0xa, 0x2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) socket$inet(0x2, 0xa, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7, 0x34}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 20:17:19 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="8e0ee8679b7229f69b3346", 0x2000000b}], 0x1) 20:17:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x13c, &(0x7f0000000340)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x33) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 20:17:19 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) recvmmsg(r0, &(0x7f0000004940)=[{{0x0, 0x0, &(0x7f0000004b00)=[{&(0x7f00000002c0)=""/182, 0xb6}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 20:17:19 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) write$P9_RWSTAT(r1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:19 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:19 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000095c0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001080)=""/169, 0xa9}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/snmp\x00') preadv(r0, &(0x7f0000000500), 0x37d, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) syz_genetlink_get_family_id$nl80211(0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x11000000, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0xf0}, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, 0x0, 0x0) 20:17:19 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:19 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) write$P9_RWSTAT(r1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:19 executing program 4: r0 = creat(&(0x7f0000000180)='./file1\x00', 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000000)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) getpeername$packet(r0, &(0x7f00000000c0), &(0x7f0000000100)=0x14) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r4, @ANYBLOB="000000000400000008000a00", @ANYRES32=r6], 0x28}}, 0x0) [ 335.158396][T12014] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:17:19 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:19 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) write$P9_RWSTAT(r1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) [ 335.391893][T12026] device bridge_slave_0 left promiscuous mode [ 335.392114][T12026] bridge0: port 1(bridge_slave_0) entered disabled state 20:17:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x129, &(0x7f0000000340)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x33) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 20:17:20 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:20 executing program 4: creat(&(0x7f0000000180)='./file1\x00', 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x14) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r6, @ANYBLOB="ddffffffffffffff140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r3, @ANYBLOB="000000000400000008000a00", @ANYRES32=r6], 0x28}}, 0x0) 20:17:20 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) write$P9_RWSTAT(r1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:20 executing program 5: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0x8, &(0x7f0000000000)=0x7, 0x4) recvmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) connect$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000004d80), 0x0, 0x0) 20:17:20 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) [ 335.791519][T12045] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 335.854767][T12045] device bridge1 entered promiscuous mode [ 335.862914][T12055] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 335.887136][T12050] bridge1: port 1(bridge_slave_0) entered blocking state [ 335.895614][T12050] bridge1: port 1(bridge_slave_0) entered disabled state [ 335.933582][T12050] device bridge_slave_0 entered promiscuous mode [ 335.962244][T12050] bridge1: port 1(bridge_slave_0) entered blocking state [ 335.969369][T12050] bridge1: port 1(bridge_slave_0) entered forwarding state [ 335.998728][T12045] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 20:17:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x128, &(0x7f0000000340)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x33) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 20:17:20 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:20 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) write$P9_RWSTAT(r1, 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x7ffff000) 20:17:20 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$FUSE_LSEEK(r1, &(0x7f0000000080)={0x18}, 0x18) 20:17:20 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:20 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) write$P9_RWSTAT(r1, 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x7ffff000) 20:17:20 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r1, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 20:17:20 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x2dc001) membarrier(0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$DRM_IOCTL_MODE_GETFB(0xffffffffffffffff, 0xc01c64ad, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:17:20 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) write$P9_RWSTAT(r1, 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x7ffff000) [ 336.364248][T12088] IPVS: ftp: loaded support on port[0] = 21 [ 336.569273][T12093] IPVS: ftp: loaded support on port[0] = 21 20:17:21 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c000100627269646765"], 0x34}}, 0x0) sendto$inet(r0, &(0x7f00000012c0)='\f', 0x1, 0x11, 0x0, 0x0) 20:17:21 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r1, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 20:17:21 executing program 4: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[], 0x10}, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0xfffffffffffffd4e}], 0x1000000000000125, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x11e}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 20:17:21 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:21 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:21 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x2dc001) membarrier(0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$DRM_IOCTL_MODE_GETFB(0xffffffffffffffff, 0xc01c64ad, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 336.794589][ T7] tipc: TX() has been purged, node left! 20:17:21 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) [ 336.893521][T12156] IPVS: ftp: loaded support on port[0] = 21 20:17:21 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:21 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r1, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) [ 336.949487][T12173] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 336.983283][T12173] device bridge1 entered promiscuous mode 20:17:21 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) 20:17:21 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) [ 337.089187][T12179] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 337.132189][T12179] device bridge2 entered promiscuous mode 20:17:21 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(0xffffffffffffffff, r2, 0x0, 0x7ffff000) 20:17:21 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="ddffffffffffffff140012000c000100627269646765"], 0x34}}, 0x0) sendto$inet(r0, &(0x7f00000012c0)='\f', 0x1, 0x11, 0x0, 0x0) 20:17:21 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:21 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f000000a300)=[{{&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0, 0x0, &(0x7f00000004c0)=[{0x10}, {0x10}], 0x20}}], 0x1, 0x0) 20:17:21 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(0xffffffffffffffff, r2, 0x0, 0x7ffff000) 20:17:21 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) fchdir(0xffffffffffffffff) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000080)) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r1, r2, 0x0, 0x7ffff000) 20:17:21 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:21 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(0xffffffffffffffff, r2, 0x0, 0x7ffff000) 20:17:22 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socket$inet6(0xa, 0x0, 0x0) write$tun(r0, &(0x7f0000000180)={@void, @val, @ipv6=@gre_packet={0x0, 0x6, "bc7d94", 0x44, 0x29, 0x0, @local, @mcast2}}, 0x76) [ 337.454821][T12223] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 337.491335][T12223] device bridge3 entered promiscuous mode 20:17:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:22 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r1, r2, 0x0, 0x7ffff000) 20:17:22 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) fchdir(0xffffffffffffffff) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000080)) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r1, r2, 0x0, 0x7ffff000) 20:17:22 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:22 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x8}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) symlink(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0/file0\x00', &(0x7f0000000340)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 20:17:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:22 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r1, r2, 0x0, 0x7ffff000) 20:17:22 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x95, &(0x7f0000000340)="c4fe910c6786cec96ddb5322b89152563fadcd891969b71832cb470c94d61f3514dca76fd1664d2013712c225da4a455f4c9fd98a5680956f1291607e39a209852cea9c3f5ec31a933137a89acd693be5df4e7a840effc012904b9ce36371060422e2cc232d5863cad44f8be41bcd8922896ba19b709aa38f427f642337a05000000000000008058f48b81186dae5faab1f224411f"}}], 0x1c) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x33) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 20:17:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:22 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000095c0)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000001080)=""/169, 0xa9}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/snmp\x00') preadv(r0, &(0x7f0000000500), 0x37d, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) syz_genetlink_get_family_id$nl80211(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x11000000, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0xf0}, 0x0) r1 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, 0x0, 0x0) 20:17:22 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x2) 20:17:22 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r1, r2, 0x0, 0x7ffff000) 20:17:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:22 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:23 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:23 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', 0x0, 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:23 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:23 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$dupfd(r3, 0x406, 0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) uname(&(0x7f00000000c0)=""/194) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0/file0\x00', &(0x7f0000000340)='./file0\x00') unlink(&(0x7f0000000040)='./file0\x00') open(0x0, 0x0, 0x0) 20:17:23 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', 0x0, 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="7e493c78124dac9d6f446e9cf5ef247c2cffb18fd3023247a7da1ca797f6ce82861faeedc8b2c6567fdb6fb9b215d428da9d75e3fba9c1f4ffd006b4b02a47f3e70ecd0c8f8ecad898ab4390ad0b540cd4be5e01d2fd71a8b4271ff634f9276550f5aa337e39bdcbeb0bafbd58e0a0a7adba1ae1f31f59e33165834362786f35973e68a0aada5361ac171fc3b85835b6a3f53e1bd4cfcc6e0fc0c438d6dcc113bc633741ee493816eb92be1621abf6555e39bc514f219d1017624edf04ee05823bda4c3149998f820bbabe86d9ef11bc9577d0a355638403b0cf246699b58a445e3a078542b1a2be262e5f5bd64c16fcfc2d8303040b297ea2a3271e4c42d272fe5c26532d93292c5277890dda520bf0cfc9b622d22ced5f7f306fd88e0ca2234b7dc44a4cd09c395e6b60ac8c528b8c8b19d6c5af04381567aff2ce0610580d752a645dab69d0ab852e566997cf5f266d27888aba21b41e896d249bd8d55e7086e48a5eb8884c89904cb7b6d5ff16a141a01dbfd403463075b756ae26cedd25a8247934bf1c3fe8a95cc583d0a03b15f72e44434f65a5a401dcd3e5779920d7901f39a5a482cf871e56a700ebda75e939caf5f872c1313608368feb8db00c7397068d46777d73807405576ff753a006d73f5222097a6013f757d63a049d10b33226f852fb839572e5adcd21ee294d73df8e15ddc26316318e3157af17826e89c3e371fd78de2326e502b850861e8de0e5325fe6cff6da965e2132916952cc2dd049443830bd72710794304625da015c50b134e897ff81938034377d373850a007d7412459bd6ac2de181bde7df45348514a32202bf807635bdf128de2849bde6faaa09bd766bf2362f7091a8bfc528a6f37735d9e9d6fa8b910a372ada3819cc0ef8ee5719b59c50ce57008c4fbf6b8c31e0775dd81103eb8af1075ad17942323c53bd4d2193e3e50456c80f1cca6f596ef210ca3162b84af3e4ddbfa133fc6dee4fd7331308c1c41b8f3", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) [ 339.707540][ T7] tipc: TX() has been purged, node left! [ 339.907520][ T7] tipc: TX() has been purged, node left! 20:17:25 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', 0x0, 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:25 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:25 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000040)='SMC_PNETID\x00') sendmsg$SMC_PNETID_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="1fffffff00000000000001"], 0x34}}, 0x0) 20:17:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:25 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x95, &(0x7f0000000340)="c4fe910c6786cec96ddb5322b89152563fadcd891969b71832cb470c94d61f3514dca76fd1664d2013712c225da4a455f4c9fd98a5680956f1291607e39a209852cea9c3f5ec31a933137a89acd693be5df4e7a840effc012904b9ce36371060422e2cc232d5863cad44f8be41bcd8922896ba19b709aa38f427f642337a05000000000000008058f48b81186dae5faab1f224411f"}}], 0x1c) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x33) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 20:17:25 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @loopback, 0x0, 0xc0000000, 'sh\x00'}, 0x2c) [ 341.270468][T12371] IPVS: ftp: loaded support on port[0] = 21 20:17:25 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:25 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="4800000010000507000000008c00000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800c0001006d6163766c616e000400028008000500", @ANYRES32=r7], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x3f00, &(0x7f0000000200)={&(0x7f0000000640)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x5, 0x0, 0x0, r4}}, 0x20}}, 0x0) 20:17:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:25 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) [ 341.492029][T12412] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 20:17:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 341.544204][T12423] batman_adv: batadv0: Adding interface: veth5 [ 341.567498][T12423] batman_adv: batadv0: The MTU of interface veth5 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 20:17:26 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x14) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r1, r2, 0x0, 0x7ffff000) [ 341.601496][T12425] FAT-fs (loop1): Directory bread(block 1) failed [ 341.611584][T12425] FAT-fs (loop1): Directory bread(block 2) failed [ 341.629206][T12425] FAT-fs (loop1): Directory bread(block 3) failed [ 341.669675][T12423] batman_adv: batadv0: Not using interface veth5 (retrying later): interface not active [ 341.685453][T12425] FAT-fs (loop1): Directory bread(block 4) failed [ 341.723332][T12371] IPVS: ftp: loaded support on port[0] = 21 [ 341.740489][T12425] FAT-fs (loop1): Directory bread(block 5) failed [ 341.740888][T12430] batman_adv: batadv0: Removing interface: veth5 [ 341.747007][T12425] FAT-fs (loop1): Directory bread(block 6) failed [ 341.762230][T12425] FAT-fs (loop1): Directory bread(block 7) failed 20:17:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 341.769723][T12425] FAT-fs (loop1): Directory bread(block 8) failed [ 341.788166][T12425] FAT-fs (loop1): Directory bread(block 9) failed [ 341.797433][T12425] FAT-fs (loop1): Directory bread(block 10) failed 20:17:26 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) [ 341.895679][T12412] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 20:17:26 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x14) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r1, r2, 0x0, 0x7ffff000) [ 341.948560][ T25] tipc: TX() has been purged, node left! [ 341.963391][T12423] batman_adv: batadv0: Adding interface: veth5 [ 341.971138][T12423] batman_adv: batadv0: The MTU of interface veth5 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 20:17:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 342.089808][T12423] batman_adv: batadv0: Not using interface veth5 (retrying later): interface not active [ 342.100588][T12484] FAT-fs (loop1): Directory bread(block 1) failed [ 342.126461][T12484] FAT-fs (loop1): Directory bread(block 2) failed [ 342.137208][T12475] batman_adv: batadv0: Removing interface: veth5 [ 342.146109][T12484] FAT-fs (loop1): Directory bread(block 3) failed [ 342.155937][T12484] FAT-fs (loop1): Directory bread(block 4) failed [ 342.163578][T12484] FAT-fs (loop1): Directory bread(block 5) failed [ 342.173076][T12484] FAT-fs (loop1): Directory bread(block 6) failed [ 342.179971][T12484] FAT-fs (loop1): Directory bread(block 7) failed [ 342.186827][T12484] FAT-fs (loop1): Directory bread(block 8) failed [ 342.196537][T12484] FAT-fs (loop1): Directory bread(block 9) failed [ 342.203846][T12484] FAT-fs (loop1): Directory bread(block 10) failed [ 343.937286][ T8853] tipc: TX() has been purged, node left! 20:17:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="4800000010000507000000008c00000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800c0001006d6163766c616e000400028008000500", @ANYRES32=r7], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x3f00, &(0x7f0000000200)={&(0x7f0000000640)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x5, 0x0, 0x0, r4}}, 0x20}}, 0x0) 20:17:28 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x6, @loopback, 0x0, 0xc0000000, 'sh\x00'}, 0x2c) 20:17:28 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="4800000010000507000000008c00000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800c0001006d6163766c616e000400028008000500", @ANYRES32=r7], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x3f00, &(0x7f0000000200)={&(0x7f0000000640)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x5, 0x0, 0x0, r4}}, 0x20}}, 0x0) 20:17:28 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x14) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r1, r2, 0x0, 0x7ffff000) 20:17:28 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="7e493c78124dac9d6f446e9cf5ef247c2cffb18fd3023247a7da1ca797f6ce82861faeedc8b2c6567fdb6fb9b215d428da9d75e3fba9c1f4ffd006b4b02a47f3e70ecd0c8f8ecad898ab4390ad0b540cd4be5e01d2fd71a8b4271ff634f9276550f5aa337e39bdcbeb0bafbd58e0a0a7adba1ae1f31f59e33165834362786f35973e68a0aada5361ac171fc3b85835b6a3f53e1bd4cfcc6e0fc0c438d6dcc113bc633741ee493816eb92be1621abf6555e39bc514f219d1017624edf04ee05823bda4c3149998f820bbabe86d9ef11bc9577d0a355638403b0cf246699b58a445e3a078542b1a2be262e5f5bd64c16fcfc2d8303040b297ea2a3271e4c42d272fe5c26532d93292c5277890dda520bf0cfc9b622d22ced5f7f306fd88e0ca2234b7dc44a4cd09c395e6b60ac8c528b8c8b19d6c5af04381567aff2ce0610580d752a645dab69d0ab852e566997cf5f266d27888aba21b41e896d249bd8d55e7086e48a5eb8884c89904cb7b6d5ff16a141a01dbfd403463075b756ae26cedd25a8247934bf1c3fe8a95cc583d0a03b15f72e44434f65a5a401dcd3e5779920d7901f39a5a482cf871e56a700ebda75e939caf5f872c1313608368feb8db00c7397068d46777d73807405576ff753a006d73f5222097a6013f757d63a049d10b33226f852fb839572e5adcd21ee294d73df8e15ddc26316318e3157af17826e89c3e371fd78de2326e502b850861e8de0e5325fe6cff6da965e2132916952cc2dd049443830bd72710794304625da015c50b134e897ff81938034377d373850a007d7412459bd6ac2de181bde7df45348514a32202bf807635bdf128de2849bde6faaa09bd766bf2362f7091a8bfc528a6f37735d9e9d6fa8b910a372ada3819cc0ef8ee5719b59c50ce57008c4fbf6b8c31e0775dd81103eb8af1075ad17942323c53bd4d2193e3e50456c80f1cca6f596ef210ca3162b84af3e4ddbfa133fc6dee4fd7331308c1c41b8f3", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 344.319002][T12515] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 344.349146][T12519] FAT-fs (loop1): Directory bread(block 1) failed [ 344.355743][T12519] FAT-fs (loop1): Directory bread(block 2) failed [ 344.367681][T12522] IPVS: ftp: loaded support on port[0] = 21 [ 344.373862][T12519] FAT-fs (loop1): Directory bread(block 3) failed [ 344.375709][T12514] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 344.383902][T12519] FAT-fs (loop1): Directory bread(block 4) failed [ 344.397949][T12519] FAT-fs (loop1): Directory bread(block 5) failed [ 344.405744][T12519] FAT-fs (loop1): Directory bread(block 6) failed [ 344.427196][T12519] FAT-fs (loop1): Directory bread(block 7) failed [ 344.476181][T12519] FAT-fs (loop1): Directory bread(block 8) failed [ 344.505871][T12523] batman_adv: batadv0: Adding interface: veth3 [ 344.513322][T12523] batman_adv: batadv0: The MTU of interface veth3 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 344.516126][T12519] FAT-fs (loop1): Directory bread(block 9) failed 20:17:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:29 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) [ 344.577265][T12523] batman_adv: batadv0: Not using interface veth3 (retrying later): interface not active [ 344.621995][T12519] FAT-fs (loop1): Directory bread(block 10) failed [ 344.644437][T12532] batman_adv: batadv0: Adding interface: veth5 [ 344.654379][T12532] batman_adv: batadv0: The MTU of interface veth5 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 20:17:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 344.818940][T12532] batman_adv: batadv0: Not using interface veth5 (retrying later): interface not active 20:17:29 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) [ 344.871716][T12540] batman_adv: batadv0: Removing interface: veth5 20:17:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) [ 344.923374][T12543] batman_adv: batadv0: Removing interface: veth3 20:17:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:29 executing program 5: r0 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="240000002e0007031dfffd946fa201000100000000000000000000e50c1be3a2f7fffe7e280000005e00ffaa1c0009b3ebea966cf0554edc7de8ddeb133c2bff0100000000000015f8ffff30", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000002540)=[{{0x0, 0x0, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000380)=""/65, 0x41}, {&(0x7f0000000400)=""/96, 0x60}, {&(0x7f0000002580)=""/4096, 0x1000}, {&(0x7f0000000480)=""/108, 0x6c}, {0x0}, {&(0x7f0000000500)=""/239, 0xef}, {&(0x7f0000000600)=""/193, 0xc1}], 0x8}}], 0x1, 0x42, 0x0) [ 345.182944][T12610] FAT-fs (loop1): bogus number of reserved sectors [ 345.198399][T12610] FAT-fs (loop1): Can't find a valid FAT filesystem 20:17:29 executing program 4: syz_emit_ethernet(0x11e, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd60d64d4d00263a0020010000000000000000000000000002ff020000000000000000000000000001"], 0x0) 20:17:29 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="4800000010000507000000008c00000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800c0001006d6163766c616e000400028008000500", @ANYRES32=r7], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x3f00, &(0x7f0000000200)={&(0x7f0000000640)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x5, 0x0, 0x0, r4}}, 0x20}}, 0x0) 20:17:29 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(rfc4543(gcm_base(ctr(aes-aesni),ghash-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000440)="cb", 0x10) [ 345.424807][T12622] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 345.464415][T12625] FAT-fs (loop1): bogus number of reserved sectors 20:17:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 345.502583][T12625] FAT-fs (loop1): Can't find a valid FAT filesystem [ 345.520055][T12635] batman_adv: batadv0: Adding interface: veth5 [ 345.526392][T12635] batman_adv: batadv0: The MTU of interface veth5 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 20:17:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:30 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x1}) 20:17:30 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f00000000c0)) 20:17:30 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) [ 345.673960][T12635] batman_adv: batadv0: Not using interface veth5 (retrying later): interface not active 20:17:30 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) [ 345.809224][T12643] batman_adv: batadv0: Removing interface: veth5 20:17:30 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0x10) [ 345.892060][T12675] FAT-fs (loop1): bogus number of reserved sectors [ 345.931901][T12675] FAT-fs (loop1): Can't find a valid FAT filesystem 20:17:30 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=r3, @ANYBLOB="b503000b0000000a000004"], 0x3}}, 0x0) sendfile(r2, r1, 0x0, 0x10000000b) 20:17:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:30 executing program 4: shutdown(0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) socket(0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f00000001c0), 0xc, &(0x7f0000001940)={0x0}}, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, &(0x7f0000000040), 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 20:17:30 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:30 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:30 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000000a01000000004000000000000000000900010073797a300000000038000000120a01050000000000000000000000000400048009000200dd387d00000000000900010073797a30000000000800034000000001"], 0x80}}, 0x0) 20:17:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:30 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2404c04d) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xff000000, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000631177fbac141440e0", 0x0, 0x9}, 0x28) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 346.196447][ T28] audit: type=1804 audit(1589833050.724:27): pid=12699 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir200292630/syzkaller.s76C36/81/cgroup.controllers" dev="sda1" ino=16065 res=1 20:17:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 20:17:31 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="4800000010000507000000000000000000000200", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x3c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) [ 346.593647][T12727] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 346.638871][T12727] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 346.666195][T12727] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 20:17:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_256={{0x304}, "726166bb17abe2c9", "342e9a7091165d4d300bafa1dcaaa16f5a41e606d1d8176cc3c97c7e9e6a105b", "5589e638", "c0d48bd9b2cfeec3"}, 0x38) 20:17:31 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:31 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) [ 346.812522][T12738] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 20:17:31 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:31 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f00000000c0)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r0, 0x1) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000100), 0x14) 20:17:31 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000100)="669b6cba7a10dd0bbb6aadaa60e1", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 346.957158][T12738] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 20:17:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="4800000010000507000000000000000000000200", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x3c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0x1c, 0xffffffef}]}, 0x28}}, 0x0) 20:17:31 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:31 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x4300, &(0x7f0000000280)="b95b03b700030700009e40f089061fffffe100004000638477fbac14143fe0004301c699da153f08a0e6e380f6010af683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b33", 0x0, 0xfd, 0x6000000000000000}, 0x28) 20:17:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:31 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) [ 347.204339][T12788] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 20:17:31 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8903, &(0x7f0000000000)='&@[\x00') 20:17:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:32 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {0x0, 0x0, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108030f80ecdb4cb92e0a480e0a0f000000e3bd6efb250009600e00030040fefeff050005001201", 0x2e}], 0x1}, 0x0) [ 347.501823][T12815] kvm [12813]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0x187 data 0x1 [ 347.513561][T12815] kvm [12813]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0x187 data 0x1 [ 347.524107][T12815] kvm [12813]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0x187 data 0x1 [ 347.534408][T12815] kvm [12813]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0x187 data 0x1 20:17:32 executing program 3: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @empty}, 0x10, 0x0}, 0x20040045) sendmsg$kcm(r0, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff00a}], 0x1}, 0x6d70) [ 347.544473][T12815] kvm [12813]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0x187 data 0x1 [ 347.554125][T12815] kvm [12813]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0x187 data 0x1 [ 347.571696][T12815] kvm [12813]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0x187 data 0x1 [ 347.591912][T12815] kvm [12813]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0x187 data 0x1 [ 347.628129][ T8853] tipc: TX() has been purged, node left! [ 347.640478][T12815] kvm [12813]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0x187 data 0x1 [ 347.660839][T12815] kvm [12813]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0x187 data 0x1 [ 347.740579][T12815] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 20:17:32 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0), 0x0, 0x0, 0x0, 0x10}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x0, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000440)="683fdecb3110a1a2326b1aa337cccca5339c6f076f106ac157fc689d90b95fdb48ea1fd0c91bbf946b566df889cc643f62b393b2e0bd7201920cf734024b894db91f1dc14a7103336a3fecf5eb091968cddd5e5b95a7ff5645d6cae98e22f0f79d", 0x61}, {&(0x7f00000004c0)="c02fd2b3110ae7b8f3b473bbf1f12f47db6f27a3f61f110b6e91c825281e6002b2fa9d30f39f7c3ca2e5552434f015dcd5ce668ce74221d26e6ea7d3451a306e9cb15a6c7754e1d5d30676fca4a18f4ac0e7c1a42d521e4838cf07de41f9699839caa935403ebeaeef399a9853e9ec95af5ab4915ea8f62e44759d6d2f8dfd4eac4b3f7f07f4b210f1f4", 0x8a}, {&(0x7f0000000580)}, {&(0x7f00000002c0)}], 0x4}, 0x4008880) sendmsg$kcm(r1, &(0x7f0000000400)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100002b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe39", 0x52}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x10\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x890c, &(0x7f0000000180)={r1}) 20:17:32 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:32 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x4300, &(0x7f0000000280)="b95b03b700030700009e40f008001fffffe100004000638477fbac14143fe0004301c699da153f05a0e6e380f60105f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b33", 0x0, 0xfd, 0x6000000000000000}, 0x28) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x9b5) 20:17:32 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r1, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r1, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @loopback, @remote}}}], 0x20}, 0x0) 20:17:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:32 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {0x0, 0x0, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:32 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {0x0, 0x0, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) [ 348.120735][T12841] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 20:17:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:32 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r1, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r1, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @loopback, @remote}}}], 0x20}, 0x0) 20:17:32 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:32 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0), 0x0, 0x0, 0x0, 0x10}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x0, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000440)="683fdecb3110a1a2326b1aa337cccca5339c6f076f106ac157fc689d90b95fdb48ea1fd0c91bbf946b566df889cc643f62b393b2e0bd7201920cf734024b894db91f1dc14a7103336a3fecf5eb091968cddd5e5b95a7ff5645d6cae98e22f0f79d", 0x61}, {&(0x7f00000004c0)="c02fd2b3110ae7b8f3b473bbf1f12f47db6f27a3f61f110b6e91c825281e6002b2fa9d30f39f7c3ca2e5552434f015dcd5ce668ce74221d26e6ea7d3451a306e9cb15a6c7754e1d5d30676fca4a18f4ac0e7c1a42d521e4838cf07de41f9699839caa935403ebeaeef399a9853e9ec95af5ab4915ea8f62e44759d6d2f8dfd4eac4b3f7f07f4b210f1f4", 0x8a}, {&(0x7f0000000580)}, {&(0x7f00000002c0)}], 0x4}, 0x4008880) sendmsg$kcm(r1, &(0x7f0000000400)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100002b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe39", 0x52}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x10\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x890c, &(0x7f0000000180)={r1}) 20:17:32 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880), 0x0, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:33 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000007961e62273faa6884c44827ffe33732b0d27517495db22c369fc01b191533df23e4a10cbd4dfb403d80912aa8ef860dd81e221f886dc0154419e857178e246297048629c6326bfe8f81c360dd7c9efafb9ff34fedbb2ca4d35f6b5f65e8894425d22dce799b0a5d65dee16bffed85ac530e49bbe2cc6e0745503aa6c636e4b0d78e3d530d91e8213cc3f3aa07295e86df0557be41f4f982eb553b1b9e36d77174f29c57c0db60076f5ab193325dbfa90e0edab3ddb5ed8fa984bb0fcb52ad14988f58de2ec276e5d9d9464ede6deb474604da29f1b7d924c96d8c04e5ff44ca849a436284bc99d4b03487b4c221a26c27228aea193cb831124187765d3c1b162bd4e64b2ca92c22afa1ecff1edecd4de1e8d2c88b2b03ad75e3774a70363ad121331b0988b9fa3fd3bdd1f48369863e3c2bc37067a1fe90d7cc733eb753fc3fbe8fa03ed9c061732486e68b39e02a63cbff4af35dd8a17dd33dfa196911b654e60fa881a77b295a8ed9374cb784e9afcfd308b51b6f00b359d41bfe0240f5aaa9e037891216b4c02291f122c51c1e3291195615f13acdbe142541ba3ba10abca64f1cb9d9c819422bf2cf04699902d8e19a9ba1afc6edc2e615a527698f2f84fec0380be7c3eb1ae1576f0e7e88e57dc1c3f7639768e84dda015f8fa0ecfba22ade43e667d8cc897bec4921aa03227085a7b6ccf4b17ce6e26b345f1cbc0b16312ec7fc71724fcde39982c720fbad55be728acdc4acb8ce24c6fc3bf21e7f2f9c1916f77d6db064ab7ba34debf9fd2d0dd40b341afc6a1be00d1910c024351e926f30153cadfbeb9110ff0696fde63973c0a1d85e37c34d1842d50af6e53ec269554a765414221200100000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x4300, &(0x7f0000000280)="b95b03b700030700009e40f008001fffffe100004000638477fbac14143fe0004301c699da153f05a0e6e380f60105f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b33", 0x0, 0xfd, 0x6000000000000000}, 0x28) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x9b5) 20:17:33 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r1, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r1, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @loopback, @remote}}}], 0x20}, 0x0) 20:17:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:33 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:33 executing program 5: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000007961e62273faa6884c44827ffe33732b0d27517495db22c369fc01b191533df23e4a10cbd4dfb403d80912aa8ef860dd81e221f886dc0154419e857178e246297048629c6326bfe8f81c360dd7c9efafb9ff34fedbb2ca4d35f6b5f65e8894425d22dce799b0a5d65dee16bffed85ac530e49bbe2cc6e0745503aa6c636e4b0d78e3d530d91e8213cc3f3aa07295e86df0557be41f4f982eb553b1b9e36d77174f29c57c0db60076f5ab193325dbfa90e0edab3ddb5ed8fa984bb0fcb52ad14988f58de2ec276e5d9d9464ede6deb474604da29f1b7d924c96d8c04e5ff44ca849a436284bc99d4b03487b4c221a26c27228aea193cb831124187765d3c1b162bd4e64b2ca92c22afa1ecff1edecd4de1e8d2c88b2b03ad75e3774a70363ad121331b0988b9fa3fd3bdd1f48369863e3c2bc37067a1fe90d7cc733eb753fc3fbe8fa03ed9c061732486e68b39e02a63cbff4af35dd8a17dd33dfa196911b654e60fa881a77b295a8ed9374cb784e9afcfd308b51b6f00b359d41bfe0240f5aaa9e037891216b4c02291f122c51c1e3291195615f13acdbe142541ba3ba10abca64f1cb9d9c819422bf2cf04699902d8e19a9ba1afc6edc2e615a527698f2f84fec0380be7c3eb1ae1576f0e7e88e57dc1c3f7639768e84dda015f8fa0ecfba22ade43e667d8cc897bec4921aa03227085a7b6ccf4b17ce6e26b345f1cbc0b16312ec7fc71724fcde39982c720fbad55be728acdc4acb8ce24c6fc3bf21e7f2f9c1916f77d6db064ab7ba34debf9fd2d0dd40b341afc6a1be00d1910c024351e926f30153cadfbeb9110ff0696fde63973c0a1d85e37c34d1842d50af6e53ec269554a765414221200100000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0x69, 0x4300, &(0x7f0000000280)="b95b03b700030700009e40f008001fffffe100004000638477fbac14143fe0004301c699da153f08a0e6e380f6010ef683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b33", 0x0, 0xfd, 0x6000000000000000}, 0x28) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x9b5) 20:17:33 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880), 0x0, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:33 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x384, &(0x7f0000000080)=[{&(0x7f0000000100)="2e00000033001335a4abd32b8018007a0124fc60104a0a400c000200053582c137153e37090001802e25640400bd", 0x2e}], 0x1}, 0x0) 20:17:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:33 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r0, 0x0, 0x14) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r1, r2, 0x0, 0x7ffff000) [ 349.036834][T12929] netlink: 'syz-executor.3': attribute type 2 has an invalid length. 20:17:33 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x400000000004, 0x9}, 0x40) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x25) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={0x0}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0xa, 0x400, 0xc}, 0x40) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000180)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={0xffffffffffffffff, 0x0, 0x0, 0x1, &(0x7f0000000240), &(0x7f0000000100)=""/1, 0x400, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0}, 0x40) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='memory.events\x00') bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r0}, 0x38) 20:17:33 executing program 4: r0 = socket$kcm(0x10, 0x10000000000003, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000018008105e00f80ecdb4cb92e0a00072c000cd307e8bd6efb1200697ba00cba82bd81c933de71da06000e", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) [ 349.149465][T12929] device .0 entered promiscuous mode 20:17:33 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x400000000004, 0x9}, 0x40) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x25) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={0x0}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0xa, 0x400, 0xc}, 0x40) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000180)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={0xffffffffffffffff, 0x0, 0x0, 0x1, &(0x7f0000000240), &(0x7f0000000100)=""/1, 0x400, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0}, 0x40) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='memory.events\x00') bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000000c0), 0x1081, r0}, 0x38) 20:17:33 executing program 3: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000340), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r1, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000400)=@xdp={0x2c, 0x8, 0x0, 0x2b}, 0x80, 0x0, 0x0, &(0x7f00000005c0)=[{0x78, 0x113, 0x5, "a42d3559601871df0a7bdff0ef618312612c437692c00547e41b02dd168491f4876c2d63e7c5fd3cdbf746fd8add52f7d3080a3b5284c20607f1d967e378ee379fe349f328682230e97ddc46a631e19ab8abd3a7db84a999e93764dcd5ec41d30c05b0b7e201"}, {0x20, 0x0, 0xffffffff, "949215453bdf09a22aa05ddee0"}], 0x98}, 0xc000) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r3, 0x0, 0x0) sendmsg(r3, 0x0, 0x80) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[@ANYRESHEX], 0x81000) sendmsg$kcm(r4, &(0x7f00000003c0)={&(0x7f0000000700)=@generic={0x1d, "598f79984bafe64a01ecded2948d30f5c18bbe4e81a6c9bc5cdcb4209e006b73be6b06b042edd1abbe7497f7f4d466e1183774c0a3eab654aea9d136344dfd79427c85ea6981569da60de569473d06c908415b9959748a41a67a2f6e17149132b4821e4f06078e79bb44ad01e169d0be7e6aebac932f8e34b6d11a6d5b24"}, 0x80, 0x0, 0x0, &(0x7f0000000a40)=[{0x10, 0x101}, {0x10, 0x2ecd9e4a7fbe79ff, 0x3}, {0x10, 0xf1, 0x1}, {0x98, 0x10d, 0x80, "6ba45eb0588e1cdb33422b8e70e41c2bbbdaf39552154c06dacbf28674b04505f56f04045000c984d45026497f1e90b03c7ba70ffb8236f83634ca63368e68bfa85d0c2f3d7c514f0b72787247fec6505750d6b1aab8f88367f14e0d9b7544387bdb48dde43e8951b455211c22bb5fb366f81196e2a9d28fdeb93ac26af2cb2401ca68d339b285"}, {0xf0, 0x114, 0x1, "8708f38350def2256330c2a42917d845dbb50acbcb1444fe59a988c43dee2d9253737962762fb2709b3d07c2a590875c49a9c2dca9743192453acd10112a2af0486190f7f0031da70e2955fcde0c81812c0f12cc408702f6cf3a8d0393a5fb4964fdc73d08ca834498edb1fb0d0a19e614fd29ac6f98ba0a4f3fcf73612bb91b6004ccd47b0cc9bce72cbc6646cb174b66cf31581b84993e01291bb85b85effa9dcd9173f7d1d9819cd772de9020c75060967dce726c8035a391d026cda34bf77fcfa658a72da4a4f336ff19190a7c37a51e4eaf01a2c004f5d7"}], 0x1b8}, 0x4000) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108030f80ecdb4cb92e0a480e0a10000000e3bd6efb250009600e00030040fefeff050005001201", 0x2e}], 0x1}, 0x0) 20:17:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:33 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r0, 0x0, 0x14) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r1, r2, 0x0, 0x7ffff000) 20:17:33 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880), 0x0, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:33 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r0, 0x0, 0x14) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r1, r2, 0x0, 0x7ffff000) 20:17:33 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000003c0)="2e0000005a0085010000000000000500020000e22c000000160002808eb3d81fc77948f328995a017c7b58510600", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) 20:17:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x2e}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x16}, 0x10) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = socket$kcm(0x21, 0x0, 0x2) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="18a29fcb1400003a89bf48ff00100100000d0000000e00000000000000"], 0x18}, 0x0) sendmsg(r2, 0x0, 0x80) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb250009000e00036c40fe00ff050005001201", 0x2e}], 0x1}, 0x0) 20:17:34 executing program 5: sendmsg$sock(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f0000001380)=[{&(0x7f00000000c0)="f0651851beb51bad02776ca3eba5b70a32dd39d188a663ba894b860af91666184961d6937030a33e31d7acfb5262eff8", 0x30}], 0x1}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x2f, 0x0, 0x0, 0xfffffffffffffe2a}, 0x28) 20:17:34 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:34 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) [ 349.713399][T12975] 8021q: adding VLAN 0 to HW filter on device team0 20:17:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/1506], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac141442e6", 0x0, 0x2f, 0x0, 0x0, 0xfffffffffffffe2a}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() 20:17:34 executing program 5: sendmsg$sock(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f0000001380)=[{&(0x7f00000000c0)="f0651851beb51bad02776ca3eba5b70a32dd39d188a663ba894b860af91666184961d6937030a33e31d7acfb5262eff8", 0x30}], 0x1}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x2f, 0x0, 0x0, 0xfffffffffffffe2a}, 0x28) 20:17:34 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4a06b29e220dc28dac72599456d464419e5b2fc70b72c0bb8e90f61cc4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084a12f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a20819e02cc22e6b652b1673773ae3cab8d7674c6c4dca2f1b4d745fd95c41f9d441d42f49db6d4a4762e5cc23dfc1adafd1e5a3e7f2e888961cb43e438c4e41ae43ea118e1407a601dae4b8b99bffffb1ac006c67767b03b95151aeb89e6d4a43c625aa2285b6e4afd8c1cc3eb215ba22f43115f4d39dc7beedb130d9f2be90133a0e3ed34258b8c9370634060105baa664953514605fba3973aa021945b985a8a66e9cfa9d9e57033815717b4fdbe55b37cb8d7f41aacfbd4089ea1bd22440f64909a09b5a759a703e71f358e11ac8e13df15d792e604a4f279b3bd6621bdf2c17bc0400000000000000ff8dc4006200607a9a76e5d9656a7154c75773902a1bdf399df3925130312d095e9c1f973d091c198c1a11a755761fe46169b2b5b8cdedb695cc425fe203d2f2655a76865c2cb4e2470fcfb1248c0add5431a7fbcb0ef4f66809af93a09fab1daae4b518d7a5d95a017864487366d6d7ee7bb00200000000000000c60fca2e2981b22d08f874e0a9cb6fca78d6f1b18fe380df4bf024f120bd715d82033f2fb7d8fc9e0d773294e097e293db58993c0024ab2fd8e5e7003af92d11de48e8b4d32972cba6f49051cec1bf6f16231bbb90a2d201e5a47811a2278a03bf7700b06fa191ebd3a0c2ef0058ffebd7ccde24f18e4bf7156edc4ef81f74a7cdac01d998c24f34a5ba9a4a2039d0416e3f83074192c48c63384f52b8eeb70571e5bbb3e6d2b5eba52bee6f81968981811f832d064048c0e0bbe46984b2f0d0504255c22ee8674053d0e160e525536edf56a93d0a7a6f088925e872ef8b4f31e6f57ba631baa729031aae25c5e8ca4f78d5a01308243b08f1caa46be5244d64f8e875858e083144c642f71cdc8e5634c1360c056430f677ee7ed7ac1f9743786b2fb8d0fcfcc3d36c93230b7b059bc295aa0e38b1c3edc349ab96e73d2060acfd8145e4a5851bc4d6fd6741fce0834c65c5ad939d7795f3879baa88bd0c84892c97c80987e5c7954e9f3694d116b01ce0b8ef953de70e7ce0311c8b018956f8a42ca26ab295f1ecf617a8dc38e525f415a1bd46b38845ebca04061bacbf627f798c7f520078fee48f83b5989543729e57a9e1d686bc86cd51704f309130f5347413776a7b7bea3c46c0c4c4b7c27c45057d95ac85ac1cdcee8e6fa31fc02137ed1fb4b21c13b9a2c5e3f7c9ef9c45a314a6f0b9352be92986d63263b1aa5264cb4a82cf083de3b4ab6368e95dd4fdf6710cd4a79651dc3e1e056c3ecd6b51f30663cc256094c840662e09ab831b7bae9aec6d7259250016795cf91f12dbb72fc321c3dfb5f9181529906b43f9d6b8ce9fad13e1085cafd41183908173e16e40037681835aa080f34b87bba0be276340295062f671e933292e32036cbd03f9a4cd660a94374b013e9f32a6bfb65417b537cd8f67f975358140384a1ca0537fd3a2a2c37006e4b30ffe469bba4251aa3ba4626acd810000000000000000ee37c63f7f295579f542b12f248f4b6ba14448abab540fb7d98a081f3d3c946455d61734855005bcc876bd15a76dd552f9bfeb091a4e82a5d11033e528b133103f5592d5684a57dd70556818ea30e03dc2a6eb69423e4f27034351809da4e5002aa346d4d3e0e2a5a9ba1130b4fe983fc344c1de9f536cff06187599523cbddcd8ffc2d11d5db7712be71c0d74a5ae4e8ff6e65238bb23ea2a979d3e8ab83857a1607dc612f0d84492279bba5ec6c5cea6af9d6a667b5ff7cd594ebccd6db3bfbefe923bbf983d0ef0d7f6450221cbb615b30aa0634df0ffd78208512270c03e1f7c579c19017ad56755a048"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000631177fbac141417ee", 0x0, 0x2f, 0x0, 0x0, 0xfffffffffffffe2a}, 0x28) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x83, 0x0, 0x0) 20:17:34 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x166, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:34 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/1506], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac141442e6", 0x0, 0x2f, 0x0, 0x0, 0xfffffffffffffe2a}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() 20:17:34 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:34 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0xa, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @empty}, 0x10, 0x0}, 0x20040045) sendmsg$kcm(r0, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff00a}], 0x1}, 0x6d70) 20:17:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="89000000120081ae08060c0f006b3f007f03e3f70000000000e2ffca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef6a80277bec00123d000200190077a0bdad446b9bbc7a46e3988285dcdf12f213d3f868fecea4e455166883ad14955f947ee2b49e566f8afa8af92347510f0b56a20ff27f", 0x89}], 0x1}, 0x0) 20:17:34 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="7e493c78124dac9d6f446e9cf5ef247c2cffb18fd3023247a7da1ca797f6ce82861faeedc8b2c6567fdb6fb9b215d428da9d75e3fba9c1f4ffd006b4b02a47f3e70ecd0c8f8ecad898ab4390ad0b540cd4be5e01d2fd71a8b4271ff634f9276550f5aa337e39bdcbeb0bafbd58e0a0a7adba1ae1f31f59e33165834362786f35973e68a0aada5361ac171fc3b85835b6a3f53e1bd4cfcc6e0fc0c438d6dcc113bc633741ee493816eb92be1621abf6555e39bc514f219d1017624edf04ee05823bda4c3149998f820bbabe86d9ef11bc9577d0a355638403b0cf246699b58a445e3a078542b1a2be262e5f5bd64c16fcfc2d8303040b297ea2a3271e4c42d272fe5c26532d93292c5277890dda520bf0cfc9b622d22ced5f7f306fd88e0ca2234b7dc44a4cd09c395e6b60ac8c528b8c8b19d6c5af04381567aff2ce0610580d752a645dab69d0ab852e566997cf5f266d27888aba21b41e896d249bd8d55e7086e48a5eb888", 0x166, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:35 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) [ 350.631749][T13027] kvm_set_msr_common: 1304 callbacks suppressed [ 350.631764][T13027] kvm [13021]: vcpu0, guest rIP: 0xcc ignored wrmsr: 0x11e data 0xbe702110 20:17:35 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:35 executing program 3: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000180)="2e6b00002c00056bd2e9fcf8c11a057d0839e7c0ba1e67ab757d80648c63940000053582c140153e370907088000f01700d1bd41c63dd777723ec6082c45bb741613dae36b60af666626556259a9bb4fce87b512f9404ea68f9edb4f16c04713c5a2be0565a647ffb799acac7f8266544fd05da816f41797d23ebfae9fad2aa64326af33d7046c8e4b5f33a934821e55417ebff304fd", 0xfeb6}], 0x1}, 0x4c000) 20:17:35 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xfffffffffffffeae, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffea8, 0x20000001}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00', 0x200085}) socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, &(0x7f0000000000)='l0\x00') socket$kcm(0x10, 0x73043f8a220e6288, 0x0) 20:17:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x166, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) [ 350.738464][T13027] kvm [13021]: vcpu0, guest rIP: 0xcc ignored wrmsr: 0x11e data 0xbe702110 [ 350.754009][T13027] kvm [13021]: vcpu0, guest rIP: 0xcc ignored wrmsr: 0x11e data 0xbe702110 [ 350.763742][T13027] kvm [13021]: vcpu0, guest rIP: 0xcc ignored wrmsr: 0x11e data 0xbe702110 [ 350.773873][T13027] kvm [13021]: vcpu0, guest rIP: 0xcc ignored wrmsr: 0x11e data 0xbe702110 20:17:35 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x2, 0x400, 0x8}, 0x40) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000040)={0x0, &(0x7f00000000c0)=""/168, 0x0, 0x0, 0x1, r0}, 0x38) [ 350.795669][T13027] kvm [13021]: vcpu0, guest rIP: 0xcc ignored wrmsr: 0x11e data 0xbe702110 [ 350.827120][T13027] kvm [13021]: vcpu0, guest rIP: 0xcc ignored wrmsr: 0x11e data 0xbe702110 20:17:35 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) [ 350.842873][T13027] kvm [13021]: vcpu0, guest rIP: 0xcc ignored wrmsr: 0x11e data 0xbe702110 [ 350.856086][T13027] kvm [13021]: vcpu0, guest rIP: 0xcc ignored wrmsr: 0x11e data 0xbe702110 20:17:35 executing program 3: close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0xc004743e, &(0x7f0000000680)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x4004743d, &(0x7f0000000680)='&@[\x00') [ 350.902178][T13027] kvm [13021]: vcpu0, guest rIP: 0xcc ignored wrmsr: 0x11e data 0xbe702110 20:17:35 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xfffffffffffffeae, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffea8, 0x20000001}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00', 0x200085}) socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, &(0x7f0000000000)='l0\x00') socket$kcm(0x10, 0x73043f8a220e6288, 0x0) 20:17:35 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:35 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xfffffffffffffeae, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffea8, 0x20000001}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00', 0x200085}) socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, &(0x7f0000000000)='l0\x00') socket$kcm(0x10, 0x73043f8a220e6288, 0x0) 20:17:35 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x219, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:35 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xfffffffffffffeae, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffea8, 0x20000001}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00', 0x200085}) socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, &(0x7f0000000000)='l0\x00') socket$kcm(0x10, 0x73043f8a220e6288, 0x0) 20:17:35 executing program 5: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @empty}, 0x10, 0x0}, 0x200400c4) sendmsg$kcm(r0, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff00a}], 0x1}, 0x6d70) 20:17:35 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:35 executing program 3: close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0xc004743e, &(0x7f0000000680)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x4004743d, &(0x7f0000000680)='&@[\x00') 20:17:35 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xfffffffffffffeae, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffea8, 0x20000001}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00', 0x200085}) socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, &(0x7f0000000000)='l0\x00') socket$kcm(0x10, 0x73043f8a220e6288, 0x0) 20:17:36 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:36 executing program 5: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4001, @empty}, 0x10, 0x0}, 0x20040045) sendmsg$kcm(r0, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff00a}], 0x1}, 0x6d70) 20:17:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x219, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:36 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x24000844) sendmsg(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='f', 0xffffff1f}], 0x8, 0x0, 0x0, 0xf00}, 0x7ffff) 20:17:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:36 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000380)="2e0000002c0081ecdb4cb902070040000d000000ffffffff0000000000200000000000000005186c64f46e740000", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 20:17:36 executing program 5: r0 = socket$kcm(0x10, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000400)=@xdp={0x2c, 0x8}, 0x80, 0x0, 0x0, &(0x7f00000005c0)=[{0x78, 0x113, 0x0, "a42d3559601871df0a7bdff0ef618312612c437692c00547e41b02dd168491f4876c2d63e7c5fd3cdbf746fd8add52f7d3080a3b5284c20607f1d967e378ee379fe349f328682230e97ddc46a631e19ab8abd3a7db84a999e93764dcd5ec41d30c05b0b7e201"}, {0x20, 0x0, 0x0, "949215453bdf09a22a"}], 0x98}, 0xc000) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$kcm(0x21, 0x0, 0x2) sendmsg$kcm(r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[@ANYRESHEX], 0x81000) sendmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000700)=@generic={0x1d, "598f79984bafe64a01ecded2948d30f5c18bbe4e81a6c9bc5cdcb4209e006b73be6b06b042edd1abbe7497f7f4d466e1183774c0a3eab654aea9d136344dfd79427c85ea6981569da60de569473d06c908415b9959748a41a67a2f6e17149132b4821e4f06078e79bb44ad01e169d0be7e6aebac932f8e34b6d11a6d5b24"}, 0x80, 0x0, 0x0, &(0x7f0000000a40)=[{0x10, 0x101}, {0x10, 0x0, 0x1}, {0x10, 0x0, 0x80}, {0x78, 0x114, 0x1, "8708f38350def2256330c2a42917d845dbb50acbcb1444fe59a988c43dee2d9253737962762fb2709b3d07c2a590875c49a9c2dca9743192453acd10112a2af0486190f7f0031da70e2955fcde0c81812c0f12cc408702f6cf3a8d0393a5fb4964fdc73d08ca83"}], 0xa8}, 0x4000) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108030f80ecdb4cb92e0a480e0a10000000e3bd6efb250009600e00360040fefeff050005001201", 0x2e}], 0x1}, 0x0) 20:17:36 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x219, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:36 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000440)="c4", 0x1}], 0x1}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="480000001400e702095f9f95274b0a000a845865400402000000000000006fab078a6a36d47a56aa68c6f8c36d96bd7c497626ff00034000d90000000000000000634310e68b0c89", 0x48}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) [ 352.068393][T13137] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.3'. [ 352.158904][T13141] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.3'. 20:17:36 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:36 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r0 = socket$kcm(0x2, 0x2000000000003, 0x2) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000004c0), 0x10, 0x0}, 0x2404c04d) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000300)={0x2, 0x0, @empty}, 0x10, 0x0}, 0x0) close(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="a73795f20302e73b1141414fec8545984fd65a7636bd01b097ce80d46d389569a87f24b05711166b7f791596b845e521fdb6836ea66245f520a32688cba43b9b2b952e804518d2e93eaa1efdfb50e5413d34a4d56a28f10d67a69660a46faaf08d38b5fec317efeb0670a0ae486ba64bbe965ae8c20927af5e1c2e41435b6ade5bdd58aeadb17c74d7c5e80f038bf6ca04b34489169dfaf26021d2b8d5e26384a9221b38e1"], 0xa6) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0xff000000, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000631177fbac141440e0", 0x0, 0x9}, 0x28) 20:17:36 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x5, 0x1d, 0xcc, 0x3, 0x0, 0x1}, 0x74) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000480)="c3c36bb8bbbc494b461e9f72a085708970137e43914c89958b22bee8d475", &(0x7f00000000c0), 0x3, r1}, 0x38) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000140)=r1, 0x4) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000001c0)={0x0, &(0x7f0000000000)=""/155, &(0x7f0000000640), &(0x7f00000006c0), 0x2, r1}, 0x38) 20:17:36 executing program 2: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:36 executing program 2: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:37 executing program 2: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:37 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x272, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:37 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @empty}, 0x10, 0x0}, 0x200400c4) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0xa0100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) r2 = gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000017c0)={0xffffffffffffffff, 0xc0, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, r2, 0x8000000001, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890c, &(0x7f0000000000)) 20:17:37 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000000002"], &(0x7f0000004600)=""/210, 0x1a, 0xd2, 0x8}, 0x20) 20:17:37 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) [ 352.783781][T13183] BPF:String section is not at the end [ 352.842595][T13189] BPF:String section is not at the end 20:17:37 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xfffffffffffffeae, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffea8, 0x20000001}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x81) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00', 0x200085}) socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000000)='l0\x00') openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:17:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:37 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) socket$kcm(0x2, 0x0, 0x84) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x384, &(0x7f0000000080)=[{&(0x7f0000000100)="2e00000033000535a4abd32b8018007a0124fc60104a0a400c000200053582c137153e37090001802e25640400bd", 0x2e}], 0x1}, 0x0) 20:17:37 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000040)='threaded\x00', 0x9) 20:17:37 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x272, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:37 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x272, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) [ 353.169371][T13214] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 353.215591][T13214] device .0 entered promiscuous mode [ 353.229850][T13214] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 353.252860][T13214] device .1 entered promiscuous mode 20:17:37 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:37 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid\x00') ioctl$TUNSETSNDBUF(r2, 0xb701, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x300) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x90}, 0x0) 20:17:37 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) socket$kcm(0x2, 0x0, 0x84) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x384, &(0x7f0000000080)=[{&(0x7f0000000100)="2e00000033000535a4abd32b8018007a0124fc60104a0a400c000200053582c137153e37090001802e25640400bd", 0x2e}], 0x1}, 0x0) 20:17:37 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x29f, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:38 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000007961e62273faa6884c44827ffe33732b0d27517495db22c369fc01b191533df23e4a10cbd4dfb403d80912aa8ef860dd81e221f886dc0154419e857178e246297048629c6326bfe8f81c360dd7c9efafb9ff34fedbb2ca4d35f6b5f65e8894425d22dce799b0a5d65dee16bffed85ac530e49bbe2cc6e0745503aa6c636e4b0d78e3d530d91e8213cc3f3aa07295e86df0557be41f4f982eb553b1b9e36d77174f29c57c0db60076f5ab193325dbfa90e0edab3ddb5ed8fa984bb0fcb52ad14988f58de2ec276e5d9d9464ede6deb474604da29f1b7d924c96d8c04e5ff44ca849a436284bc99d4b03487b4c221a26c27228aea193cb831124187765d3c1b162bd4e64b2ca92c22afa1ecff1edecd4de1e8d2c88b2b03ad75e3774a70363ad121331b0988b9fa3fd3bdd1f48369863e3c2bc37067a1fe90d7cc733eb753fc3fbe8fa03ed9c061732486e68b39ef5a53cbff4af35dd8a17dd33dfa196911b654e60fa881a77b295a8ed9374cb784e9afcfd308b51b6f00b359d41bfe0240f5aaa9e037891216b4c02291f122c51c1e3291195615f13acdbe142541ba3ba10abca64f1cb9d9c819422bf2cf04699902d8e19a9ba1afc6edc2e615a527698f2f84fec0380be7c3eb1ae1576f0e7e88e57dc1c3f7639768e84dda015f8fa0ecfba22ade43e667d8cc897bec4921aa03227085a7b6ccf4b17ce6e26b345f1cbc0b16312ec7fc71724fcde39982c720fbad55be728acdc4acb8ce24c6fc3bf21e7f2f9c1916f77d6db064ab7ba34debf9fd2d0dd40b341afc6a1be00d1910c024351e926f30153cadfbeb9110ff0696fde63973c0a1d85e37c34d1842d50af6e53ec269554a765414221200100000000de875a58b1a84ce89402b5e85df30dbb831403a21c39fd786a484a7fdadd8cfeee1e47bf7b422fb1fcf950f6f089149174bea357bd84278c7289896b7564d7cc1ca9869f5b51ef37510fc9eced7249aa126585ec91f5d4fc34c445eabef41a3ebfa500bb1b6553579df4fe6a129dc6e63aa066172b5814ecf7d8f5dbe80418ccce705f77"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x4300, &(0x7f0000000280)="b95b03b700030700009e40f008001fffffe100004000638477fbac14143fe0004301c699da153f08a0e6e380f6010af683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b33", 0x0, 0xfd, 0x6000000000000000}, 0x28) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x9b5) 20:17:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000140)) sendmsg$inet(r0, &(0x7f0000000fc0)={&(0x7f00000002c0)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x24000844) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xf, &(0x7f0000000200), 0x4) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000080)='X', 0x1}], 0x1}, 0x0) sendmsg$sock(r1, &(0x7f0000000bc0)={&(0x7f0000000380)=@l2tp6={0xa, 0x0, 0x40, @mcast2, 0x1, 0x3}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000400)="3b04cc85489570a0e2dc1f65c45cf53437c83bcd2e27aed5c2f9b211beb3fbd8b8dc2c1cb9d65772b4c210fb0c82daf2fcfd1597e5477c904899ba48252f1bc5d096f637dbe9d10cf079029799838e16f4034e7c1f4ad545e8f6188de2afda20520757628071f3969a14f9b7c609ef2b231896c91316a1370f9b4283f393f5f2ac90bffbbee3781530cac6e08bc56c36911a716f99d51cd7cd94fc55a53dd440", 0xa0}, {&(0x7f00000006c0)="36310d4eb2548dd7bece88370f26c812c118c98af2e2398a9dc505ca27e81b165f85a526a4cd6f7dd2031d3f17a8e842acdf0c720fb8baeec13bbd746f7ccb47f1ef39db781287ce852e274bddcfca365b915ecebda9a0098245951bedc809ed03cb5033cbe8552d0c6390b99e74035402c61e01250050d29d5d4d74b59185c81aebab8ae063b0bcd09dcd441dca0d153c63e89bda2cf5df1a4226cdbd812df017fff3b602f0ce35", 0xa8}, {&(0x7f0000000300)="3f852f6ec04969aec2936b", 0xb}, {&(0x7f0000000780)="b9a901eda6db29f5afd5af2b793df1ff24f9257d578df9d8a8e783", 0x1b}, {&(0x7f00000007c0)="bfd2f07f69d21012de4effc9f48eea85ed97e3b4028a4a223f6480d78ac6c2795a2ef2cd18418a23baec773fe0a1b434ae1105f006a2650cdcb61fd2dea2d0884bc5f3d72d3465682793341024e8683da4f77cb79d44ebbe7b509679df20a9806c9d04304b0c935e752c7f809afa878d1700d416029c4e7bf2c637dee8b1852edb18a453c7b9fc85f8d7994a330cba176df6fbd7ddba0d0589e22d6abff6ad54f92a1d3f9be776437c0de67e43bab69cbaf8ae030f", 0xb5}, {&(0x7f0000000880)="f483e899bc5b2bdc24f824fe1a0ce0d10d579643f7ead762b182bb717f996d6ae58e38fc2384d1ac8760e0e8ac7a8afbf309ded94fa5708a68cd78aede39b5e1a9571c5eab71242b4fafb320d1dd5984aab3afff5a38148fb1cc54ca7165d026aac4967b5a3c27a5cd13c6fe7ad32040591b4d51e37b", 0x76}, {&(0x7f0000000a80)="f4b180e40d44d8a0da374c85c998cdc1", 0x10}, {&(0x7f0000000940)="1159aabd6e5d27136978b7c94012cfe303504dfb323ba9d6483384abc0978b72a94ad5abb93a340f8f0feb7060f8627067dc2705cd0f019c58678f84e2bd3ea8566b4ff7b124d485903c3f5dedaaa1db63ed820f4710a0233d164644b432fbc6ffc5d624650f87530f8d662b27fd475c5743cfb8ef5b1a588dfb74a55ef5b623728c2d0268e3bcc311cfe3f961531f70dbe9d7172d9fb56500a08be0e4f717d65f48a35a6db0df6cc80bd9feb9eaf09986217ddffdba28e0ff4ff54228c61aed6470be7efc9403a73f0e22e0fcec7df83d9beb6fc00d9b4ad9862df4aaf3f222", 0xe0}, {&(0x7f0000000e00)="c13da9b74d7d4b0b5cc51b1e0584a941e18ac3c910e54f7f48e0c99eb36e8ae96ecd50afe677fe0789cce689e65d69e7a4951644ab65e82d779c309138b613622b3a70289afa14f2bdf5507fc3dd4a317f006532b97143a44c8dfcf36c14103911bed55189e23e0c9b3d96e7ae444bbb782baed1f6b22861c58a22e181a90fd856a9a37c20c40ca653ea3b31e9990beb83517400"/159, 0x9f}], 0x9}, 0x20000804) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000d40)=ANY=[@ANYBLOB="98e943cedd570976893b38cfe7848f5310f60f464e67c1455ef2e7054f48d48ac3b94445a7210ec72aa33b874b60916c5d445f61e4c2e62d3c6d940a14f3f72163ba12160701af90cbd6986c9bf81329509b0b4d9d19ddeb59e3cd4626bb08c6930cce75a43f436a1b55cf5f64f7ef148652eb7dbc608180646a297369e70cab21bb5e12c4c8db5f2c288a649e991f4acf8ee2cab365079838f55a4156b838b85628630c5951357c14047ca4e839485289d196"], 0xda00) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)=0x3) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, &(0x7f0000000040)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f00000004c0)=@can, 0x80, &(0x7f00000009c0)=[{&(0x7f00000006c0)="fca5920dc4da97d438398fd4951ceec88a7b76bcd0075cfa26b534b5af6f01ebe031e3e5f7907fd71bd33eec01777e287d76fa2145cef81fdc27c860eb4a6071d7c76dbd6c47c01740c14351a79a710f74cd18e27adcd7194936d7692c0c1f99d60a430867edca1d16b23d98b0af2c41c387c8025bf376198ee08e0d7dff331d3ca7cfd47e76709b19edbc3d5a023c50c6a8d603f4f2794a753052fbf31718c82b6cbaee513e8ea12aeaa3074e42c68dc216c636c52912d1307c424c2d97ec6b680b4b821db5566119d0403d2e5e52fdc7d31b307bbbe90f0fe1936cf0ba2d7d703b6be81787b2d30ff969fea55be1", 0xef}, {&(0x7f00000007c0)="ee4358a6c535395e9603b73b104ceac1669c629df472bd02a0cb7c1d7b67ccf72861197f7be97fda01c096a0610d3beed58fe0d722b5d6fd3a1c1bffea7892574f90e505db97f839aba54beef61acac306ffd4bc9b33a5e409e5895a713880dfc04ca357d85f3b131ab974b0ae6009c846d895224b679832c37cc7fde4c54645311279ed32b811992ce86d7035", 0x8d}, {0x0}, {0x0}, {&(0x7f0000001580)="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", 0xff0}], 0x5}, 0x40) sendmsg$inet(r1, &(0x7f0000000d00)={&(0x7f00000004c0)={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000500)="c39a23997c62ebcb7b6e", 0xa}, {&(0x7f0000000c00)="4f710b2c1992506fcf246c1bc2ed130ba12f15a58215d8155395846aee8bd9f440255cbfc991a3eef7089922df79788d3387d1860370abca6943ed5e4b2e0a0af261e27f7115dcc2314332df8263e0a16e2400d8dc01780233042be9e7e85d04c5a527611e345484b043b7f17d37e92c11cd12205973eaeac69d051d6e2065416628de3922b8dd52afe0265243d9e319f94e4bbd9dd3da641207d3c86b0a87380fd58e76c61d0612b70f13ef9efe84e08027157bb1593c3ab350397d849a1a83dfc04d925af9549936c9795b8ba7b0288a40679307879c10f547cfb16bf42c470e3ec388409257ae", 0xe8}], 0x2, &(0x7f0000000640)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @local}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}], 0x38}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x15, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff84a6c6ac2a4f0ff0000002d6405000000000065040400010000252b0b5a86cbc0a560b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c74396c8e3ebbadc20e5a7ef8c9ac1465c4d4049fc564e0b9cc7553358380b3a1f59916ffc9bf0bdf81509f07fb2ea80e5cf8dcf819bf58a4fedda52e39c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='f', 0xffffff1f}], 0x8, 0x0, 0x0, 0xf00}, 0x7ffff) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') 20:17:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:38 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) [ 353.600382][T13258] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 353.631177][T13258] device .2 entered promiscuous mode [ 353.672114][T13253] kvm_set_msr_common: 434 callbacks suppressed [ 353.672130][T13253] kvm [13249]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0xc2 data 0x1 [ 353.774815][T13265] device lo entered promiscuous mode [ 353.800790][T13253] kvm [13249]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0xc2 data 0x1 20:17:38 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:38 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/1506], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac141442e6", 0x0, 0x2f, 0x0, 0x0, 0xfffffffffffffe2a}, 0x28) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 353.845676][T13253] kvm [13249]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0xc2 data 0x1 [ 353.854722][T13253] kvm [13249]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0xc2 data 0x1 [ 353.864485][T13253] kvm [13249]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0xc2 data 0x1 [ 353.873623][T13253] kvm [13249]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0xc2 data 0x1 [ 353.882713][T13253] kvm [13249]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0xc2 data 0x1 20:17:38 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x84) bpf$MAP_CREATE(0x0, &(0x7f000000d000)={0x1, 0x8, 0x86, 0x1000d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x900) 20:17:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x29f, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) [ 353.901529][T13253] kvm [13249]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0xc2 data 0x1 [ 353.918560][T13253] kvm [13249]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0xc2 data 0x1 [ 353.939365][T13253] kvm [13249]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0xc2 data 0x1 20:17:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000140)) sendmsg$inet(r0, &(0x7f0000000fc0)={&(0x7f00000002c0)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x24000844) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xf, &(0x7f0000000200), 0x4) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000080)='X', 0x1}], 0x1}, 0x0) sendmsg$sock(r1, &(0x7f0000000bc0)={&(0x7f0000000380)=@l2tp6={0xa, 0x0, 0x40, @mcast2, 0x1, 0x3}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000400)="3b04cc85489570a0e2dc1f65c45cf53437c83bcd2e27aed5c2f9b211beb3fbd8b8dc2c1cb9d65772b4c210fb0c82daf2fcfd1597e5477c904899ba48252f1bc5d096f637dbe9d10cf079029799838e16f4034e7c1f4ad545e8f6188de2afda20520757628071f3969a14f9b7c609ef2b231896c91316a1370f9b4283f393f5f2ac90bffbbee3781530cac6e08bc56c36911a716f99d51cd7cd94fc55a53dd440", 0xa0}, {&(0x7f00000006c0)="36310d4eb2548dd7bece88370f26c812c118c98af2e2398a9dc505ca27e81b165f85a526a4cd6f7dd2031d3f17a8e842acdf0c720fb8baeec13bbd746f7ccb47f1ef39db781287ce852e274bddcfca365b915ecebda9a0098245951bedc809ed03cb5033cbe8552d0c6390b99e74035402c61e01250050d29d5d4d74b59185c81aebab8ae063b0bcd09dcd441dca0d153c63e89bda2cf5df1a4226cdbd812df017fff3b602f0ce35", 0xa8}, {&(0x7f0000000300)="3f852f6ec04969aec2936b", 0xb}, {&(0x7f0000000780)="b9a901eda6db29f5afd5af2b793df1ff24f9257d578df9d8a8e783", 0x1b}, {&(0x7f00000007c0)="bfd2f07f69d21012de4effc9f48eea85ed97e3b4028a4a223f6480d78ac6c2795a2ef2cd18418a23baec773fe0a1b434ae1105f006a2650cdcb61fd2dea2d0884bc5f3d72d3465682793341024e8683da4f77cb79d44ebbe7b509679df20a9806c9d04304b0c935e752c7f809afa878d1700d416029c4e7bf2c637dee8b1852edb18a453c7b9fc85f8d7994a330cba176df6fbd7ddba0d0589e22d6abff6ad54f92a1d3f9be776437c0de67e43bab69cbaf8ae030f", 0xb5}, {&(0x7f0000000880)="f483e899bc5b2bdc24f824fe1a0ce0d10d579643f7ead762b182bb717f996d6ae58e38fc2384d1ac8760e0e8ac7a8afbf309ded94fa5708a68cd78aede39b5e1a9571c5eab71242b4fafb320d1dd5984aab3afff5a38148fb1cc54ca7165d026aac4967b5a3c27a5cd13c6fe7ad32040591b4d51e37b", 0x76}, {&(0x7f0000000a80)="f4b180e40d44d8a0da374c85c998cdc1", 0x10}, {&(0x7f0000000940)="1159aabd6e5d27136978b7c94012cfe303504dfb323ba9d6483384abc0978b72a94ad5abb93a340f8f0feb7060f8627067dc2705cd0f019c58678f84e2bd3ea8566b4ff7b124d485903c3f5dedaaa1db63ed820f4710a0233d164644b432fbc6ffc5d624650f87530f8d662b27fd475c5743cfb8ef5b1a588dfb74a55ef5b623728c2d0268e3bcc311cfe3f961531f70dbe9d7172d9fb56500a08be0e4f717d65f48a35a6db0df6cc80bd9feb9eaf09986217ddffdba28e0ff4ff54228c61aed6470be7efc9403a73f0e22e0fcec7df83d9beb6fc00d9b4ad9862df4aaf3f222", 0xe0}, {&(0x7f0000000e00)="c13da9b74d7d4b0b5cc51b1e0584a941e18ac3c910e54f7f48e0c99eb36e8ae96ecd50afe677fe0789cce689e65d69e7a4951644ab65e82d779c309138b613622b3a70289afa14f2bdf5507fc3dd4a317f006532b97143a44c8dfcf36c14103911bed55189e23e0c9b3d96e7ae444bbb782baed1f6b22861c58a22e181a90fd856a9a37c20c40ca653ea3b31e9990beb83517400"/159, 0x9f}], 0x9}, 0x20000804) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000d40)=ANY=[@ANYBLOB="98e943cedd570976893b38cfe7848f5310f60f464e67c1455ef2e7054f48d48ac3b94445a7210ec72aa33b874b60916c5d445f61e4c2e62d3c6d940a14f3f72163ba12160701af90cbd6986c9bf81329509b0b4d9d19ddeb59e3cd4626bb08c6930cce75a43f436a1b55cf5f64f7ef148652eb7dbc608180646a297369e70cab21bb5e12c4c8db5f2c288a649e991f4acf8ee2cab365079838f55a4156b838b85628630c5951357c14047ca4e839485289d196"], 0xda00) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)=0x3) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, &(0x7f0000000040)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f00000004c0)=@can, 0x80, &(0x7f00000009c0)=[{&(0x7f00000006c0)="fca5920dc4da97d438398fd4951ceec88a7b76bcd0075cfa26b534b5af6f01ebe031e3e5f7907fd71bd33eec01777e287d76fa2145cef81fdc27c860eb4a6071d7c76dbd6c47c01740c14351a79a710f74cd18e27adcd7194936d7692c0c1f99d60a430867edca1d16b23d98b0af2c41c387c8025bf376198ee08e0d7dff331d3ca7cfd47e76709b19edbc3d5a023c50c6a8d603f4f2794a753052fbf31718c82b6cbaee513e8ea12aeaa3074e42c68dc216c636c52912d1307c424c2d97ec6b680b4b821db5566119d0403d2e5e52fdc7d31b307bbbe90f0fe1936cf0ba2d7d703b6be81787b2d30ff969fea55be1", 0xef}, {&(0x7f00000007c0)="ee4358a6c535395e9603b73b104ceac1669c629df472bd02a0cb7c1d7b67ccf72861197f7be97fda01c096a0610d3beed58fe0d722b5d6fd3a1c1bffea7892574f90e505db97f839aba54beef61acac306ffd4bc9b33a5e409e5895a713880dfc04ca357d85f3b131ab974b0ae6009c846d895224b679832c37cc7fde4c54645311279ed32b811992ce86d7035", 0x8d}, {0x0}, {0x0}, {&(0x7f0000001580)="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", 0xff0}], 0x5}, 0x40) sendmsg$inet(r1, &(0x7f0000000d00)={&(0x7f00000004c0)={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000500)="c39a23997c62ebcb7b6e", 0xa}, {&(0x7f0000000c00)="4f710b2c1992506fcf246c1bc2ed130ba12f15a58215d8155395846aee8bd9f440255cbfc991a3eef7089922df79788d3387d1860370abca6943ed5e4b2e0a0af261e27f7115dcc2314332df8263e0a16e2400d8dc01780233042be9e7e85d04c5a527611e345484b043b7f17d37e92c11cd12205973eaeac69d051d6e2065416628de3922b8dd52afe0265243d9e319f94e4bbd9dd3da641207d3c86b0a87380fd58e76c61d0612b70f13ef9efe84e08027157bb1593c3ab350397d849a1a83dfc04d925af9549936c9795b8ba7b0288a40679307879c10f547cfb16bf42c470e3ec388409257ae", 0xe8}], 0x2, &(0x7f0000000640)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @local}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}], 0x38}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x15, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff84a6c6ac2a4f0ff0000002d6405000000000065040400010000252b0b5a86cbc0a560b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c74396c8e3ebbadc20e5a7ef8c9ac1465c4d4049fc564e0b9cc7553358380b3a1f59916ffc9bf0bdf81509f07fb2ea80e5cf8dcf819bf58a4fedda52e39c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='f', 0xffffff1f}], 0x8, 0x0, 0x0, 0xf00}, 0x7ffff) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') 20:17:38 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:38 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/1506], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac141442e6", 0x0, 0x2f, 0x0, 0x0, 0xfffffffffffffe2a}, 0x28) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 20:17:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000140)) sendmsg$inet(r0, &(0x7f0000000fc0)={&(0x7f00000002c0)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x24000844) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xf, &(0x7f0000000200), 0x4) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000080)='X', 0x1}], 0x1}, 0x0) sendmsg$sock(r1, &(0x7f0000000bc0)={&(0x7f0000000380)=@l2tp6={0xa, 0x0, 0x40, @mcast2, 0x1, 0x3}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000400)="3b04cc85489570a0e2dc1f65c45cf53437c83bcd2e27aed5c2f9b211beb3fbd8b8dc2c1cb9d65772b4c210fb0c82daf2fcfd1597e5477c904899ba48252f1bc5d096f637dbe9d10cf079029799838e16f4034e7c1f4ad545e8f6188de2afda20520757628071f3969a14f9b7c609ef2b231896c91316a1370f9b4283f393f5f2ac90bffbbee3781530cac6e08bc56c36911a716f99d51cd7cd94fc55a53dd440", 0xa0}, {&(0x7f00000006c0)="36310d4eb2548dd7bece88370f26c812c118c98af2e2398a9dc505ca27e81b165f85a526a4cd6f7dd2031d3f17a8e842acdf0c720fb8baeec13bbd746f7ccb47f1ef39db781287ce852e274bddcfca365b915ecebda9a0098245951bedc809ed03cb5033cbe8552d0c6390b99e74035402c61e01250050d29d5d4d74b59185c81aebab8ae063b0bcd09dcd441dca0d153c63e89bda2cf5df1a4226cdbd812df017fff3b602f0ce35", 0xa8}, {&(0x7f0000000300)="3f852f6ec04969aec2936b", 0xb}, {&(0x7f0000000780)="b9a901eda6db29f5afd5af2b793df1ff24f9257d578df9d8a8e783", 0x1b}, {&(0x7f00000007c0)="bfd2f07f69d21012de4effc9f48eea85ed97e3b4028a4a223f6480d78ac6c2795a2ef2cd18418a23baec773fe0a1b434ae1105f006a2650cdcb61fd2dea2d0884bc5f3d72d3465682793341024e8683da4f77cb79d44ebbe7b509679df20a9806c9d04304b0c935e752c7f809afa878d1700d416029c4e7bf2c637dee8b1852edb18a453c7b9fc85f8d7994a330cba176df6fbd7ddba0d0589e22d6abff6ad54f92a1d3f9be776437c0de67e43bab69cbaf8ae030f", 0xb5}, {&(0x7f0000000880)="f483e899bc5b2bdc24f824fe1a0ce0d10d579643f7ead762b182bb717f996d6ae58e38fc2384d1ac8760e0e8ac7a8afbf309ded94fa5708a68cd78aede39b5e1a9571c5eab71242b4fafb320d1dd5984aab3afff5a38148fb1cc54ca7165d026aac4967b5a3c27a5cd13c6fe7ad32040591b4d51e37b", 0x76}, {&(0x7f0000000a80)="f4b180e40d44d8a0da374c85c998cdc1", 0x10}, {&(0x7f0000000940)="1159aabd6e5d27136978b7c94012cfe303504dfb323ba9d6483384abc0978b72a94ad5abb93a340f8f0feb7060f8627067dc2705cd0f019c58678f84e2bd3ea8566b4ff7b124d485903c3f5dedaaa1db63ed820f4710a0233d164644b432fbc6ffc5d624650f87530f8d662b27fd475c5743cfb8ef5b1a588dfb74a55ef5b623728c2d0268e3bcc311cfe3f961531f70dbe9d7172d9fb56500a08be0e4f717d65f48a35a6db0df6cc80bd9feb9eaf09986217ddffdba28e0ff4ff54228c61aed6470be7efc9403a73f0e22e0fcec7df83d9beb6fc00d9b4ad9862df4aaf3f222", 0xe0}, {&(0x7f0000000e00)="c13da9b74d7d4b0b5cc51b1e0584a941e18ac3c910e54f7f48e0c99eb36e8ae96ecd50afe677fe0789cce689e65d69e7a4951644ab65e82d779c309138b613622b3a70289afa14f2bdf5507fc3dd4a317f006532b97143a44c8dfcf36c14103911bed55189e23e0c9b3d96e7ae444bbb782baed1f6b22861c58a22e181a90fd856a9a37c20c40ca653ea3b31e9990beb83517400"/159, 0x9f}], 0x9}, 0x20000804) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000d40)=ANY=[@ANYBLOB="98e943cedd570976893b38cfe7848f5310f60f464e67c1455ef2e7054f48d48ac3b94445a7210ec72aa33b874b60916c5d445f61e4c2e62d3c6d940a14f3f72163ba12160701af90cbd6986c9bf81329509b0b4d9d19ddeb59e3cd4626bb08c6930cce75a43f436a1b55cf5f64f7ef148652eb7dbc608180646a297369e70cab21bb5e12c4c8db5f2c288a649e991f4acf8ee2cab365079838f55a4156b838b85628630c5951357c14047ca4e839485289d196"], 0xda00) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)=0x3) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, &(0x7f0000000040)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f00000004c0)=@can, 0x80, &(0x7f00000009c0)=[{&(0x7f00000006c0)="fca5920dc4da97d438398fd4951ceec88a7b76bcd0075cfa26b534b5af6f01ebe031e3e5f7907fd71bd33eec01777e287d76fa2145cef81fdc27c860eb4a6071d7c76dbd6c47c01740c14351a79a710f74cd18e27adcd7194936d7692c0c1f99d60a430867edca1d16b23d98b0af2c41c387c8025bf376198ee08e0d7dff331d3ca7cfd47e76709b19edbc3d5a023c50c6a8d603f4f2794a753052fbf31718c82b6cbaee513e8ea12aeaa3074e42c68dc216c636c52912d1307c424c2d97ec6b680b4b821db5566119d0403d2e5e52fdc7d31b307bbbe90f0fe1936cf0ba2d7d703b6be81787b2d30ff969fea55be1", 0xef}, {&(0x7f00000007c0)="ee4358a6c535395e9603b73b104ceac1669c629df472bd02a0cb7c1d7b67ccf72861197f7be97fda01c096a0610d3beed58fe0d722b5d6fd3a1c1bffea7892574f90e505db97f839aba54beef61acac306ffd4bc9b33a5e409e5895a713880dfc04ca357d85f3b131ab974b0ae6009c846d895224b679832c37cc7fde4c54645311279ed32b811992ce86d7035", 0x8d}, {0x0}, {0x0}, {&(0x7f0000001580)="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", 0xff0}], 0x5}, 0x40) sendmsg$inet(r1, &(0x7f0000000d00)={&(0x7f00000004c0)={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000500)="c39a23997c62ebcb7b6e", 0xa}, {&(0x7f0000000c00)="4f710b2c1992506fcf246c1bc2ed130ba12f15a58215d8155395846aee8bd9f440255cbfc991a3eef7089922df79788d3387d1860370abca6943ed5e4b2e0a0af261e27f7115dcc2314332df8263e0a16e2400d8dc01780233042be9e7e85d04c5a527611e345484b043b7f17d37e92c11cd12205973eaeac69d051d6e2065416628de3922b8dd52afe0265243d9e319f94e4bbd9dd3da641207d3c86b0a87380fd58e76c61d0612b70f13ef9efe84e08027157bb1593c3ab350397d849a1a83dfc04d925af9549936c9795b8ba7b0288a40679307879c10f547cfb16bf42c470e3ec388409257ae", 0xe8}], 0x2, &(0x7f0000000640)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @local}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}], 0x38}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x15, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff84a6c6ac2a4f0ff0000002d6405000000000065040400010000252b0b5a86cbc0a560b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c74396c8e3ebbadc20e5a7ef8c9ac1465c4d4049fc564e0b9cc7553358380b3a1f59916ffc9bf0bdf81509f07fb2ea80e5cf8dcf819bf58a4fedda52e39c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='f', 0xffffff1f}], 0x8, 0x0, 0x0, 0xf00}, 0x7ffff) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') 20:17:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x29f, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000140)) sendmsg$inet(r0, &(0x7f0000000fc0)={&(0x7f00000002c0)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x24000844) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xf, &(0x7f0000000200), 0x4) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000080)='X', 0x1}], 0x1}, 0x0) sendmsg$sock(r1, &(0x7f0000000bc0)={&(0x7f0000000380)=@l2tp6={0xa, 0x0, 0x40, @mcast2, 0x1, 0x3}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000400)="3b04cc85489570a0e2dc1f65c45cf53437c83bcd2e27aed5c2f9b211beb3fbd8b8dc2c1cb9d65772b4c210fb0c82daf2fcfd1597e5477c904899ba48252f1bc5d096f637dbe9d10cf079029799838e16f4034e7c1f4ad545e8f6188de2afda20520757628071f3969a14f9b7c609ef2b231896c91316a1370f9b4283f393f5f2ac90bffbbee3781530cac6e08bc56c36911a716f99d51cd7cd94fc55a53dd440", 0xa0}, {&(0x7f00000006c0)="36310d4eb2548dd7bece88370f26c812c118c98af2e2398a9dc505ca27e81b165f85a526a4cd6f7dd2031d3f17a8e842acdf0c720fb8baeec13bbd746f7ccb47f1ef39db781287ce852e274bddcfca365b915ecebda9a0098245951bedc809ed03cb5033cbe8552d0c6390b99e74035402c61e01250050d29d5d4d74b59185c81aebab8ae063b0bcd09dcd441dca0d153c63e89bda2cf5df1a4226cdbd812df017fff3b602f0ce35", 0xa8}, {&(0x7f0000000300)="3f852f6ec04969aec2936b", 0xb}, {&(0x7f0000000780)="b9a901eda6db29f5afd5af2b793df1ff24f9257d578df9d8a8e783", 0x1b}, {&(0x7f00000007c0)="bfd2f07f69d21012de4effc9f48eea85ed97e3b4028a4a223f6480d78ac6c2795a2ef2cd18418a23baec773fe0a1b434ae1105f006a2650cdcb61fd2dea2d0884bc5f3d72d3465682793341024e8683da4f77cb79d44ebbe7b509679df20a9806c9d04304b0c935e752c7f809afa878d1700d416029c4e7bf2c637dee8b1852edb18a453c7b9fc85f8d7994a330cba176df6fbd7ddba0d0589e22d6abff6ad54f92a1d3f9be776437c0de67e43bab69cbaf8ae030f", 0xb5}, {&(0x7f0000000880)="f483e899bc5b2bdc24f824fe1a0ce0d10d579643f7ead762b182bb717f996d6ae58e38fc2384d1ac8760e0e8ac7a8afbf309ded94fa5708a68cd78aede39b5e1a9571c5eab71242b4fafb320d1dd5984aab3afff5a38148fb1cc54ca7165d026aac4967b5a3c27a5cd13c6fe7ad32040591b4d51e37b", 0x76}, {&(0x7f0000000a80)="f4b180e40d44d8a0da374c85c998cdc1", 0x10}, {&(0x7f0000000940)="1159aabd6e5d27136978b7c94012cfe303504dfb323ba9d6483384abc0978b72a94ad5abb93a340f8f0feb7060f8627067dc2705cd0f019c58678f84e2bd3ea8566b4ff7b124d485903c3f5dedaaa1db63ed820f4710a0233d164644b432fbc6ffc5d624650f87530f8d662b27fd475c5743cfb8ef5b1a588dfb74a55ef5b623728c2d0268e3bcc311cfe3f961531f70dbe9d7172d9fb56500a08be0e4f717d65f48a35a6db0df6cc80bd9feb9eaf09986217ddffdba28e0ff4ff54228c61aed6470be7efc9403a73f0e22e0fcec7df83d9beb6fc00d9b4ad9862df4aaf3f222", 0xe0}, {&(0x7f0000000e00)="c13da9b74d7d4b0b5cc51b1e0584a941e18ac3c910e54f7f48e0c99eb36e8ae96ecd50afe677fe0789cce689e65d69e7a4951644ab65e82d779c309138b613622b3a70289afa14f2bdf5507fc3dd4a317f006532b97143a44c8dfcf36c14103911bed55189e23e0c9b3d96e7ae444bbb782baed1f6b22861c58a22e181a90fd856a9a37c20c40ca653ea3b31e9990beb83517400"/159, 0x9f}], 0x9}, 0x20000804) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000d40)=ANY=[@ANYBLOB="98e943cedd570976893b38cfe7848f5310f60f464e67c1455ef2e7054f48d48ac3b94445a7210ec72aa33b874b60916c5d445f61e4c2e62d3c6d940a14f3f72163ba12160701af90cbd6986c9bf81329509b0b4d9d19ddeb59e3cd4626bb08c6930cce75a43f436a1b55cf5f64f7ef148652eb7dbc608180646a297369e70cab21bb5e12c4c8db5f2c288a649e991f4acf8ee2cab365079838f55a4156b838b85628630c5951357c14047ca4e839485289d196"], 0xda00) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)=0x3) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, &(0x7f0000000040)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f00000004c0)=@can, 0x80, &(0x7f00000009c0)=[{&(0x7f00000006c0)="fca5920dc4da97d438398fd4951ceec88a7b76bcd0075cfa26b534b5af6f01ebe031e3e5f7907fd71bd33eec01777e287d76fa2145cef81fdc27c860eb4a6071d7c76dbd6c47c01740c14351a79a710f74cd18e27adcd7194936d7692c0c1f99d60a430867edca1d16b23d98b0af2c41c387c8025bf376198ee08e0d7dff331d3ca7cfd47e76709b19edbc3d5a023c50c6a8d603f4f2794a753052fbf31718c82b6cbaee513e8ea12aeaa3074e42c68dc216c636c52912d1307c424c2d97ec6b680b4b821db5566119d0403d2e5e52fdc7d31b307bbbe90f0fe1936cf0ba2d7d703b6be81787b2d30ff969fea55be1", 0xef}, {&(0x7f00000007c0)="ee4358a6c535395e9603b73b104ceac1669c629df472bd02a0cb7c1d7b67ccf72861197f7be97fda01c096a0610d3beed58fe0d722b5d6fd3a1c1bffea7892574f90e505db97f839aba54beef61acac306ffd4bc9b33a5e409e5895a713880dfc04ca357d85f3b131ab974b0ae6009c846d895224b679832c37cc7fde4c54645311279ed32b811992ce86d7035", 0x8d}, {0x0}, {0x0}, {&(0x7f0000001580)="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", 0xff0}], 0x5}, 0x40) sendmsg$inet(r1, &(0x7f0000000d00)={&(0x7f00000004c0)={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000500)="c39a23997c62ebcb7b6e", 0xa}, {&(0x7f0000000c00)="4f710b2c1992506fcf246c1bc2ed130ba12f15a58215d8155395846aee8bd9f440255cbfc991a3eef7089922df79788d3387d1860370abca6943ed5e4b2e0a0af261e27f7115dcc2314332df8263e0a16e2400d8dc01780233042be9e7e85d04c5a527611e345484b043b7f17d37e92c11cd12205973eaeac69d051d6e2065416628de3922b8dd52afe0265243d9e319f94e4bbd9dd3da641207d3c86b0a87380fd58e76c61d0612b70f13ef9efe84e08027157bb1593c3ab350397d849a1a83dfc04d925af9549936c9795b8ba7b0288a40679307879c10f547cfb16bf42c470e3ec388409257ae", 0xe8}], 0x2, &(0x7f0000000640)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @local}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}], 0x38}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x15, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff84a6c6ac2a4f0ff0000002d6405000000000065040400010000252b0b5a86cbc0a560b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c74396c8e3ebbadc20e5a7ef8c9ac1465c4d4049fc564e0b9cc7553358380b3a1f59916ffc9bf0bdf81509f07fb2ea80e5cf8dcf819bf58a4fedda52e39c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='f', 0xffffff1f}], 0x8, 0x0, 0x0, 0xf00}, 0x7ffff) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') 20:17:39 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) [ 354.576720][T13315] device lo entered promiscuous mode 20:17:39 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:39 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 354.790286][T13320] device lo entered promiscuous mode 20:17:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2b5, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:39 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000140)) sendmsg$inet(r0, &(0x7f0000000fc0)={&(0x7f00000002c0)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x24000844) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xf, &(0x7f0000000200), 0x4) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000080)='X', 0x1}], 0x1}, 0x0) sendmsg$sock(r1, &(0x7f0000000bc0)={&(0x7f0000000380)=@l2tp6={0xa, 0x0, 0x40, @mcast2, 0x1, 0x3}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000400)="3b04cc85489570a0e2dc1f65c45cf53437c83bcd2e27aed5c2f9b211beb3fbd8b8dc2c1cb9d65772b4c210fb0c82daf2fcfd1597e5477c904899ba48252f1bc5d096f637dbe9d10cf079029799838e16f4034e7c1f4ad545e8f6188de2afda20520757628071f3969a14f9b7c609ef2b231896c91316a1370f9b4283f393f5f2ac90bffbbee3781530cac6e08bc56c36911a716f99d51cd7cd94fc55a53dd440", 0xa0}, {&(0x7f00000006c0)="36310d4eb2548dd7bece88370f26c812c118c98af2e2398a9dc505ca27e81b165f85a526a4cd6f7dd2031d3f17a8e842acdf0c720fb8baeec13bbd746f7ccb47f1ef39db781287ce852e274bddcfca365b915ecebda9a0098245951bedc809ed03cb5033cbe8552d0c6390b99e74035402c61e01250050d29d5d4d74b59185c81aebab8ae063b0bcd09dcd441dca0d153c63e89bda2cf5df1a4226cdbd812df017fff3b602f0ce35", 0xa8}, {&(0x7f0000000300)="3f852f6ec04969aec2936b", 0xb}, {&(0x7f0000000780)="b9a901eda6db29f5afd5af2b793df1ff24f9257d578df9d8a8e783", 0x1b}, {&(0x7f00000007c0)="bfd2f07f69d21012de4effc9f48eea85ed97e3b4028a4a223f6480d78ac6c2795a2ef2cd18418a23baec773fe0a1b434ae1105f006a2650cdcb61fd2dea2d0884bc5f3d72d3465682793341024e8683da4f77cb79d44ebbe7b509679df20a9806c9d04304b0c935e752c7f809afa878d1700d416029c4e7bf2c637dee8b1852edb18a453c7b9fc85f8d7994a330cba176df6fbd7ddba0d0589e22d6abff6ad54f92a1d3f9be776437c0de67e43bab69cbaf8ae030f", 0xb5}, {&(0x7f0000000880)="f483e899bc5b2bdc24f824fe1a0ce0d10d579643f7ead762b182bb717f996d6ae58e38fc2384d1ac8760e0e8ac7a8afbf309ded94fa5708a68cd78aede39b5e1a9571c5eab71242b4fafb320d1dd5984aab3afff5a38148fb1cc54ca7165d026aac4967b5a3c27a5cd13c6fe7ad32040591b4d51e37b", 0x76}, {&(0x7f0000000a80)="f4b180e40d44d8a0da374c85c998cdc1", 0x10}, {&(0x7f0000000940)="1159aabd6e5d27136978b7c94012cfe303504dfb323ba9d6483384abc0978b72a94ad5abb93a340f8f0feb7060f8627067dc2705cd0f019c58678f84e2bd3ea8566b4ff7b124d485903c3f5dedaaa1db63ed820f4710a0233d164644b432fbc6ffc5d624650f87530f8d662b27fd475c5743cfb8ef5b1a588dfb74a55ef5b623728c2d0268e3bcc311cfe3f961531f70dbe9d7172d9fb56500a08be0e4f717d65f48a35a6db0df6cc80bd9feb9eaf09986217ddffdba28e0ff4ff54228c61aed6470be7efc9403a73f0e22e0fcec7df83d9beb6fc00d9b4ad9862df4aaf3f222", 0xe0}, {&(0x7f0000000e00)="c13da9b74d7d4b0b5cc51b1e0584a941e18ac3c910e54f7f48e0c99eb36e8ae96ecd50afe677fe0789cce689e65d69e7a4951644ab65e82d779c309138b613622b3a70289afa14f2bdf5507fc3dd4a317f006532b97143a44c8dfcf36c14103911bed55189e23e0c9b3d96e7ae444bbb782baed1f6b22861c58a22e181a90fd856a9a37c20c40ca653ea3b31e9990beb83517400"/159, 0x9f}], 0x9}, 0x20000804) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000d40)=ANY=[@ANYBLOB="98e943cedd570976893b38cfe7848f5310f60f464e67c1455ef2e7054f48d48ac3b94445a7210ec72aa33b874b60916c5d445f61e4c2e62d3c6d940a14f3f72163ba12160701af90cbd6986c9bf81329509b0b4d9d19ddeb59e3cd4626bb08c6930cce75a43f436a1b55cf5f64f7ef148652eb7dbc608180646a297369e70cab21bb5e12c4c8db5f2c288a649e991f4acf8ee2cab365079838f55a4156b838b85628630c5951357c14047ca4e839485289d196"], 0xda00) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)=0x3) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, &(0x7f0000000040)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f00000004c0)=@can, 0x80, &(0x7f00000009c0)=[{&(0x7f00000006c0)="fca5920dc4da97d438398fd4951ceec88a7b76bcd0075cfa26b534b5af6f01ebe031e3e5f7907fd71bd33eec01777e287d76fa2145cef81fdc27c860eb4a6071d7c76dbd6c47c01740c14351a79a710f74cd18e27adcd7194936d7692c0c1f99d60a430867edca1d16b23d98b0af2c41c387c8025bf376198ee08e0d7dff331d3ca7cfd47e76709b19edbc3d5a023c50c6a8d603f4f2794a753052fbf31718c82b6cbaee513e8ea12aeaa3074e42c68dc216c636c52912d1307c424c2d97ec6b680b4b821db5566119d0403d2e5e52fdc7d31b307bbbe90f0fe1936cf0ba2d7d703b6be81787b2d30ff969fea55be1", 0xef}, {&(0x7f00000007c0)="ee4358a6c535395e9603b73b104ceac1669c629df472bd02a0cb7c1d7b67ccf72861197f7be97fda01c096a0610d3beed58fe0d722b5d6fd3a1c1bffea7892574f90e505db97f839aba54beef61acac306ffd4bc9b33a5e409e5895a713880dfc04ca357d85f3b131ab974b0ae6009c846d895224b679832c37cc7fde4c54645311279ed32b811992ce86d7035", 0x8d}, {0x0}, {0x0}, {&(0x7f0000001580)="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", 0xff0}], 0x5}, 0x40) sendmsg$inet(r1, &(0x7f0000000d00)={&(0x7f00000004c0)={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000500)="c39a23997c62ebcb7b6e", 0xa}, {&(0x7f0000000c00)="4f710b2c1992506fcf246c1bc2ed130ba12f15a58215d8155395846aee8bd9f440255cbfc991a3eef7089922df79788d3387d1860370abca6943ed5e4b2e0a0af261e27f7115dcc2314332df8263e0a16e2400d8dc01780233042be9e7e85d04c5a527611e345484b043b7f17d37e92c11cd12205973eaeac69d051d6e2065416628de3922b8dd52afe0265243d9e319f94e4bbd9dd3da641207d3c86b0a87380fd58e76c61d0612b70f13ef9efe84e08027157bb1593c3ab350397d849a1a83dfc04d925af9549936c9795b8ba7b0288a40679307879c10f547cfb16bf42c470e3ec388409257ae", 0xe8}], 0x2, &(0x7f0000000640)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @local}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}], 0x38}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x15, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff84a6c6ac2a4f0ff0000002d6405000000000065040400010000252b0b5a86cbc0a560b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c74396c8e3ebbadc20e5a7ef8c9ac1465c4d4049fc564e0b9cc7553358380b3a1f59916ffc9bf0bdf81509f07fb2ea80e5cf8dcf819bf58a4fedda52e39c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='f', 0xffffff1f}], 0x8, 0x0, 0x0, 0xf00}, 0x7ffff) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') 20:17:39 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2b5, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000140)) sendmsg$inet(r0, &(0x7f0000000fc0)={&(0x7f00000002c0)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x24000844) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xf, &(0x7f0000000200), 0x4) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000080)='X', 0x1}], 0x1}, 0x0) sendmsg$sock(r1, &(0x7f0000000bc0)={&(0x7f0000000380)=@l2tp6={0xa, 0x0, 0x40, @mcast2, 0x1, 0x3}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000400)="3b04cc85489570a0e2dc1f65c45cf53437c83bcd2e27aed5c2f9b211beb3fbd8b8dc2c1cb9d65772b4c210fb0c82daf2fcfd1597e5477c904899ba48252f1bc5d096f637dbe9d10cf079029799838e16f4034e7c1f4ad545e8f6188de2afda20520757628071f3969a14f9b7c609ef2b231896c91316a1370f9b4283f393f5f2ac90bffbbee3781530cac6e08bc56c36911a716f99d51cd7cd94fc55a53dd440", 0xa0}, {&(0x7f00000006c0)="36310d4eb2548dd7bece88370f26c812c118c98af2e2398a9dc505ca27e81b165f85a526a4cd6f7dd2031d3f17a8e842acdf0c720fb8baeec13bbd746f7ccb47f1ef39db781287ce852e274bddcfca365b915ecebda9a0098245951bedc809ed03cb5033cbe8552d0c6390b99e74035402c61e01250050d29d5d4d74b59185c81aebab8ae063b0bcd09dcd441dca0d153c63e89bda2cf5df1a4226cdbd812df017fff3b602f0ce35", 0xa8}, {&(0x7f0000000300)="3f852f6ec04969aec2936b", 0xb}, {&(0x7f0000000780)="b9a901eda6db29f5afd5af2b793df1ff24f9257d578df9d8a8e783", 0x1b}, {&(0x7f00000007c0)="bfd2f07f69d21012de4effc9f48eea85ed97e3b4028a4a223f6480d78ac6c2795a2ef2cd18418a23baec773fe0a1b434ae1105f006a2650cdcb61fd2dea2d0884bc5f3d72d3465682793341024e8683da4f77cb79d44ebbe7b509679df20a9806c9d04304b0c935e752c7f809afa878d1700d416029c4e7bf2c637dee8b1852edb18a453c7b9fc85f8d7994a330cba176df6fbd7ddba0d0589e22d6abff6ad54f92a1d3f9be776437c0de67e43bab69cbaf8ae030f", 0xb5}, {&(0x7f0000000880)="f483e899bc5b2bdc24f824fe1a0ce0d10d579643f7ead762b182bb717f996d6ae58e38fc2384d1ac8760e0e8ac7a8afbf309ded94fa5708a68cd78aede39b5e1a9571c5eab71242b4fafb320d1dd5984aab3afff5a38148fb1cc54ca7165d026aac4967b5a3c27a5cd13c6fe7ad32040591b4d51e37b", 0x76}, {&(0x7f0000000a80)="f4b180e40d44d8a0da374c85c998cdc1", 0x10}, {&(0x7f0000000940)="1159aabd6e5d27136978b7c94012cfe303504dfb323ba9d6483384abc0978b72a94ad5abb93a340f8f0feb7060f8627067dc2705cd0f019c58678f84e2bd3ea8566b4ff7b124d485903c3f5dedaaa1db63ed820f4710a0233d164644b432fbc6ffc5d624650f87530f8d662b27fd475c5743cfb8ef5b1a588dfb74a55ef5b623728c2d0268e3bcc311cfe3f961531f70dbe9d7172d9fb56500a08be0e4f717d65f48a35a6db0df6cc80bd9feb9eaf09986217ddffdba28e0ff4ff54228c61aed6470be7efc9403a73f0e22e0fcec7df83d9beb6fc00d9b4ad9862df4aaf3f222", 0xe0}, {&(0x7f0000000e00)="c13da9b74d7d4b0b5cc51b1e0584a941e18ac3c910e54f7f48e0c99eb36e8ae96ecd50afe677fe0789cce689e65d69e7a4951644ab65e82d779c309138b613622b3a70289afa14f2bdf5507fc3dd4a317f006532b97143a44c8dfcf36c14103911bed55189e23e0c9b3d96e7ae444bbb782baed1f6b22861c58a22e181a90fd856a9a37c20c40ca653ea3b31e9990beb83517400"/159, 0x9f}], 0x9}, 0x20000804) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000d40)=ANY=[@ANYBLOB="98e943cedd570976893b38cfe7848f5310f60f464e67c1455ef2e7054f48d48ac3b94445a7210ec72aa33b874b60916c5d445f61e4c2e62d3c6d940a14f3f72163ba12160701af90cbd6986c9bf81329509b0b4d9d19ddeb59e3cd4626bb08c6930cce75a43f436a1b55cf5f64f7ef148652eb7dbc608180646a297369e70cab21bb5e12c4c8db5f2c288a649e991f4acf8ee2cab365079838f55a4156b838b85628630c5951357c14047ca4e839485289d196"], 0xda00) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)=0x3) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, &(0x7f0000000040)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f00000004c0)=@can, 0x80, &(0x7f00000009c0)=[{&(0x7f00000006c0)="fca5920dc4da97d438398fd4951ceec88a7b76bcd0075cfa26b534b5af6f01ebe031e3e5f7907fd71bd33eec01777e287d76fa2145cef81fdc27c860eb4a6071d7c76dbd6c47c01740c14351a79a710f74cd18e27adcd7194936d7692c0c1f99d60a430867edca1d16b23d98b0af2c41c387c8025bf376198ee08e0d7dff331d3ca7cfd47e76709b19edbc3d5a023c50c6a8d603f4f2794a753052fbf31718c82b6cbaee513e8ea12aeaa3074e42c68dc216c636c52912d1307c424c2d97ec6b680b4b821db5566119d0403d2e5e52fdc7d31b307bbbe90f0fe1936cf0ba2d7d703b6be81787b2d30ff969fea55be1", 0xef}, {&(0x7f00000007c0)="ee4358a6c535395e9603b73b104ceac1669c629df472bd02a0cb7c1d7b67ccf72861197f7be97fda01c096a0610d3beed58fe0d722b5d6fd3a1c1bffea7892574f90e505db97f839aba54beef61acac306ffd4bc9b33a5e409e5895a713880dfc04ca357d85f3b131ab974b0ae6009c846d895224b679832c37cc7fde4c54645311279ed32b811992ce86d7035", 0x8d}, {0x0}, {0x0}, {&(0x7f0000001580)="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", 0xff0}], 0x5}, 0x40) sendmsg$inet(r1, &(0x7f0000000d00)={&(0x7f00000004c0)={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000500)="c39a23997c62ebcb7b6e", 0xa}, {&(0x7f0000000c00)="4f710b2c1992506fcf246c1bc2ed130ba12f15a58215d8155395846aee8bd9f440255cbfc991a3eef7089922df79788d3387d1860370abca6943ed5e4b2e0a0af261e27f7115dcc2314332df8263e0a16e2400d8dc01780233042be9e7e85d04c5a527611e345484b043b7f17d37e92c11cd12205973eaeac69d051d6e2065416628de3922b8dd52afe0265243d9e319f94e4bbd9dd3da641207d3c86b0a87380fd58e76c61d0612b70f13ef9efe84e08027157bb1593c3ab350397d849a1a83dfc04d925af9549936c9795b8ba7b0288a40679307879c10f547cfb16bf42c470e3ec388409257ae", 0xe8}], 0x2, &(0x7f0000000640)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @local}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}], 0x38}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x15, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff84a6c6ac2a4f0ff0000002d6405000000000065040400010000252b0b5a86cbc0a560b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c74396c8e3ebbadc20e5a7ef8c9ac1465c4d4049fc564e0b9cc7553358380b3a1f59916ffc9bf0bdf81509f07fb2ea80e5cf8dcf819bf58a4fedda52e39c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='f', 0xffffff1f}], 0x8, 0x0, 0x0, 0xf00}, 0x7ffff) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') 20:17:39 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:39 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:39 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000000)="24000000140081563e06080a000f000010ff0100000060003f03546fabca1b4e7906a6bd", 0x24}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f00000023c0)={0x0, 0x0, 0x0}, 0x0) 20:17:40 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0), 0x0, 0x0, 0x0, 0x10}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000440)="683fdecb3110a1a2326b1aa337cccca5339c6f076f106ac157fc689d90b95fdb48ea1fd0c91bbf946b566df889cc643f62b393b2e0bd7201920cf734024b894db91f1dc14a7103336a3fecf5eb091968cddd5e5b95a7ff5645d6cae98e22f0f79d", 0x61}, {&(0x7f00000004c0)="c02fd2b3110ae7b8f3b473bbf1f12f47db6f27a3f61f110b6e91c825281e6002b2fa9d30f39f7c3ca2e5552434f015dcd5ce668ce74221d26e6ea7d3451a306e9cb15a6c7754e1d5d30676fca4a18f4ac0e7c1a42d521e4838cf07de41f9699839caa935403ebeaeef399a9853e9ec95af5ab4915ea8f62e44759d6d2f8dfd4eac4b3f7f07f4b210f1f4", 0x8a}, {&(0x7f0000000580)}, {&(0x7f00000002c0)="3692e6140f50b2024418", 0xa}], 0x4}, 0x4008880) sendmsg$kcm(r1, &(0x7f0000000400)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100002b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe39", 0x52}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x10\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x890c, &(0x7f0000000180)={r1}) 20:17:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2b5, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:40 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:40 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:40 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000140)) sendmsg$inet(r0, &(0x7f0000000fc0)={&(0x7f00000002c0)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x24000844) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xf, &(0x7f0000000200), 0x4) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000080)='X', 0x1}], 0x1}, 0x0) sendmsg$sock(r1, &(0x7f0000000bc0)={&(0x7f0000000380)=@l2tp6={0xa, 0x0, 0x40, @mcast2, 0x1, 0x3}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000400)="3b04cc85489570a0e2dc1f65c45cf53437c83bcd2e27aed5c2f9b211beb3fbd8b8dc2c1cb9d65772b4c210fb0c82daf2fcfd1597e5477c904899ba48252f1bc5d096f637dbe9d10cf079029799838e16f4034e7c1f4ad545e8f6188de2afda20520757628071f3969a14f9b7c609ef2b231896c91316a1370f9b4283f393f5f2ac90bffbbee3781530cac6e08bc56c36911a716f99d51cd7cd94fc55a53dd440", 0xa0}, {&(0x7f00000006c0)="36310d4eb2548dd7bece88370f26c812c118c98af2e2398a9dc505ca27e81b165f85a526a4cd6f7dd2031d3f17a8e842acdf0c720fb8baeec13bbd746f7ccb47f1ef39db781287ce852e274bddcfca365b915ecebda9a0098245951bedc809ed03cb5033cbe8552d0c6390b99e74035402c61e01250050d29d5d4d74b59185c81aebab8ae063b0bcd09dcd441dca0d153c63e89bda2cf5df1a4226cdbd812df017fff3b602f0ce35", 0xa8}, {&(0x7f0000000300)="3f852f6ec04969aec2936b", 0xb}, {&(0x7f0000000780)="b9a901eda6db29f5afd5af2b793df1ff24f9257d578df9d8a8e783", 0x1b}, {&(0x7f00000007c0)="bfd2f07f69d21012de4effc9f48eea85ed97e3b4028a4a223f6480d78ac6c2795a2ef2cd18418a23baec773fe0a1b434ae1105f006a2650cdcb61fd2dea2d0884bc5f3d72d3465682793341024e8683da4f77cb79d44ebbe7b509679df20a9806c9d04304b0c935e752c7f809afa878d1700d416029c4e7bf2c637dee8b1852edb18a453c7b9fc85f8d7994a330cba176df6fbd7ddba0d0589e22d6abff6ad54f92a1d3f9be776437c0de67e43bab69cbaf8ae030f", 0xb5}, {&(0x7f0000000880)="f483e899bc5b2bdc24f824fe1a0ce0d10d579643f7ead762b182bb717f996d6ae58e38fc2384d1ac8760e0e8ac7a8afbf309ded94fa5708a68cd78aede39b5e1a9571c5eab71242b4fafb320d1dd5984aab3afff5a38148fb1cc54ca7165d026aac4967b5a3c27a5cd13c6fe7ad32040591b4d51e37b", 0x76}, {&(0x7f0000000a80)="f4b180e40d44d8a0da374c85c998cdc1", 0x10}, {&(0x7f0000000940)="1159aabd6e5d27136978b7c94012cfe303504dfb323ba9d6483384abc0978b72a94ad5abb93a340f8f0feb7060f8627067dc2705cd0f019c58678f84e2bd3ea8566b4ff7b124d485903c3f5dedaaa1db63ed820f4710a0233d164644b432fbc6ffc5d624650f87530f8d662b27fd475c5743cfb8ef5b1a588dfb74a55ef5b623728c2d0268e3bcc311cfe3f961531f70dbe9d7172d9fb56500a08be0e4f717d65f48a35a6db0df6cc80bd9feb9eaf09986217ddffdba28e0ff4ff54228c61aed6470be7efc9403a73f0e22e0fcec7df83d9beb6fc00d9b4ad9862df4aaf3f222", 0xe0}, {&(0x7f0000000e00)="c13da9b74d7d4b0b5cc51b1e0584a941e18ac3c910e54f7f48e0c99eb36e8ae96ecd50afe677fe0789cce689e65d69e7a4951644ab65e82d779c309138b613622b3a70289afa14f2bdf5507fc3dd4a317f006532b97143a44c8dfcf36c14103911bed55189e23e0c9b3d96e7ae444bbb782baed1f6b22861c58a22e181a90fd856a9a37c20c40ca653ea3b31e9990beb83517400"/159, 0x9f}], 0x9}, 0x20000804) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000d40)=ANY=[@ANYBLOB="98e943cedd570976893b38cfe7848f5310f60f464e67c1455ef2e7054f48d48ac3b94445a7210ec72aa33b874b60916c5d445f61e4c2e62d3c6d940a14f3f72163ba12160701af90cbd6986c9bf81329509b0b4d9d19ddeb59e3cd4626bb08c6930cce75a43f436a1b55cf5f64f7ef148652eb7dbc608180646a297369e70cab21bb5e12c4c8db5f2c288a649e991f4acf8ee2cab365079838f55a4156b838b85628630c5951357c14047ca4e839485289d196"], 0xda00) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)=0x3) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, &(0x7f0000000040)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f00000004c0)=@can, 0x80, &(0x7f00000009c0)=[{&(0x7f00000006c0)="fca5920dc4da97d438398fd4951ceec88a7b76bcd0075cfa26b534b5af6f01ebe031e3e5f7907fd71bd33eec01777e287d76fa2145cef81fdc27c860eb4a6071d7c76dbd6c47c01740c14351a79a710f74cd18e27adcd7194936d7692c0c1f99d60a430867edca1d16b23d98b0af2c41c387c8025bf376198ee08e0d7dff331d3ca7cfd47e76709b19edbc3d5a023c50c6a8d603f4f2794a753052fbf31718c82b6cbaee513e8ea12aeaa3074e42c68dc216c636c52912d1307c424c2d97ec6b680b4b821db5566119d0403d2e5e52fdc7d31b307bbbe90f0fe1936cf0ba2d7d703b6be81787b2d30ff969fea55be1", 0xef}, {&(0x7f00000007c0)="ee4358a6c535395e9603b73b104ceac1669c629df472bd02a0cb7c1d7b67ccf72861197f7be97fda01c096a0610d3beed58fe0d722b5d6fd3a1c1bffea7892574f90e505db97f839aba54beef61acac306ffd4bc9b33a5e409e5895a713880dfc04ca357d85f3b131ab974b0ae6009c846d895224b679832c37cc7fde4c54645311279ed32b811992ce86d7035", 0x8d}, {0x0}, {0x0}, {&(0x7f0000001580)="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", 0xff0}], 0x5}, 0x40) sendmsg$inet(r1, &(0x7f0000000d00)={&(0x7f00000004c0)={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000500)="c39a23997c62ebcb7b6e", 0xa}, {&(0x7f0000000c00)="4f710b2c1992506fcf246c1bc2ed130ba12f15a58215d8155395846aee8bd9f440255cbfc991a3eef7089922df79788d3387d1860370abca6943ed5e4b2e0a0af261e27f7115dcc2314332df8263e0a16e2400d8dc01780233042be9e7e85d04c5a527611e345484b043b7f17d37e92c11cd12205973eaeac69d051d6e2065416628de3922b8dd52afe0265243d9e319f94e4bbd9dd3da641207d3c86b0a87380fd58e76c61d0612b70f13ef9efe84e08027157bb1593c3ab350397d849a1a83dfc04d925af9549936c9795b8ba7b0288a40679307879c10f547cfb16bf42c470e3ec388409257ae", 0xe8}], 0x2, &(0x7f0000000640)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @local}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}], 0x38}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x15, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff84a6c6ac2a4f0ff0000002d6405000000000065040400010000252b0b5a86cbc0a560b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c74396c8e3ebbadc20e5a7ef8c9ac1465c4d4049fc564e0b9cc7553358380b3a1f59916ffc9bf0bdf81509f07fb2ea80e5cf8dcf819bf58a4fedda52e39c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='f', 0xffffff1f}], 0x8, 0x0, 0x0, 0xf00}, 0x7ffff) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') 20:17:40 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0), 0x0, 0x0, 0x0, 0x10}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000440)="683fdecb3110a1a2326b1aa337cccca5339c6f076f106ac157fc689d90b95fdb48ea1fd0c91bbf946b566df889cc643f62b393b2e0bd7201920cf734024b894db91f1dc14a7103336a3fecf5eb091968cddd5e5b95a7ff5645d6cae98e22f0f79d", 0x61}, {&(0x7f00000004c0)="c02fd2b3110ae7b8f3b473bbf1f12f47db6f27a3f61f110b6e91c825281e6002b2fa9d30f39f7c3ca2e5552434f015dcd5ce668ce74221d26e6ea7d3451a306e9cb15a6c7754e1d5d30676fca4a18f4ac0e7c1a42d521e4838cf07de41f9699839caa935403ebeaeef399a9853e9ec95af5ab4915ea8f62e44759d6d2f8dfd4eac4b3f7f07f4b210f1f4", 0x8a}, {&(0x7f0000000580)}, {&(0x7f00000002c0)="3692e6140f50b2024418", 0xa}], 0x4}, 0x4008880) sendmsg$kcm(r1, &(0x7f0000000400)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100002b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe39", 0x52}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x10\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x890c, &(0x7f0000000180)={r1}) 20:17:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2c0, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:40 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:40 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000140)) sendmsg$inet(r0, &(0x7f0000000fc0)={&(0x7f00000002c0)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x24000844) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r1 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xf, &(0x7f0000000200), 0x4) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000080)='X', 0x1}], 0x1}, 0x0) sendmsg$sock(r1, &(0x7f0000000bc0)={&(0x7f0000000380)=@l2tp6={0xa, 0x0, 0x40, @mcast2, 0x1, 0x3}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000400)="3b04cc85489570a0e2dc1f65c45cf53437c83bcd2e27aed5c2f9b211beb3fbd8b8dc2c1cb9d65772b4c210fb0c82daf2fcfd1597e5477c904899ba48252f1bc5d096f637dbe9d10cf079029799838e16f4034e7c1f4ad545e8f6188de2afda20520757628071f3969a14f9b7c609ef2b231896c91316a1370f9b4283f393f5f2ac90bffbbee3781530cac6e08bc56c36911a716f99d51cd7cd94fc55a53dd440", 0xa0}, {&(0x7f00000006c0)="36310d4eb2548dd7bece88370f26c812c118c98af2e2398a9dc505ca27e81b165f85a526a4cd6f7dd2031d3f17a8e842acdf0c720fb8baeec13bbd746f7ccb47f1ef39db781287ce852e274bddcfca365b915ecebda9a0098245951bedc809ed03cb5033cbe8552d0c6390b99e74035402c61e01250050d29d5d4d74b59185c81aebab8ae063b0bcd09dcd441dca0d153c63e89bda2cf5df1a4226cdbd812df017fff3b602f0ce35", 0xa8}, {&(0x7f0000000300)="3f852f6ec04969aec2936b", 0xb}, {&(0x7f0000000780)="b9a901eda6db29f5afd5af2b793df1ff24f9257d578df9d8a8e783", 0x1b}, {&(0x7f00000007c0)="bfd2f07f69d21012de4effc9f48eea85ed97e3b4028a4a223f6480d78ac6c2795a2ef2cd18418a23baec773fe0a1b434ae1105f006a2650cdcb61fd2dea2d0884bc5f3d72d3465682793341024e8683da4f77cb79d44ebbe7b509679df20a9806c9d04304b0c935e752c7f809afa878d1700d416029c4e7bf2c637dee8b1852edb18a453c7b9fc85f8d7994a330cba176df6fbd7ddba0d0589e22d6abff6ad54f92a1d3f9be776437c0de67e43bab69cbaf8ae030f", 0xb5}, {&(0x7f0000000880)="f483e899bc5b2bdc24f824fe1a0ce0d10d579643f7ead762b182bb717f996d6ae58e38fc2384d1ac8760e0e8ac7a8afbf309ded94fa5708a68cd78aede39b5e1a9571c5eab71242b4fafb320d1dd5984aab3afff5a38148fb1cc54ca7165d026aac4967b5a3c27a5cd13c6fe7ad32040591b4d51e37b", 0x76}, {&(0x7f0000000a80)="f4b180e40d44d8a0da374c85c998cdc1", 0x10}, {&(0x7f0000000940)="1159aabd6e5d27136978b7c94012cfe303504dfb323ba9d6483384abc0978b72a94ad5abb93a340f8f0feb7060f8627067dc2705cd0f019c58678f84e2bd3ea8566b4ff7b124d485903c3f5dedaaa1db63ed820f4710a0233d164644b432fbc6ffc5d624650f87530f8d662b27fd475c5743cfb8ef5b1a588dfb74a55ef5b623728c2d0268e3bcc311cfe3f961531f70dbe9d7172d9fb56500a08be0e4f717d65f48a35a6db0df6cc80bd9feb9eaf09986217ddffdba28e0ff4ff54228c61aed6470be7efc9403a73f0e22e0fcec7df83d9beb6fc00d9b4ad9862df4aaf3f222", 0xe0}, {&(0x7f0000000e00)="c13da9b74d7d4b0b5cc51b1e0584a941e18ac3c910e54f7f48e0c99eb36e8ae96ecd50afe677fe0789cce689e65d69e7a4951644ab65e82d779c309138b613622b3a70289afa14f2bdf5507fc3dd4a317f006532b97143a44c8dfcf36c14103911bed55189e23e0c9b3d96e7ae444bbb782baed1f6b22861c58a22e181a90fd856a9a37c20c40ca653ea3b31e9990beb83517400"/159, 0x9f}], 0x9}, 0x20000804) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000d40)=ANY=[@ANYBLOB="98e943cedd570976893b38cfe7848f5310f60f464e67c1455ef2e7054f48d48ac3b94445a7210ec72aa33b874b60916c5d445f61e4c2e62d3c6d940a14f3f72163ba12160701af90cbd6986c9bf81329509b0b4d9d19ddeb59e3cd4626bb08c6930cce75a43f436a1b55cf5f64f7ef148652eb7dbc608180646a297369e70cab21bb5e12c4c8db5f2c288a649e991f4acf8ee2cab365079838f55a4156b838b85628630c5951357c14047ca4e839485289d196"], 0xda00) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000280)=0x3) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, &(0x7f0000000040)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f00000004c0)=@can, 0x80, &(0x7f00000009c0)=[{&(0x7f00000006c0)="fca5920dc4da97d438398fd4951ceec88a7b76bcd0075cfa26b534b5af6f01ebe031e3e5f7907fd71bd33eec01777e287d76fa2145cef81fdc27c860eb4a6071d7c76dbd6c47c01740c14351a79a710f74cd18e27adcd7194936d7692c0c1f99d60a430867edca1d16b23d98b0af2c41c387c8025bf376198ee08e0d7dff331d3ca7cfd47e76709b19edbc3d5a023c50c6a8d603f4f2794a753052fbf31718c82b6cbaee513e8ea12aeaa3074e42c68dc216c636c52912d1307c424c2d97ec6b680b4b821db5566119d0403d2e5e52fdc7d31b307bbbe90f0fe1936cf0ba2d7d703b6be81787b2d30ff969fea55be1", 0xef}, {&(0x7f00000007c0)="ee4358a6c535395e9603b73b104ceac1669c629df472bd02a0cb7c1d7b67ccf72861197f7be97fda01c096a0610d3beed58fe0d722b5d6fd3a1c1bffea7892574f90e505db97f839aba54beef61acac306ffd4bc9b33a5e409e5895a713880dfc04ca357d85f3b131ab974b0ae6009c846d895224b679832c37cc7fde4c54645311279ed32b811992ce86d7035", 0x8d}, {0x0}, {0x0}, {&(0x7f0000001580)="ea0649d61bc0e340f8d0612d4069bfa0b9c193010c15fcae152ed34e1c0b1a77b39a66e216b83848c476532e4d90c24254e3d123b248bdaf3af6642cda566724084997fdf95f8d5078fd4a69b69fb774300eecfaf866f4bb5e797d414a7f89757c033241f3d349f8637250007a62b62b6a14ec4575131d52f0b979007e552c8ae30f52054596148285f07751128906efb2a3b2c95e24bc9608eae64538b1a96a0c7b97f49207833f9b41c9be59a7e222434221d814289da6dc83d5a71f2afbbd098d6bab5d43cec753fa068d2c14cd67c9280929b2f81dc15258ef2bb496385a38b144e2787a23e32d26e37ebd17c338ca2bf858bea51130966398add44607533bbcc50e2a4d5c91d1e52e0b53bd1c3dfefb533497825c45deed431f30e1343bbd342960f93477152d901852291dcbb11815a8a1d0ec48191fe62b2a2c87acde423f5b647a02d8a3b5158d5c6585fcb212fe6461c1005e620c1331f04ec08541cea1466cdab8b3981336d9b8546538fd262a633c0a3aabdf1baedae9323dde7d294fda338ba725964022728b9aab3d99fa18a8c548349d3a0680eaabc2c6a2d41a694a7123a973c1463053ebf2d514636677053d316cd11f8658b3c387baf5e05c4a1f84463ad8939914ffcfdf33f57c2f81c584c0adaa8398d638111dac2a572cd649d2e40cb042ffc18cace3a5593fc0da48584e9e4c3a4131913a2351b9dc6ffe38d2b39ff3d2ef774cfe7f7f7f6541a3ccdb450535ed8d138f252464252b76e7701df306d7ed61ee705e9ca00ad69e0c40b3c9afe42cbd4166188eaf13e7b007d5a8571fd5605e5aa869cfcb04ac0ce0dcba7cb42df89c880bb474ec48e6b95cd57f22a54057326e4172590d603f0362a35382d767c8c7e685f5c46eddec988c0d7af5438270556fdd277af47f3361fb728d7b4856608ca44e4ce101d045e39216a225d684153750e9a04a7a3bd2e2066442d81864d13ac3729e6a7c4b916699b9f9107a653491d7582e263de660f448909598638dc84c12157e250cbdd88b81860a1bd52f2f7410274a9a239bddfadf9fa8f6a0a3b82de506c45d8d0f65ba57cedb5fd2dee87b0af0eae20673fd1e90d64dfb5046d056c51f6c297b3d88f3ad4e2a1e14cd88e794a1bc3af1ccee547f11231511c82a45511a24f5d5fb4388e3eeb82ded931153a1bf233052e8dd13a860934d69506cc4f7087cb0d71e3f68d2ee0607d846feddcb945f71912946e10c906c027fea1f44768e71538e491e742cc29c88f9ed9459df38af12901ff501402ede663d5ca257819909af27d2c272bc5fed8f54eb0c751a00b4d1deb4e34448f4d8a38438912968403860d0bb0a7429733ffa8cb17708137cc604a37a71bccad5c433bc5980e36bc18a6c04bb10afcf7b1b3cbefacdebbe9daf2a63a5b8f13447cf3fb80f35b05ebbea113cf7b6464450c3516a62e9e980d0f99a72f176dcc095ff4730f165412fce78a5d7e6cf483d141d87d4e3dfe45695ff9f1ef86c0ab8320fd8c997665e1fa5be686448f8c49d52f52fc554c7ebd2fdfec94e14bb1dd13b3d577a27d443e4dbe375e92e57dc4c7b1432413c40e411f588fc2f3c60e335ae330c3cc5d3126df0b8c396bca02e52298473d96c4c0db4d42a125d65e82bb5df8c4c6c26aad5bff8c75f2677d0fdd6e885fe3c9ebafdffeb68d5b3d3dfa24e76dba2bc4c879581ce75a11ac46d3f19c8177de3db6b006bda9a45c10fbe6c177cf5166154785e8e084035e18f12feca44ca07b62daef0c1933b7feb381c0b225cf763931e86713a0a7fb1faa8894a07d76ca5c4ce46869aff06644c0fdabcab8629dcb63c9dad5b1f3b75e503580f96b9a679ac65833d995df4b58c38db18d8d2ad80149c30f1f9d4ba0b5cf684ed90c34de407f90b77866a3fe1044143d864464996d37e81adf2975a8cd9b4cf13ebac9b0f3662a3df34cfbde9e8e64de7b399776579119205037d1f0439b82f0d3260cc47d9c5ad67b32a2aaa908410203f753f953b03b29d28d9c9ff0da1edcb196d0d79df7e794b95e3281947048b785d6a36ef4ea862b1057c9b3ff3f33bb290557eb3e8bb2a5229e03f07ca61a67ad086ca9668021fe18edc2e288fe083eb2eb404ef03f6ae58973d1bd055d790532ca9aa086359843089cb426252aeaad96a10ec4b4e9f94a172efdc5d65ddedd13fe07af0dd56f7afc7d260d61f5784032fea81b58e2e44b0292223deef57c022e55aed63d32c49effe24c9f9719ce7ab94f30e6b7ae288ee8fa8fe1db114e7b934600205f43da96932717b7cd9ba8887292897b4f8bd67027eec31cd7d50918fa8ebf3cb019ca4d2adac7495d0b82e8afcd0214b4858f5e89b031c3dfca6c2e73f413895de4024cd0c71928ff38849ae7335a504ea03ef849b26a31714c9bebe0757c587a1b3c15e27785812489ee1d7f4729d772b8f8d74a78e78cb7b53d67160c361ba79bbce9843e2a4d6c36b8ff9a354f9a302b410d3b5b9ef8c8d770b38cbbb007115aecc6e505e9c424825d4673cb1a7e6a61e56841bf2a0f6363150f95046b2a998d535156fe890f622d31d0799565e5ecb4856638a611821e5dec39c802500e30a068cd3b96a57056d02558b67af61a490821c0a823aa3b5318da80a088b56a1890154c2f90e5af9c63a5fef90a105c7d43bc4446939d5c88cb377340e52044ef0966ac221b96117d0d56027494e659f3185d93d30a26201cdabd1075da95136e8794aefbd550e7934819353ab8c26408eeab7ab374c5396d13661adf4bccb78826bb0e21bf6b37dcbe3dcaa6aa266fcea4492f62de56141f9958694706bd71689be9590f1c692b284ab6108d12c0b3b7f272281c26e8d345bd48bcf6ee2ea34a7b55239ad7fb9fd2d7b4325a6d834e0ef8ffa61517878e346d39e32d172a0f58f08d05c00b63194e971e3e04ecefa9a64c3285ff5afef5b57c94ded8d64ecc661eb29e43fb98aa70269c9f251841404d9b85f2310d53bacdcfe55813411b7c5fe15b2a6d5c59df563dc66131bf4d7a5411da3c7b1d56cbfd6b40c9fd00a91e31dccea8c17c90ff52010b7a71e8f07937c354794e44598516e91f8458137b138cc7a74d862f99cd39db55666fa6c14cc187067d997bb73bf8d1b3ac8b4ae921a7e3854e91cb3c92c515abd8ad58c70c436ea6d2ece4dc330cd5c7385955e6e68988e1640a2a27b31fa2820836592b7206e7ea630940e038f584793a04a09c2ea7ba4f42ff355fe80bca482ff0414e7d4379639ed5f5097cdc7ec394a7c6c5fd593b1ed21d9aa8bc08228ab93a46eeacc851c7d77ea7982ade7bfe343a4b0887456325c6c419986b3c6e6c2f1428608ef7a71bfdf9d2f45181e0da294ad51f52ab2a526af82ac1783d2b1669133dbf85ee45499cd9876bbd327b3d6b65acd9d6f7b763312af41cb8e93f4bba6f52e685d2b732f75ee2feaf5d4e3ad37cc1f73129a090800fe3c4a0553c41c5ff5e3dc42bbe985f71305afce6146c05ef2510e9ece6c3260e8f1b439faed0bca69b9756755427dbd22f27c56dfc88fccdcdada615aa1ac8fe8306494062d84bcd3fbfd9fed72cc46e305a349ddcc2f7e2db7c89f99b86d6385a2873810ec9a3e2d704951d4324f2c7c46ecd0b61e5276bbd08d6a40e87854e413cd63b0a396a4ede3684a1a26a71a073beb845509bc1cfe7b84738a1aad6e3e7d2c075949c8b470afeb089b79b41edacecde18752b631d42dbbafa4cdaa6c5e562d73936232496de231e5b9ad077828fa905e5771e33704d4d18866b4b19a84ca0aa5450a94258554680233a4d528c29f9c2258e1e1480ae2f4ca4955586f2e78d7ec5f9dd5febce1244ccaf92c18d639e92704a9455071aca8da576d8f5abcb0fb13abc85adb53c9f750bc7134e43655b18bed078cdbd5fb9d923340cf948632e79c679770ad5ce46d5796a23591d48082d325ff7205f48533ca1a624b2e407fd941fe34322aeb4283e00f0192051ff96215544bb54eecc08bc78a291c6be045723d2b74a827032c95c354ad1747a2a7439bc023282c035b4b01d830674abd826de6ac768d22aeb59bf3f2314a417d420c854eecea12bd339a66ac90a9a773d94f8a850951bb45bb02f346debb0abdf524f45fcdacaeb6ccb8c596a6cfe122b3ba1386030487a6eea056a5e32c9c140777f265284e39d50dc8bf348f1017c1485263091ad224cf12d26f3b0835f59f7490f6fa01328350b20bd7f2f1a8afc5eebdbbd86a3b792b6a0b8d2ff13b28d0788422c7817fb4a9f03972c7ef84e32501e3457fa9ad82093e59c90562b6bdc47127bb8014ce3dcdcff607609ea233cd1f86d597425e67e8d0c7efb49f595e33f04d3a87bf93247cf9e0524d41627af7d4325d035f161f086127e10a07e63f5d5d9c5206ba408402de8df064013dff78063b4ac844e0fc2701fb3974a5774a4f60cb4bb2dbf4bad9765435ab6094d0e4047a1d71e92a178307856f99fcbd25ed5fa906a8d7800d8bd22643dbbe339f1d8a58d498f5729a911f17d2ec3ec1d61d0e37101c431f03032b622b7052526b19400ed13b2dddbfe9c0166438e8adebe68f29dab5c04ba6528bc2763ce674934ccce724582c4b9f658197c484fa6ad1a9554c152dbca23f4dfdf27141e08bbff2db1dca2d5ba6040811f36c169d174683c2243c2661f2b864fe08a21e5ed2e4359b5e865956128a1ef11cc1018db7796db7478a7fdd92d01491aa1f5c44fa160f2f03f803e29ae6ee734a9dc3812598cfa96020648f3beb1ba5f45b21d99c6d7145fa03ea76679d697035239299931180fad960493b4ad4825bcb169bbfd3b8ca28a1ca7fe406dffd5c5764363d65b4c9471ace68263817d80fce1098b5679e6b609dd47a50ff843921957af1f206d546612519f8c02175f6dd20ef0253887e598af4e487aa65cdb89f1e545cba94cfad25c55cbd253f9af38327c3f5e19021c43519afe3077b9062557e0855f8f1318970c046f104db016c1d472e6b53db8c846468d3183143482eed5397556e7c9fc66acd82f27c947b12d1d127fc27b4d98ed5252e56f986c2cb366d44ab53537159c69158888cd9623d2ac80eb3aa3c7c672b721ff5ba56be3a1f1ed910976ccb8e9351ca7a829643d727e6118c48654b99b3eedfc91212442a746efabed89660de99017a17b8b4356c5f7896c235cd613107cf71a2a8a333a54a4a7fb5f41d07a817622989120982d9deafa5a698b85d89fca41d2e7e46407800f0d8177ff4c5fc07b3a38ebbd50262c712fa7c2ef27edb81acee5dd8bd4876f11795957a9ed7de24d6a6bf7b653e440dd4cab4f18b79d428423645e83dc3a178f2c0bfb3077e816d3bc2876414076388985ac788970fbce245583c639e6d2083ef336c2c29f89bbc758517373447749018c4eaa8d996dfd43b08b0cf3b7e3c28360910a9129b69b8afdbeea2a0d94d8eadaa2b1fe7a03d40ebe985d32b3fe4d4ee4c081d7be5d1b3409fdb97f9a3bb2c9160ba9c575fa6ac5d7f2521869e55ca94fcaea48ee80ebeef1541bccb764233178d5890bdccfb3d205bd02943d2268821792379ae3b1878924e4f3579b8c45069a7c3b00a2d36ab10660c23f9f7f5237b7327cc308807e91c09ad696a61e66d5b12b2b4ec660bf60a9d1af6583e7298eba494103f7378b5e2f62aa7ad3fa44208b2546832680080ef558bc65b629b9b720a081aa554c0eff6ab5d7dff15d270888a75265272df1e42b61387e94d29f903894dcd5dde70e2fb3d195dd9", 0xff0}], 0x5}, 0x40) sendmsg$inet(r1, &(0x7f0000000d00)={&(0x7f00000004c0)={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000500)="c39a23997c62ebcb7b6e", 0xa}, {&(0x7f0000000c00)="4f710b2c1992506fcf246c1bc2ed130ba12f15a58215d8155395846aee8bd9f440255cbfc991a3eef7089922df79788d3387d1860370abca6943ed5e4b2e0a0af261e27f7115dcc2314332df8263e0a16e2400d8dc01780233042be9e7e85d04c5a527611e345484b043b7f17d37e92c11cd12205973eaeac69d051d6e2065416628de3922b8dd52afe0265243d9e319f94e4bbd9dd3da641207d3c86b0a87380fd58e76c61d0612b70f13ef9efe84e08027157bb1593c3ab350397d849a1a83dfc04d925af9549936c9795b8ba7b0288a40679307879c10f547cfb16bf42c470e3ec388409257ae", 0xe8}], 0x2, &(0x7f0000000640)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @local}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}], 0x38}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x15, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff84a6c6ac2a4f0ff0000002d6405000000000065040400010000252b0b5a86cbc0a560b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c74396c8e3ebbadc20e5a7ef8c9ac1465c4d4049fc564e0b9cc7553358380b3a1f59916ffc9bf0bdf81509f07fb2ea80e5cf8dcf819bf58a4fedda52e39c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) sendmsg(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='f', 0xffffff1f}], 0x8, 0x0, 0x0, 0xf00}, 0x7ffff) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') 20:17:40 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="7e493c78124dac9d6f446e9cf5ef247c2cffb18fd3023247a7da1ca797f6ce82861faeedc8b2c6567fdb6fb9b215d428da9d75e3fba9c1f4ffd006b4b02a47f3e70ecd0c8f8ecad898ab4390ad0b540cd4be5e01d2fd71a8b4271ff634f9276550f5aa337e39bdcbeb0bafbd58e0a0a7adba1ae1f31f59e33165834362786f35973e68a0aada5361ac171fc3b85835b6a3f53e1bd4cfcc6e0fc0c438d6dcc113bc633741ee493816eb92be1621abf6555e39bc514f219d1017624edf04ee05823bda4c3149998f820bbabe86d9ef11bc9577d0a355638403b0cf246699b58a445e3a078542b1a2be262e5f5bd64c16fcfc2d8303040b297ea2a3271e4c42d272fe5c26532d93292c5277890dda520bf0cfc9b622d22ced5f7f306fd88e0ca2234b7dc44a4cd09c395e6b60ac8c528b8c8b19d6c5af04381567aff2ce0610580d752a645dab69d0ab852e566997cf5f266d27888aba21b41e896d249bd8d55e7086e48a5eb8884c89904cb7b6d5ff16a141a01dbfd403463075b756ae26cedd25a8247934bf1c3fe8a95cc583d0a03b15f72e44434f65a5a401dcd3e5779920d7901f39a5a482cf871e56a700ebda75e939caf5f872c1313608368feb8db00c7397068d46777d73807405576ff753a006d73f5222097a6013f757d63a049d10b33226f852fb839572e5adcd21ee294d73df8e15ddc26316318e3157af17826e89c3e371fd78de2326e502b850861e8de0e5325fe6cff6da965e2132916952cc2dd049443830bd72710794304625da015c50b134e897ff81938034377d373850a007d7412459bd6ac2de181bde7df45348514a32202bf807635bdf128de2849bde6faaa09bd766bf2362f7091a8bfc528a6f37735d9e9d6fa8b910a372ada3819cc0ef8ee5719b59c50ce57008c4fbf6b8c31e0775dd81103eb8af1075ad17942323c53bd4d2193e3e50456c80f1cca6f596ef210ca3162b84af3e4ddbfa133fc6", 0x2c0, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x26}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d50b441e692763513ef87456558", 0x0, 0x3fb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 20:17:41 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="7e493c78124dac9d6f446e9cf5ef247c2cffb18fd3023247a7da1ca797f6ce82861faeedc8b2c6567fdb6fb9b215d428da9d75e3fba9c1f4ffd006b4b02a47f3e70ecd0c8f8ecad898ab4390ad0b540cd4be5e01d2fd71a8b4271ff634f9276550f5aa337e39bdcbeb0bafbd58e0a0a7adba1ae1f31f59e33165834362786f35973e68a0aada5361ac171fc3b85835b6a3f53e1bd4cfcc6e0fc0c438d6dcc113bc633741ee493816eb92be1621abf6555e39bc514f219d1017624edf04ee05823bda4c3149998f820bbabe86d9ef11bc9577d0a355638403b0cf246699b58a445e3a078542b1a2be262e5f5bd64c16fcfc2d8303040b297ea2a3271e4c42d272fe5c26532d93292c5277890dda520bf0cfc9b622d22ced5f7f306fd88e0ca2234b7dc44a4cd09c395e6b60ac8c528b8c8b19d6c5af04381567aff2ce0610580d752a645dab69d0ab852e566997cf5f266d27888aba21b41e896d249bd8d55e7086e48a5eb8884c89904cb7b6d5ff16a141a01dbfd403463075b756ae26cedd25a8247934bf1c3fe8a95cc583d0a03b15f72e44434f65a5a401dcd3e5779920d7901f39a5a482cf871e56a700ebda75e939caf5f872c1313608368feb8db00c7397068d46777d73807405576ff753a006d73f5222097a6013f757d63a049d10b33226f852fb839572e5adcd21ee294d73df8e15ddc26316318e3157af17826e89c3e371fd78de2326e502b850861e8de0e5325fe6cff6da965e2132916952cc2dd049443830bd72710794304625da015c50b134e897ff81938034377d373850a007d7412459bd6ac2de181bde7df45348514a32202bf807635bdf128de2849bde6faaa09bd766bf2362f7091a8bfc528a6f37735d9e9d6fa8b910a372ada3819cc0ef8ee5719b59c50ce57008c4fbf6b8c31e0775dd81103eb8af1075ad17942323c53bd4d2193e3e50456c80f1cca6f596ef210ca3162b84af3e4ddbfa133fc6", 0x2c0, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:41 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:41 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x14) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r1, r2, 0x0, 0x7ffff000) 20:17:41 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, 0x0) close(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x9, 0x0, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x2, r1, 0x9) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) r3 = gettid() perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000240)}, 0x502, 0x7, 0x943, 0x0, 0x0, 0x0, 0x8}, r3, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400001c00810ce00f80ecdb4cb9f207c804a00d000000880016fb0a0002000a0ada1b40d805000300c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x8) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 357.156889][T13483] netlink: 1030 bytes leftover after parsing attributes in process `syz-executor.4'. [ 357.188338][T13483] netlink: 1030 bytes leftover after parsing attributes in process `syz-executor.4'. 20:17:41 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001640)=ANY=[@ANYBLOB="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"/1506], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac141442e6", 0x0, 0x2f, 0x0, 0x0, 0xfffffffffffffe2a}, 0x28) 20:17:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x26}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d50b441e692763513ef87456558", 0x0, 0x3fb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 20:17:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2c6, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:41 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x14) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r1, r2, 0x0, 0x7ffff000) 20:17:41 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, 0x0) close(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x9, 0x0, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x2, r1, 0x9) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) r3 = gettid() perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000240)}, 0x502, 0x7, 0x943, 0x0, 0x0, 0x0, 0x8}, r3, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400001c00810ce00f80ecdb4cb9f207c804a00d000000880016fb0a0002000a0ada1b40d805000300c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x8) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) 20:17:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 357.407956][T13497] netlink: 1030 bytes leftover after parsing attributes in process `syz-executor.4'. 20:17:42 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x14) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r1, r2, 0x0, 0x7ffff000) 20:17:42 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000507d25a80648c63940d0624fc6010000a400c000000051a82c137153e670902018003001700d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg(r0, &(0x7f00000138c0)={0x0, 0x0, 0x0}, 0x0) 20:17:42 executing program 4: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x2e}], 0x1}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0xc) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x16}, 0x10) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="18a29fcb140000"], 0x18}, 0x0) sendmsg(r2, 0x0, 0x80) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb250009000e00036c40fe00ff050005001201", 0x2e}], 0x1}, 0x0) 20:17:42 executing program 3: 20:17:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="7e493c78124dac9d6f446e9cf5ef247c2cffb18fd3023247a7da1ca797f6ce82861faeedc8b2c6567fdb6fb9b215d428da9d75e3fba9c1f4ffd006b4b02a47f3e70ecd0c8f8ecad898ab4390ad0b540cd4be5e01d2fd71a8b4271ff634f9276550f5aa337e39bdcbeb0bafbd58e0a0a7adba1ae1f31f59e33165834362786f35973e68a0aada5361ac171fc3b85835b6a3f53e1bd4cfcc6e0fc0c438d6dcc113bc633741ee493816eb92be1621abf6555e39bc514f219d1017624edf04ee05823bda4c3149998f820bbabe86d9ef11bc9577d0a355638403b0cf246699b58a445e3a078542b1a2be262e5f5bd64c16fcfc2d8303040b297ea2a3271e4c42d272fe5c26532d93292c5277890dda520bf0cfc9b622d22ced5f7f306fd88e0ca2234b7dc44a4cd09c395e6b60ac8c528b8c8b19d6c5af04381567aff2ce0610580d752a645dab69d0ab852e566997cf5f266d27888aba21b41e896d249bd8d55e7086e48a5eb8884c89904cb7b6d5ff16a141a01dbfd403463075b756ae26cedd25a8247934bf1c3fe8a95cc583d0a03b15f72e44434f65a5a401dcd3e5779920d7901f39a5a482cf871e56a700ebda75e939caf5f872c1313608368feb8db00c7397068d46777d73807405576ff753a006d73f5222097a6013f757d63a049d10b33226f852fb839572e5adcd21ee294d73df8e15ddc26316318e3157af17826e89c3e371fd78de2326e502b850861e8de0e5325fe6cff6da965e2132916952cc2dd049443830bd72710794304625da015c50b134e897ff81938034377d373850a007d7412459bd6ac2de181bde7df45348514a32202bf807635bdf128de2849bde6faaa09bd766bf2362f7091a8bfc528a6f37735d9e9d6fa8b910a372ada3819cc0ef8ee5719b59c50ce57008c4fbf6b8c31e0775dd81103eb8af1075ad17942323c53bd4d2193e3e50456c80f1cca6f596ef210ca3162b84af3e4ddbfa133fc6dee4fd733130", 0x2c6, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:42 executing program 5: 20:17:42 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:42 executing program 3: [ 357.790952][T13520] 8021q: adding VLAN 0 to HW filter on device team0 20:17:42 executing program 5: 20:17:42 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:42 executing program 3: 20:17:42 executing program 5: 20:17:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:42 executing program 4: 20:17:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2c6, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:42 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:42 executing program 3: 20:17:42 executing program 5: 20:17:42 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, 0x0) sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:42 executing program 4: 20:17:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:42 executing program 3: 20:17:42 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, 0x0) sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2c9, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:43 executing program 5: 20:17:43 executing program 3: 20:17:43 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:43 executing program 4: 20:17:43 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, 0x0) sendfile(r2, r3, 0x0, 0x7ffff000) 20:17:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2c9, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:43 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(0xffffffffffffffff, r2, 0x0, 0x7ffff000) 20:17:43 executing program 5: 20:17:43 executing program 3: 20:17:43 executing program 4: 20:17:43 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:43 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(0xffffffffffffffff, r2, 0x0, 0x7ffff000) 20:17:43 executing program 4: 20:17:43 executing program 5: 20:17:43 executing program 5: 20:17:43 executing program 4: 20:17:43 executing program 3: [ 359.083059][T13609] kvm_set_msr_common: 956 callbacks suppressed [ 359.083073][T13609] kvm [13604]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0xc2 data 0x1 [ 359.116872][T13609] kvm [13604]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0xc2 data 0x1 20:17:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2c9, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:43 executing program 5: [ 359.132444][T13609] kvm [13604]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0xc2 data 0x1 [ 359.186574][T13609] kvm [13604]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0xc2 data 0x1 [ 359.195469][T13609] kvm [13604]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0xc2 data 0x1 20:17:43 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(0xffffffffffffffff, r2, 0x0, 0x7ffff000) [ 359.258851][T13609] kvm [13604]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0xc2 data 0x1 20:17:43 executing program 3: 20:17:43 executing program 4: [ 359.303458][T13609] kvm [13604]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0xc2 data 0x1 [ 359.333358][T13609] kvm [13604]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0xc2 data 0x1 [ 359.357605][T13609] kvm [13604]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0xc2 data 0x1 [ 359.373129][T13609] kvm [13604]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0xc2 data 0x1 20:17:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:44 executing program 5: 20:17:44 executing program 4: 20:17:44 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, 0xffffffffffffffff, 0x0, 0x7ffff000) 20:17:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2ca, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:44 executing program 3: 20:17:44 executing program 5: 20:17:44 executing program 4: 20:17:44 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, 0xffffffffffffffff, 0x0, 0x7ffff000) 20:17:44 executing program 3: 20:17:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2ca, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:44 executing program 3: 20:17:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 20:17:44 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, 0xffffffffffffffff, 0x0, 0x7ffff000) 20:17:44 executing program 5: 20:17:44 executing program 4: 20:17:44 executing program 3: 20:17:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2ca, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:44 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x0) 20:17:44 executing program 4: 20:17:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 20:17:44 executing program 5: 20:17:44 executing program 4: 20:17:44 executing program 3: 20:17:45 executing program 4: 20:17:45 executing program 5: 20:17:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:45 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x0) 20:17:45 executing program 4: 20:17:45 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000003e000/0x18000)=nil, &(0x7f00000001c0)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 20:17:45 executing program 3: 20:17:45 executing program 5: 20:17:45 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) write$UHID_INPUT2(r1, 0x0, 0x14) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r2, r3, 0x0, 0x0) [ 360.710319][T13700] FAT-fs (loop1): invalid media value (0x02) [ 360.744266][T13700] FAT-fs (loop1): Can't find a valid FAT filesystem 20:17:45 executing program 4: 20:17:45 executing program 3: 20:17:45 executing program 5: 20:17:45 executing program 0: 20:17:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:45 executing program 3: 20:17:45 executing program 5: 20:17:45 executing program 4: 20:17:45 executing program 2: 20:17:45 executing program 0: 20:17:45 executing program 5: 20:17:45 executing program 2: [ 361.050430][T13723] FAT-fs (loop1): invalid media value (0x02) [ 361.069634][T13723] FAT-fs (loop1): Can't find a valid FAT filesystem 20:17:45 executing program 0: 20:17:45 executing program 3: 20:17:45 executing program 4: 20:17:45 executing program 5: 20:17:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="7e493c78124dac9d6f446e9cf5ef247c2cffb18fd3023247a7da1ca797f6ce82861faeedc8b2c6567fdb6fb9b215d428da9d75e3fba9c1f4ffd006b4b02a47f3e70ecd0c8f8ecad898ab4390ad0b540cd4be5e01d2fd71a8b4271ff634f9276550f5aa337e39bdcbeb0bafbd58e0a0a7adba1ae1f31f59e33165834362786f35973e68a0aada5361ac171fc3b85835b6a3f53e1bd4cfcc6e0fc0c438d6dcc113bc633741ee493816eb92be1621abf6555e39bc514f219d1017624edf04ee05823bda4c3149998f820bbabe86d9ef11bc9577d0a355638403b0cf246699b58a445e3a078542b1a2be262e5f5bd64c16fcfc2d8303040b297ea2a3271e4c42d272fe5c26532d93292c5277890dda520bf0cfc9b622d22ced5f7f306fd88e0ca2234b7dc44a4cd09c395e6b60ac8c528b8c8b19d6c5af04381567aff2ce0610580d752a645dab69d0ab852e566997cf5f266d27888aba21b41e896d249bd8d55e7086e48a5eb8884c89904cb7b6d5ff16a141a01dbfd403463075b756ae26cedd25a8247934bf1c3fe8a95cc583d0a03b15f72e44434f65a5a401dcd3e5779920d7901f39a5a482cf871e56a700ebda75e939caf5f872c1313608368feb8db00c7397068d46777d73807405576ff753a006d73f5222097a6013f757d63a049d10b33226f852fb839572e5adcd21ee294d73df8e15ddc26316318e3157af17826e89c3e371fd78de2326e502b850861e8de0e5325fe6cff6da965e2132916952cc2dd049443830bd72710794304625da015c50b134e897ff81938034377d373850a007d7412459bd6ac2de181bde7df45348514a32202bf807635bdf128de2849bde6faaa09bd766bf2362f7091a8bfc528a6f37735d9e9d6fa8b910a372ada3819cc0ef8ee5719b59c50ce57008c4fbf6b8c31e0775dd81103eb8af1075ad17942323c53bd4d2193e3e50456c80f1cca6f596ef210ca3162b84af3e4ddbfa133fc6dee4fd7331308c1c41b8f3", 0x2cb}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:45 executing program 2: 20:17:45 executing program 0: 20:17:45 executing program 5: 20:17:45 executing program 4: 20:17:45 executing program 3: 20:17:45 executing program 4: [ 361.399796][T13739] FAT-fs (loop1): invalid media value (0x02) [ 361.434136][T13739] FAT-fs (loop1): Can't find a valid FAT filesystem 20:17:46 executing program 4: 20:17:46 executing program 2: 20:17:46 executing program 5: 20:17:46 executing program 0: 20:17:46 executing program 3: 20:17:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f0000000000)=[{&(0x7f0000000880)="7e493c78124dac9d6f446e9cf5ef247c2cffb18fd3023247a7da1ca797f6ce82861faeedc8b2c6567fdb6fb9b215d428da9d75e3fba9c1f4ffd006b4b02a47f3e70ecd0c8f8ecad898ab4390ad0b540cd4be5e01d2fd71a8b4271ff634f9276550f5aa337e39bdcbeb0bafbd58e0a0a7adba1ae1f31f59e33165834362786f35973e68a0aada5361ac171fc3b85835b6a3f53e1bd4cfcc6e0fc0c438d6dcc113bc633741ee493816eb92be1621abf6555e39bc514f219d1017624edf04ee05823bda4c3149998f820bbabe86d9ef11bc9577d0a355638403b0cf246699b58a445e3a078542b1a2be262e5f5bd64c16fcfc2d8303040b297ea2a3271e4c42d272fe5c26532d93292c5277890dda520bf0cfc9b622d22ced5f7f306fd88e0ca2234b7dc44a4cd09c395e6b60ac8c528b8c8b19d6c5af04381567aff2ce0610580d752a645dab69d0ab852e566997cf5f266d27888aba21b41e896d249bd8d55e7086e48a5eb8884c89904cb7b6d5ff16a141a01dbfd403463075b756ae26cedd25a8247934bf1c3fe8a95cc583d0a03b15f72e44434f65a5a401dcd3e5779920d7901f39a5a482cf871e56a700ebda75e939caf5f872c1313608368feb8db00c7397068d46777d73807405576ff753a006d73f5222097a6013f757d63a049d10b33226f852fb839572e5adcd21ee294d73df8e15ddc26316318e3157af17826e89c3e371fd78de2326e502b850861e8de0e5325fe6cff6da965e2132916952cc2dd049443830bd72710794304625da015c50b134e897ff81938034377d373850a007d7412459bd6ac2de181bde7df45348514a32202bf807635bdf128de2849bde6faaa09bd766bf2362f7091a8bfc528a6f37735d9e9d6fa8b910a372ada3819cc0ef8ee5719b59c50ce57008c4fbf6b8c31e0775dd81103eb8af1075ad17942323c53bd4d2193e3e50456c80f1cca6f596ef210ca3162b84af3e4ddbfa133fc6dee4fd7331308c1c41b8f3", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:46 executing program 4: 20:17:46 executing program 2: 20:17:46 executing program 5: 20:17:46 executing program 0: 20:17:46 executing program 3: [ 361.759815][T13758] FAT-fs (loop1): bogus number of reserved sectors 20:17:46 executing program 2: 20:17:46 executing program 4: [ 361.808606][T13758] FAT-fs (loop1): Can't find a valid FAT filesystem 20:17:46 executing program 2: 20:17:46 executing program 5: 20:17:46 executing program 3: 20:17:46 executing program 0: 20:17:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f0000000000)=[{&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:46 executing program 2: 20:17:46 executing program 5: 20:17:46 executing program 4: 20:17:46 executing program 3: 20:17:46 executing program 0: 20:17:46 executing program 3: 20:17:46 executing program 4: [ 362.124466][T13775] FAT-fs (loop1): bogus number of reserved sectors [ 362.149421][T13775] FAT-fs (loop1): Can't find a valid FAT filesystem 20:17:46 executing program 2: 20:17:46 executing program 5: 20:17:46 executing program 0: 20:17:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x1, &(0x7f0000000000)=[{&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:46 executing program 3: 20:17:46 executing program 4: 20:17:46 executing program 2: 20:17:46 executing program 5: 20:17:46 executing program 0: 20:17:47 executing program 3: 20:17:47 executing program 3: [ 362.445146][T13792] FAT-fs (loop1): bogus number of reserved sectors [ 362.479685][T13792] FAT-fs (loop1): Can't find a valid FAT filesystem 20:17:47 executing program 4: 20:17:47 executing program 2: 20:17:47 executing program 0: 20:17:47 executing program 5: 20:17:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:47 executing program 4: 20:17:47 executing program 3: 20:17:47 executing program 2: 20:17:47 executing program 5: 20:17:47 executing program 0: [ 362.735227][T13809] FAT-fs (loop1): bogus number of reserved sectors [ 362.765505][T13809] FAT-fs (loop1): Can't find a valid FAT filesystem 20:17:47 executing program 0: 20:17:47 executing program 3: 20:17:47 executing program 4: 20:17:47 executing program 2: 20:17:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:47 executing program 0: 20:17:47 executing program 4: 20:17:47 executing program 5: 20:17:47 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000005c000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd65660f382201c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d6830f01caed", 0x14}], 0x1, 0x0, 0x0, 0x25a) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe4100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x1e}, 0xb20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xd8d0668c81aa2fa3) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:17:47 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x19, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5"}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) 20:17:47 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x278, 0x4c0003de, 0x0, 0x108, 0xae03, 0x108, 0x1e0, 0x1e0, 0x1e0, 0x1e0, 0x1e0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0xd8, 0x108, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@ip={@multicast1, @local, 0x0, 0x0, 'vcan0\x00', 'veth0_to_bridge\x00'}, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d8) [ 363.130854][T13826] FAT-fs (loop1): bogus number of reserved sectors [ 363.155616][T13826] FAT-fs (loop1): Can't find a valid FAT filesystem 20:17:47 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) link(&(0x7f0000000200)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003e40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)}], 0x1, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {}, [], {}, [{}]}, 0x2c, 0x0) 20:17:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) socket(0x11, 0x800000003, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65a9418ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, 0x0) syz_genetlink_get_family_id$netlbl_unlabel(0x0) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="7011613bad000000c439e91f17d3b79900d7cd0d232857e8bd0ed29257b2ec37e4e0e252cc787b197a43e245f0a35e0ebb11da8f2f52579268ee5080f40015416af8286fd344b03887804cb0118183597a174d8a6f70fd77dbff2c1d97a85a3478dc5e9157f541504fcd317fe2e87a4079"], 0x80}}, 0x4004) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4884}, 0x20000000) 20:17:47 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) fcntl$setsig(r0, 0xa, 0x1f) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x95b6) sendto$inet(r0, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) sendto(r0, &(0x7f0000000040)="b2", 0x1, 0x8055, 0x0, 0x0) [ 363.283116][T13844] xt_CT: You must specify a L4 protocol and not use inversions on it 20:17:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) [ 363.332772][T13849] xt_CT: You must specify a L4 protocol and not use inversions on it 20:17:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) r1 = socket(0x11, 0x800000003, 0x8) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x1, 0xe7}]}, 0x10) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x200800, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65a9418ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip6_tables_targets\x00') preadv(r4, &(0x7f00000017c0), 0x3da, 0x0) ioctl$BLKREPORTZONE(r4, 0xc0101282, &(0x7f0000000380)=ANY=[@ANYBLOB="02000000000000000200000000000000010001000000000000000000000000000104000000000000080102080000000000000000000000000000000000000000000000000000000000000000000000000100000001000000080000000000000009000000000000000006000100000000000000000000000000000000003e85e8880900"/149]) r5 = syz_genetlink_get_family_id$netlbl_unlabel(0x0) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="7011613bad000000c439e91f17d3b79900d7cd0d232857e8bd0ed29257b2ec37e4e0e252cc787b197a43e245f0a35e0ebb11da8f2f52579268ee5080f40015416af8286fd344b03887804cb0118183597a174d8a6f70fd77dbff2c1d97a85a3478dc5e9157f541504fcd317fe2e87a4079c5c85b23c7e3a3a9ed27abfe294ac0c275dcbe8cdf7118e70807fc2aa37e1634b1a17d125ee7bbdfb4b4a90a34c94cfbf6a2f3139cd06e6726e03f99f582253797b80d4ee9d5e2940383242a9d265b327805c6c57d0d59ca59c59d413e0cfefa0c33e29626e9c26836a85ac10256341f14", @ANYRES16=r5, @ANYBLOB="000425bd7000ffdbdf2508000000080005000a01010014000300000000000000000000000000000000012700070073797374656d5f753a6f626a6563745f723a6e756c6c5f6465766963655f743a733000002600070073797374656d5f753a6f626a6563745f723a67657474795f657865635f743a7330000000"], 0x80}}, 0x4004) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x28, r5, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private2}]}, 0x28}, 0x1, 0x0, 0x0, 0x4884}, 0x20000000) 20:17:48 executing program 3: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x2, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x238, 0x4c0003de, 0x0, 0x108, 0x0, 0x108, 0x1e0, 0x1e0, 0x1e0, 0x1e0, 0x1e0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x98, 0xc8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@ip={@multicast1, @local, 0x0, 0x0, 'vcan0\x00', 'veth0_to_bridge\x00'}, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x298) [ 363.500131][T13858] overlayfs: workdir and upperdir must reside under the same mount 20:17:48 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x2e}]}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000001e00), 0x3fffffffffffe36, 0x0) [ 363.551028][T13865] FAT-fs (loop1): bogus number of reserved sectors 20:17:48 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4000000000, 0x2, &(0x7f0000002280)=[{&(0x7f0000000100)="800000003804000019000300e60100006c00fec9000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000140)="fcba5820c3ef1b77e8a23dd18b16961616356dd7fdeb89769b12def3b6cfd1ab4505524f78c1aa2bf4de120e650f04d278edd8006ad9f89c8b6d8ed96e63d878ff15074525d84e21090fcf500adea45e5683baf409b890f14dec72b7819a765b1f523b740006fa097ad63376050c8f865b5ffbd88b998d1665f951439c15e32429223f310ee8e4d1652b156fd2a1b1c7deec970e41e7a4", 0x97, 0x6}], 0x0, 0x0) socket(0x0, 0x0, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x0) [ 363.596599][T13865] FAT-fs (loop1): Can't find a valid FAT filesystem 20:17:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050012004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00006700090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x4}}, [@filter_kind_options=@f_flow={{0x9, 0x1, 'flow\x00'}, {0x4}}]}, 0x34}}, 0x0) 20:17:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) [ 363.741276][T13879] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 363.751306][T13879] EXT4-fs (loop2): group descriptors corrupted! [ 363.823903][T13888] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 363.847559][T13896] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 363.859575][T13889] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 20:17:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, 0x0, 0x2081}}}}}}]}, 0x48}}, 0x0) [ 363.872254][T13889] EXT4-fs (loop2): group descriptors corrupted! [ 363.879611][T13897] FAT-fs (loop1): bogus number of reserved sectors [ 363.887665][T13897] FAT-fs (loop1): Can't find a valid FAT filesystem 20:17:48 executing program 2: creat(&(0x7f0000001480)='./file1\x00', 0x0) utimensat(0xffffffffffffff9c, &(0x7f0000000300)='./file1\x00', &(0x7f00000001c0)={{}, {0x0, 0x2710}}, 0x0) 20:17:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) [ 364.126386][T13921] FAT-fs (loop1): bogus number of reserved sectors [ 364.132935][T13921] FAT-fs (loop1): Can't find a valid FAT filesystem 20:17:48 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) link(&(0x7f0000000200)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$system_posix_acl(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {0x1, 0x1}, [], {}, [{0x8, 0x4}]}, 0x2c, 0x1) 20:17:48 executing program 2: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [0x0, 0x0, 0xf2030000], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65", 0x9) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(0xffffffffffffffff, 0x0, 0x0) 20:17:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) r1 = socket(0x11, 0x800000003, 0x8) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x1, 0xe7}]}, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) open(0x0, 0x200800, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65a9418ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) syz_open_procfs(0x0, &(0x7f0000000100)='net/ip6_tables_targets\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000380)=ANY=[@ANYBLOB="02000000000000000200000000000000010001000000000000000000000000000104000000000000080102080000000000000000000000000000000000000000000000000000000000000000000000000100000001000000080000000000000009000000000000000006000100000000000000000000000000000000003e85e8880900"/147]) syz_genetlink_get_family_id$netlbl_unlabel(0x0) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4884}, 0x20000000) [ 364.343963][T13931] xt_CT: You must specify a L4 protocol and not use inversions on it [ 364.504536][T13935] overlayfs: './file0' not a directory 20:17:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) r1 = socket(0x11, 0x800000003, 0x8) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x1, 0xe7}]}, 0x10) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x200800, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65a9418ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip6_tables_targets\x00') preadv(r4, &(0x7f00000017c0), 0x3da, 0x0) ioctl$BLKREPORTZONE(r4, 0xc0101282, &(0x7f0000000380)=ANY=[@ANYBLOB="02000000000000000200000000000000010001000000000000000000000000000104000000000000080102080000000000000000000000000000000000000000000000000000000000000000000000000100000001000000080000000000000009000000000000000006000100000000000000000000000000000000003e85e8880900"/149]) r5 = syz_genetlink_get_family_id$netlbl_unlabel(0x0) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="7011613bad000000c439e91f17d3b79900d7cd0d232857e8bd0ed29257b2ec37e4e0e252cc787b197a43e245f0a35e0ebb11da8f2f52579268ee5080f40015416af8286fd344b03887804cb0118183597a174d8a6f70fd77dbff2c1d97a85a3478dc5e9157f541504fcd317fe2e87a4079c5c85b23c7e3a3a9ed27abfe294ac0c275dcbe8cdf7118e70807fc2aa37e1634b1a17d125ee7bbdfb4b4a90a34c94cfbf6a2f3139cd06e6726e03f99f582253797b80d4ee9d5e2940383242a9d265b327805c6c57d0d59ca59c59d413e0cfefa0c33e29626e9c26836a85ac10256341f14", @ANYRES16=r5, @ANYBLOB="000425bd7000ffdbdf2508000000080005000a01010014000300000000000000000000000000000000012700070073797374656d5f753a6f626a6563745f723a6e756c6c5f6465766963655f743a733000002600070073797374656d5f753a6f626a6563745f723a67657474795f657865635f743a7330000000"], 0x80}}, 0x4004) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x28, r5, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private2}]}, 0x28}, 0x1, 0x0, 0x0, 0x4884}, 0x20000000) 20:17:49 executing program 2: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [0x0, 0x0, 0xf2030000], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65", 0x9) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(0xffffffffffffffff, 0x0, 0x0) 20:17:49 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:49 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x2e}]}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000001e00), 0x3fffffffffffe36, 0x0) 20:17:49 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) link(&(0x7f0000000200)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$system_posix_acl(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {0x1, 0x1}, [], {}, [{0x8, 0x4}]}, 0x2c, 0x1) 20:17:49 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) link(&(0x7f0000000200)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$system_posix_acl(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {0x1, 0x1}, [], {}, [{0x8, 0x4}]}, 0x2c, 0x1) [ 364.634455][T13953] xt_CT: You must specify a L4 protocol and not use inversions on it [ 364.653799][T13955] FAT-fs (loop1): bogus number of reserved sectors [ 364.678419][T13955] FAT-fs (loop1): Can't find a valid FAT filesystem 20:17:49 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) link(&(0x7f0000000200)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$system_posix_acl(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {0x1, 0x1}, [], {}, [{0x8, 0x4}]}, 0x2c, 0x1) 20:17:49 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174", 0xb}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) [ 365.066297][T13974] FAT-fs (loop1): bogus number of reserved sectors 20:17:49 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) link(&(0x7f0000000200)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') setxattr$system_posix_acl(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {0x1, 0x1}, [], {}, [{0x8, 0x4}]}, 0x2c, 0x1) [ 365.112983][T13974] FAT-fs (loop1): Can't find a valid FAT filesystem 20:17:49 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174", 0xb}, {&(0x7f0000000880)="7e493c78124dac9d6f446e9cf5ef247c2cffb18fd3023247a7da1ca797f6ce82861faeedc8b2c6567fdb6fb9b215d428da9d75e3fba9c1f4ffd006b4b02a47f3e70ecd0c8f8ecad898ab4390ad0b540cd4be5e01d2fd71a8b4271ff634f9276550f5aa337e39bdcbeb0bafbd58e0a0a7adba1ae1f31f59e33165834362786f35973e68a0aada5361ac171fc3b85835b6a3f53e1bd4cfcc6e0fc0c438d6dcc113bc633741ee493816eb92be1621abf6555e39bc514f219d1017624edf04ee05823bda4c3149998f820bbabe86d9ef11bc9577d0a355638403b0cf246699b58a445e3a078542b1a2be262e5f5bd64c16fcfc2d8303040b297ea2a3271e4c42d272fe5c26532d93292c5277890dda520bf0cfc9b622d22ced5f7f306fd88e0ca2234b7dc44a4cd09c395e6b60ac8c528b8c8b19d6c5af04381567aff2ce0610580d752a645dab69d0ab852e566997cf5f266d27888aba21b41e896d249bd8d55e7086e48a5eb8884c89904cb7b6d5ff16a141a01dbfd403463075b756ae26cedd25a8247934bf1c3fe8a95cc583d0a03b15f72e44434f65a5a401dcd3e5779920d7901f39a5a482cf871e56a700ebda75e939caf5f872c1313608368feb8db00c7397068d46777d73807405576ff753a006d73f5222097a6013f757d63a049d10b33226f852fb839572e5adcd21ee294d73df8e15ddc26316318e3157af17826e89c3e371fd78de2326e502b850861e8de0e5325fe6cff6da965e2132916952cc2dd049443830bd72710794304625da015c50b134e897ff81938034377d373850a007d7412459bd6ac2de181bde7df45348514a32202bf807635bdf128de2849bde6faaa09bd766bf2362f7091a8bfc528a6f37735d9e9d6fa8b910a372ada3819cc0ef8ee5719b59c50ce57008c4fbf6b8c31e0775dd81103eb8af1075ad17942323c53bd4d2193e3e50456c80f1cca6f596ef210ca3162b84af3e4ddbfa133fc6dee4fd7331308c1c41b8f3", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=0xffffffffffffffff) fcntl$setsig(r0, 0xa, 0x1f) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x95b6) sendto$inet(r0, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) sendto(r0, &(0x7f0000000040)="b2", 0x1, 0x8055, 0x0, 0x0) [ 365.405122][T13989] FAT-fs (loop1): bogus number of reserved sectors [ 365.478460][T13989] FAT-fs (loop1): Can't find a valid FAT filesystem 20:17:50 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x3) sendfile(r1, r0, 0x0, 0x7fff) 20:17:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) r1 = socket(0x11, 0x800000003, 0x8) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x1, 0xe7}]}, 0x10) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x200800, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65a9418ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip6_tables_targets\x00') preadv(r4, &(0x7f00000017c0), 0x3da, 0x0) ioctl$BLKREPORTZONE(r4, 0xc0101282, &(0x7f0000000380)=ANY=[@ANYBLOB="02000000000000000200000000000000010001000000000000000000000000000104000000000000080102080000000000000000000000000000000000000000000000000000000000000000000000000100000001000000080000000000000009000000000000000006000100000000000000000000000000000000003e85e8880900"/149]) r5 = syz_genetlink_get_family_id$netlbl_unlabel(0x0) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="7011613bad000000c439e91f17d3b79900d7cd0d232857e8bd0ed29257b2ec37e4e0e252cc787b197a43e245f0a35e0ebb11da8f2f52579268ee5080f40015416af8286fd344b03887804cb0118183597a174d8a6f70fd77dbff2c1d97a85a3478dc5e9157f541504fcd317fe2e87a4079c5c85b23c7e3a3a9ed27abfe294ac0c275dcbe8cdf7118e70807fc2aa37e1634b1a17d125ee7bbdfb4b4a90a34c94cfbf6a2f3139cd06e6726e03f99f582253797b80d4ee9d5e2940383242a9d265b327805c6c57d0d59ca59c59d413e0cfefa0c33e29626e9c26836a85ac10256341f14", @ANYRES16=r5, @ANYBLOB="000425bd7000ffdbdf2508000000080005000a01010014000300000000000000000000000000000000012700070073797374656d5f753a6f626a6563745f723a6e756c6c5f6465766963655f743a733000002600070073797374656d5f753a6f626a6563745f723a67657474795f657865635f743a7330000000"], 0x80}}, 0x4004) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x28, r5, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private2}]}, 0x28}, 0x1, 0x0, 0x0, 0x4884}, 0x20000000) 20:17:50 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x4, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 20:17:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174", 0xb}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:50 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = syz_open_procfs(0x0, &(0x7f0000000580)='mounts\x00') sendfile(r0, r1, &(0x7f0000000240)=0xf101, 0x4000000000dc) 20:17:50 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002e0, 0xe, 0x80000, &(0x7f0000000280)="b95b03b700030005439e40f06558", 0x0, 0x1a4, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 365.819171][T14008] FAT-fs (loop1): bogus number of reserved sectors [ 365.825849][T14008] FAT-fs (loop1): Can't find a valid FAT filesystem 20:17:50 executing program 4: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [0x0, 0x0, 0xf2030000], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65", 0x9) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {0x0}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x0) 20:17:50 executing program 2: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [0x0, 0x0, 0xf2030000], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="cb56b6", 0x3) 20:17:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002", 0x11}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:50 executing program 4: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [0x0, 0x0, 0xf2030000], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65", 0x9) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {0x0}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x0) [ 366.072586][T14026] xt_CT: You must specify a L4 protocol and not use inversions on it 20:17:50 executing program 3: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x1600bd7e, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x210, 0x4c0003de, 0x0, 0x108, 0x0, 0x108, 0x1e0, 0x1e0, 0x1e0, 0x1e0, 0x1e0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@ip={@multicast1, @local, 0x0, 0x0, 'vcan0\x00', 'veth0_to_bridge\x00'}, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x270) [ 366.119181][T14033] FAT-fs (loop1): invalid media value (0x00) [ 366.125264][T14033] FAT-fs (loop1): Can't find a valid FAT filesystem [ 366.145682][T14037] xt_CT: You must specify a L4 protocol and not use inversions on it [ 366.185694][T14043] xt_CT: You must specify a L4 protocol and not use inversions on it 20:17:50 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r1, r0, 0x0, 0x7fff) 20:17:50 executing program 2: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [0x0, 0x0, 0xf2030000], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="cb56b6", 0x3) [ 366.404220][T14054] xt_CT: You must specify a L4 protocol and not use inversions on it 20:17:51 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [0x2c8], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(0xffffffffffffffff, 0x0, 0x0) 20:17:51 executing program 4: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [0x0, 0x0, 0xf2030000], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65", 0x9) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {0x0}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x0) 20:17:51 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002", 0x11}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x14, 0x2, 0x2, 0x201}, 0x14}}, 0x0) 20:17:51 executing program 2: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [0x0, 0x0, 0xf2030000], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="cb56b6", 0x3) 20:17:51 executing program 2: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [0x0, 0x0, 0xf2030000], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="cb56b6", 0x3) [ 366.741910][T14062] FAT-fs (loop1): invalid media value (0x00) [ 366.741922][T14062] FAT-fs (loop1): Can't find a valid FAT filesystem [ 366.768388][T14068] xt_CT: You must specify a L4 protocol and not use inversions on it [ 366.782002][T14066] xt_CT: You must specify a L4 protocol and not use inversions on it 20:17:51 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [0x2c8], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(0xffffffffffffffff, 0x0, 0x0) 20:17:51 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002", 0x11}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:51 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) link(&(0x7f0000000200)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') socket$netlink(0x10, 0x3, 0x0) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003e40), 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {}, {0x20, 0x1}}, 0x2c, 0x1) 20:17:51 executing program 4: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [0x0, 0x0, 0xf2030000], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65", 0x9) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {0x0}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x0) [ 367.149876][T14091] FAT-fs (loop1): invalid media value (0x00) [ 367.149888][T14091] FAT-fs (loop1): Can't find a valid FAT filesystem [ 367.232139][T14084] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 20:17:51 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x1, 0xe7}]}, 0x10) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = open(0x0, 0x200800, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65a9418ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3da, 0x0) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="7011613bad000000c439e91f17d3b79900d7cd0d232857e8bd0ed29257b2ec37e4e0e252cc787b197a43e245f0a35e0ebb11da8f2f52579268ee5080f40015416af8286fd344b03887804cb0118183597a174d8a6f70fd77dbff2c1d97a85a3478dc5e9157f541504fcd317fe2e87a4079c5c85b23c7e3a3a9ed27abfe294ac0c275dcbe8cdf7118e70807fc2aa37e1634b1a17d125ee7bbdfb4b4a90a34c94cfbf6a2f3139cd06e6726e03f99f582253797b80d4ee9d5e2940383242a9d265b327805c6c57d0d59ca59c59d413e0cfefa0c33e29626e9c26836a85ac10256341f14", @ANYRES16, @ANYBLOB="000425bd7000ffdbdf2508000000080005000a01010014000300000000000000000000000000000000012700070073797374656d5f753a6f626a6563745f723a6e756c6c5f6465766963655f743a733000002600070073797374656d5f753a6f626a6563745f723a67657474795f657865635f743a7330000000"], 0x80}}, 0x4004) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x28, 0x0, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private2}]}, 0x28}, 0x1, 0x0, 0x0, 0x4884}, 0x20000000) 20:17:51 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [0x2c8], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(0xffffffffffffffff, 0x0, 0x0) 20:17:51 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) link(&(0x7f0000000200)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003e40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@cred={{0x1c}}], 0x20}], 0x1, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {}, {0x20, 0x1}}, 0x2c, 0x0) 20:17:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x80002, 0x0) close(r2) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000540)={0x24, r3, 0xf, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x24}}, 0x0) 20:17:51 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270", 0x14}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:51 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) link(&(0x7f0000000200)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') socket$netlink(0x10, 0x3, 0x0) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003e40), 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {}, {0x20, 0x1}}, 0x2c, 0x1) [ 367.363001][T14104] FAT-fs (loop1): invalid media value (0x00) [ 367.380524][T14104] FAT-fs (loop1): Can't find a valid FAT filesystem 20:17:52 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270", 0x14}, {&(0x7f0000000880)="7e493c78124dac9d6f446e9cf5ef247c2cffb18fd3023247a7da1ca797f6ce82861faeedc8b2c6567fdb6fb9b215d428da9d75e3fba9c1f4ffd006b4b02a47f3e70ecd0c8f8ecad898ab4390ad0b540cd4be5e01d2fd71a8b4271ff634f9276550f5aa337e39bdcbeb0bafbd58e0a0a7adba1ae1f31f59e33165834362786f35973e68a0aada5361ac171fc3b85835b6a3f53e1bd4cfcc6e0fc0c438d6dcc113bc633741ee493816eb92be1621abf6555e39bc514f219d1017624edf04ee05823bda4c3149998f820bbabe86d9ef11bc9577d0a355638403b0cf246699b58a445e3a078542b1a2be262e5f5bd64c16fcfc2d8303040b297ea2a3271e4c42d272fe5c26532d93292c5277890dda520bf0cfc9b622d22ced5f7f306fd88e0ca2234b7dc44a4cd09c395e6b60ac8c528b8c8b19d6c5af04381567aff2ce0610580d752a645dab69d0ab852e566997cf5f266d27888aba21b41e896d249bd8d55e7086e48a5eb8884c89904cb7b6d5ff16a141a01dbfd403463075b756ae26cedd25a8247934bf1c3fe8a95cc583d0a03b15f72e44434f65a5a401dcd3e5779920d7901f39a5a482cf871e56a700ebda75e939caf5f872c1313608368feb8db00c7397068d46777d73807405576ff753a006d73f5222097a6013f757d63a049d10b33226f852fb839572e5adcd21ee294d73df8e15ddc26316318e3157af17826e89c3e371fd78de2326e502b850861e8de0e5325fe6cff6da965e2132916952cc2dd049443830bd72710794304625da015c50b134e897ff81938034377d373850a007d7412459bd6ac2de181bde7df45348514a32202bf807635bdf128de2849bde6faaa09bd766bf2362f7091a8bfc528a6f37735d9e9d6fa8b910a372ada3819cc0ef8ee5719b59c50ce57008c4fbf6b8c31e0775dd81103eb8af1075ad17942323c53bd4d2193e3e50456c80f1cca6f596ef210ca3162b84af3e4ddbfa133fc6dee4fd7331308c1c41b8f3", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) r1 = socket(0x11, 0x800000003, 0x8) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x1, 0xe7}]}, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) open(0x0, 0x200800, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65a9418ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip6_tables_targets\x00') preadv(r2, 0x0, 0x0, 0x0) ioctl$BLKREPORTZONE(r2, 0xc0101282, &(0x7f0000000380)=ANY=[@ANYBLOB="02000000000000000200000000000000010001000000000000000000000000000104000000000000080102080000000000000000000000000000000000000000000000000000000000000000000000000100000001000000080000000000000009000000000000000006000100000000000000000000000000000000003e85e8880900"/147]) syz_genetlink_get_family_id$netlbl_unlabel(0x0) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x4004) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0x0, 0x200}, 0x14}}, 0x20000000) 20:17:52 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [0x2c8], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(0xffffffffffffffff, 0x0, 0x0) [ 367.607142][T14125] FAT-fs (loop1): invalid media value (0x00) [ 367.626786][T14125] FAT-fs (loop1): Can't find a valid FAT filesystem 20:17:52 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) link(&(0x7f0000000200)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003e40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@cred={{0x1c}}], 0x20}], 0x1, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {}, {0x20, 0x1}}, 0x2c, 0x0) 20:17:52 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [0x2c8], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:17:52 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270", 0x14}, {&(0x7f0000000880)="7e493c78124dac9d6f446e9cf5ef247c2cffb18fd3023247a7da1ca797f6ce82861faeedc8b2c6567fdb6fb9b215d428da9d75e3fba9c1f4ffd006b4b02a47f3e70ecd0c8f8ecad898ab4390ad0b540cd4be5e01d2fd71a8b4271ff634f9276550f5aa337e39bdcbeb0bafbd58e0a0a7adba1ae1f31f59e33165834362786f35973e68a0aada5361ac171fc3b85835b6a3f53e1bd4cfcc6e0fc0c438d6dcc113bc633741ee493816eb92be1621abf6555e39bc514f219d1017624edf04ee05823bda4c3149998f820bbabe86d9ef11bc9577d0a355638403b0cf246699b58a445e3a078542b1a2be262e5f5bd64c16fcfc2d8303040b297ea2a3271e4c42d272fe5c26532d93292c5277890dda520bf0cfc9b622d22ced5f7f306fd88e0ca2234b7dc44a4cd09c395e6b60ac8c528b8c8b19d6c5af04381567aff2ce0610580d752a645dab69d0ab852e566997cf5f266d27888aba21b41e896d249bd8d55e7086e48a5eb8884c89904cb7b6d5ff16a141a01dbfd403463075b756ae26cedd25a8247934bf1c3fe8a95cc583d0a03b15f72e44434f65a5a401dcd3e5779920d7901f39a5a482cf871e56a700ebda75e939caf5f872c1313608368feb8db00c7397068d46777d73807405576ff753a006d73f5222097a6013f757d63a049d10b33226f852fb839572e5adcd21ee294d73df8e15ddc26316318e3157af17826e89c3e371fd78de2326e502b850861e8de0e5325fe6cff6da965e2132916952cc2dd049443830bd72710794304625da015c50b134e897ff81938034377d373850a007d7412459bd6ac2de181bde7df45348514a32202bf807635bdf128de2849bde6faaa09bd766bf2362f7091a8bfc528a6f37735d9e9d6fa8b910a372ada3819cc0ef8ee5719b59c50ce57008c4fbf6b8c31e0775dd81103eb8af1075ad17942323c53bd4d2193e3e50456c80f1cca6f596ef210ca3162b84af3e4ddbfa133fc6dee4fd7331308c1c41b8f3", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) [ 367.929763][T14145] FAT-fs (loop1): invalid media value (0x00) [ 367.947970][T14145] FAT-fs (loop1): Can't find a valid FAT filesystem 20:17:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x34, 0x6, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x34}}, 0x0) 20:17:52 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) link(&(0x7f0000000200)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003e40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@cred={{0x1c}}], 0x20}], 0x1, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {}, {0x20, 0x1}}, 0x2c, 0x0) 20:17:52 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [0x2c8], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) 20:17:52 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) link(&(0x7f0000000200)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003e40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@cred={{0x1c}}], 0x20}], 0x1, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {}, {0x20, 0x1}}, 0x2c, 0x0) 20:17:52 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7", 0x15}, {&(0x7f0000000880)="7e493c78124dac9d6f446e9cf5ef247c2cffb18fd3023247a7da1ca797f6ce82861faeedc8b2c6567fdb6fb9b215d428da9d75e3fba9c1f4ffd006b4b02a47f3e70ecd0c8f8ecad898ab4390ad0b540cd4be5e01d2fd71a8b4271ff634f9276550f5aa337e39bdcbeb0bafbd58e0a0a7adba1ae1f31f59e33165834362786f35973e68a0aada5361ac171fc3b85835b6a3f53e1bd4cfcc6e0fc0c438d6dcc113bc633741ee493816eb92be1621abf6555e39bc514f219d1017624edf04ee05823bda4c3149998f820bbabe86d9ef11bc9577d0a355638403b0cf246699b58a445e3a078542b1a2be262e5f5bd64c16fcfc2d8303040b297ea2a3271e4c42d272fe5c26532d93292c5277890dda520bf0cfc9b622d22ced5f7f306fd88e0ca2234b7dc44a4cd09c395e6b60ac8c528b8c8b19d6c5af04381567aff2ce0610580d752a645dab69d0ab852e566997cf5f266d27888aba21b41e896d249bd8d55e7086e48a5eb8884c89904cb7b6d5ff16a141a01dbfd403463075b756ae26cedd25a8247934bf1c3fe8a95cc583d0a03b15f72e44434f65a5a401dcd3e5779920d7901f39a5a482cf871e56a700ebda75e939caf5f872c1313608368feb8db00c7397068d46777d73807405576ff753a006d73f5222097a6013f757d63a049d10b33226f852fb839572e5adcd21ee294d73df8e15ddc26316318e3157af17826e89c3e371fd78de2326e502b850861e8de0e5325fe6cff6da965e2132916952cc2dd049443830bd72710794304625da015c50b134e897ff81938034377d373850a007d7412459bd6ac2de181bde7df45348514a32202bf807635bdf128de2849bde6faaa09bd766bf2362f7091a8bfc528a6f37735d9e9d6fa8b910a372ada3819cc0ef8ee5719b59c50ce57008c4fbf6b8c31e0775dd81103eb8af1075ad17942323c53bd4d2193e3e50456c80f1cca6f596ef210ca3162b84af3e4ddbfa133fc6dee4fd7331308c1c41b8f3", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) [ 368.354743][T14158] FAT-fs (loop1): invalid media value (0x00) [ 368.361159][T14158] FAT-fs (loop1): Can't find a valid FAT filesystem [ 368.411376][T14167] xt_ct_set_helper: 8 callbacks suppressed [ 368.418350][T14167] xt_CT: You must specify a L4 protocol and not use inversions on it 20:17:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) r1 = socket(0x11, 0x800000003, 0x8) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x1, 0xe7}]}, 0x10) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x200800, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65a9418ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip6_tables_targets\x00') preadv(r4, 0x0, 0x0, 0x0) ioctl$BLKREPORTZONE(r4, 0xc0101282, &(0x7f0000000380)=ANY=[@ANYBLOB="02000000000000000200000000000000010001000000000000000000000000000104000000000000080102080000000000000000000000000000000000000000000000000000000000000000000000000100000001000000080000000000000009000000000000000006000100000000000000000000000000000000003e85e8880900"/149]) r5 = syz_genetlink_get_family_id$netlbl_unlabel(0x0) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="7011613bad000000c439e91f17d3b79900d7cd0d232857e8bd0ed29257b2ec37e4e0e252cc787b197a43e245f0a35e0ebb11da8f2f52579268ee5080f40015416af8286fd344b03887804cb0118183597a174d8a6f70fd77dbff2c1d97a85a3478dc5e9157f541504fcd317fe2e87a4079c5c85b23c7e3a3a9ed27abfe294ac0c275dcbe8cdf7118e70807fc2aa37e1634b1a17d125ee7bbdfb4b4a90a34c94cfbf6a2f3139cd06e6726e03f99f582253797b80d4ee9d5e2940383242a9d265b327805c6c57d0d59ca59c59d413e0cfefa0c33e29626e9c26836a85ac10256341f14", @ANYRES16=r5, @ANYBLOB="000425bd7000ffdbdf2508000000080005000a01010014000300000000000000000000000000000000012700070073797374656d5f753a6f626a6563745f723a6e756c6c5f6465766963655f743a733000002600070073797374656d5f753a6f626a6563745f723a67657474795f657865635f743a7330000000"], 0x80}}, 0x4004) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r5, 0x200, 0x70bd25, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x4884}, 0x20000000) 20:17:53 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [0x2c8], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) 20:17:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) r1 = socket(0x11, 0x800000003, 0x8) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x1, 0xe7}]}, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) open(0x0, 0x200800, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65a9418ded8974895abeaf4b4836af922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip6_tables_targets\x00') preadv(r2, 0x0, 0x0, 0x0) ioctl$BLKREPORTZONE(r2, 0xc0101282, &(0x7f0000000380)=ANY=[@ANYBLOB="02000000000000000200000000000000010001000000000000000000000000000104000000000000080102080000000000000000000000000000000000000000000000000000000000000000000000000100000001000000080000000000000009000000000000000006000100000000000000000000000000000000003e85e8880900"/147]) syz_genetlink_get_family_id$netlbl_unlabel(0x0) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x4004) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0x0, 0x200}, 0x14}}, 0x20000000) 20:17:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7", 0x15}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x8) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 20:17:53 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [0x2c8], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) [ 368.649495][T14177] xt_CT: You must specify a L4 protocol and not use inversions on it 20:17:53 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [0x2c8], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 368.737950][T14183] xt_CT: You must specify a L4 protocol and not use inversions on it 20:17:53 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) link(&(0x7f0000000200)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003e40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@cred={{0x1c}}], 0x20}], 0x1, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {}, [{}], {}, [], {}, {0x20, 0x1}}, 0x2c, 0x0) [ 368.800849][T14190] FAT-fs (loop1): invalid media value (0x00) 20:17:53 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [0x2c8], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 368.844702][T14190] FAT-fs (loop1): Can't find a valid FAT filesystem [ 368.864026][T14196] xt_CT: You must specify a L4 protocol and not use inversions on it 20:17:53 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [0x2c8], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 368.933170][T14205] xt_CT: You must specify a L4 protocol and not use inversions on it 20:17:53 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x4, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40010}, 0x20000000) 20:17:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7", 0x15}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) [ 369.102757][T14211] xt_CT: You must specify a L4 protocol and not use inversions on it [ 369.136941][T14216] FAT-fs (loop1): invalid media value (0x00) [ 369.148644][T14216] FAT-fs (loop1): Can't find a valid FAT filesystem 20:17:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) 20:17:54 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@nointegrity='nointegrity'}]}) 20:17:54 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002e0, 0xe, 0x80000, &(0x7f0000000280)="b95b03b700030005439e40f088a8", 0x0, 0x1a4, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 20:17:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c5610067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) 20:17:54 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [0x2c8], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:17:54 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:54 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [0x2c8], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 369.707459][T14241] xt_CT: You must specify a L4 protocol and not use inversions on it 20:17:54 executing program 2: ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff), 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x23}}}}, &(0x7f0000000080)=0x84) socket(0x10, 0x2, 0x0) keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, &(0x7f00000001c0)=0x5) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4004800}, 0x800) fchdir(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 20:17:54 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x50, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {0x4}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x20, 0x2, [@TCA_CGROUP_ACT={0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x50}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000ac0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x24}}, 0x0) 20:17:54 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [0x2c8], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:17:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) [ 369.916768][T14256] xt_CT: You must specify a L4 protocol and not use inversions on it 20:17:54 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="73697a653d67d6"]) 20:17:54 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) [ 369.997866][T14260] IPVS: ftp: loaded support on port[0] = 21 [ 370.065856][T14262] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 370.164823][T14286] xt_CT: You must specify a L4 protocol and not use inversions on it [ 370.178614][T14262] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 370.199074][T14304] tmpfs: Bad value for 'size' [ 370.202666][T14281] IPVS: ftp: loaded support on port[0] = 21 [ 370.220020][T14262] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 370.237280][T14288] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 370.251561][T14304] tmpfs: Bad value for 'size' 20:17:54 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [0x2c8], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 370.268182][ T8853] tipc: TX() has been purged, node left! [ 370.278116][T14278] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 20:17:54 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [0x2c8], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:17:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) 20:17:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f00000000c0)='hfsplus\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@part={'part'}}]}) 20:17:54 executing program 2: ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff), 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x23}}}}, &(0x7f0000000080)=0x84) socket(0x10, 0x2, 0x0) keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, &(0x7f00000001c0)=0x5) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4004800}, 0x800) fchdir(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 20:17:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x20000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, 0x0, 0x4000) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001bc0)={r2}) recvmsg$kcm(r1, 0x0, 0x40010141) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000006180)={&(0x7f0000005140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x1}}]}, {0x0, [0x0, 0x0, 0x2e, 0x5f]}}, &(0x7f0000005180)=""/4096, 0x36, 0x1000, 0x1}, 0x20) 20:17:55 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [0x2c8], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:17:55 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:55 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [0x2c8], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 370.551576][T14360] hfsplus: unable to find HFS+ superblock [ 370.584571][T14365] IPVS: ftp: loaded support on port[0] = 21 20:17:55 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) [ 370.752330][T14396] xt_CT: You must specify a L4 protocol and not use inversions on it 20:17:55 executing program 2: ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff), 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x23}}}}, &(0x7f0000000080)=0x84) socket(0x10, 0x2, 0x0) keyctl$chown(0x4, 0x0, 0xee00, 0x0) ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, &(0x7f00000001c0)=0x5) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4004800}, 0x800) fchdir(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 20:17:55 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x20000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 20:17:55 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [0x2c8], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:17:55 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [0x2c8], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:17:55 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [0x2c8], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:17:55 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) [ 371.002578][T14412] IPVS: ftp: loaded support on port[0] = 21 20:17:55 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [0x2c8], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:17:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x20000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, 0x0, 0x4000) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001bc0)={r2}) recvmsg$kcm(r1, 0x0, 0x40010141) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000006180)={&(0x7f0000005140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x1}}]}, {0x0, [0x0, 0x0, 0x2e, 0x5f]}}, &(0x7f0000005180)=""/4096, 0x36, 0x1000, 0x1}, 0x20) 20:17:55 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400000) 20:17:55 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x20000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, 0x0, 0x4000) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001bc0)={r2}) recvmsg$kcm(r1, 0x0, 0x40010141) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000006180)={&(0x7f0000005140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x1}}]}, {0x0, [0x0, 0x0, 0x2e, 0x5f]}}, &(0x7f0000005180)=""/4096, 0x36, 0x1000, 0x1}, 0x20) 20:17:56 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:56 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [0x2c8], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:17:56 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400000) 20:17:56 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x20000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 20:17:56 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [0x2c8], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:17:56 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400000) 20:17:56 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:56 executing program 0: socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [0x2c8], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:17:56 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x20000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 20:17:56 executing program 4: ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x23}}}}, &(0x7f0000000080)=0x84) socket(0x10, 0x2, 0x0) keyctl$chown(0x4, 0x0, 0xee00, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x180040, 0x0) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4004800}, 0x800) fchdir(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 20:17:56 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) 20:17:56 executing program 2: syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={[{@noquota='noquota'}]}) 20:17:57 executing program 0: socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [0x2c8], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:17:57 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:57 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) 20:17:57 executing program 0: socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [0x2c8], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:17:57 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffee2, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000002c0)="ee", 0x1}], 0x1}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000005840)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000640)=""/235, 0xeb}], 0x1}}, {{0x0, 0x0, &(0x7f0000000d80)=[{&(0x7f0000000ac0)=""/141, 0x8d}, {&(0x7f0000000b80)=""/141, 0x8d}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="04", 0x300, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 372.678387][T14514] IPVS: ftp: loaded support on port[0] = 21 20:17:57 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:17:57 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) [ 372.884207][T14535] IPVS: ftp: loaded support on port[0] = 21 20:17:57 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) [ 373.028191][ T8853] tipc: TX() has been purged, node left! [ 373.040456][ T8853] tipc: TX() has been purged, node left! 20:17:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f00000000c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}], {0x14}}, 0x54}}, 0x0) [ 373.068894][ T8853] tipc: TX() has been purged, node left! 20:17:57 executing program 4: ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x23}}}}, &(0x7f0000000080)=0x84) socket(0x10, 0x2, 0x0) keyctl$chown(0x4, 0x0, 0xee00, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x180040, 0x0) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4004800}, 0x800) fchdir(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 20:17:57 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:17:57 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) 20:17:57 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:17:57 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 373.235774][ T8853] tipc: TX() has been purged, node left! 20:17:57 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) 20:17:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r7, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x50, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {0x4}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x20, 0x2, [@TCA_CGROUP_ACT={0x1c, 0x1, [@m_pedit={0x18, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x50}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000ac0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7}}, 0x24}}, 0x0) [ 373.303438][T14598] IPVS: ftp: loaded support on port[0] = 21 20:17:57 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:58 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x168, 0x1d0, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:17:58 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) 20:17:58 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="6c000000022701"], 0x6c}}, 0x0) [ 373.448645][T14625] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 20:17:58 executing program 2: r0 = getpid() write$binfmt_script(0xffffffffffffffff, 0x0, 0x3af4701e) write$binfmt_script(0xffffffffffffffff, 0x0, 0x3af4701e) sendmsg$AUDIT_ADD_RULE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() io_setup(0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'\x00', 0x20000005002}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000c80)=ANY=[@ANYBLOB, @ANYRES32=0x0], 0x50}}, 0x40) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 373.542329][T14625] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 20:17:58 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x168, 0x1d0, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:17:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(0x0, 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) [ 373.650026][T14633] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 20:17:58 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) 20:17:58 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="6c000000022701"], 0x6c}}, 0x0) 20:17:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000005c0)={0x8, 0x40000100, 0x10000}, 0xc) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) clock_gettime(0x78c735e1cceb8ea1, 0x0) sched_yield() futex(0x0, 0x80, 0x0, 0x0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000640)={0x2, 0x4e23, @local}, 0x10) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000340)=[{0x6}]}, 0x10) rename(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) statx(r2, 0x0, 0x800, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) write$P9_RLCREATE(r2, &(0x7f0000000400)={0xfcca}, 0xffffff25) bpf$PROG_LOAD(0x5, 0x0, 0x9935a41d0cecdcff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0xfffffffffffffe9f) ioperm(0x0, 0x0, 0x0) write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x3bf) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) write$P9_RSTAT(r2, &(0x7f0000000100)=ANY=[], 0x1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000040), 0x12) connect(r0, &(0x7f0000000480)=@nl=@unspec, 0x80) 20:17:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(0x0, 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:58 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x168, 0x1d0, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:17:58 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000001580)=[{&(0x7f00000016c0)="7507747dd9bcc24bc9201e9ab3851c2352e456a59990f36599f89b848cf73dba62e0ee4d214b4ea417ba047283d923aa85916b00b017843fb4dd334d8bf4ab10c73e81992e6fd44138b794415b5cc26106b7db3a6b8796ce064e031f8f35e3f749cb730bb38dcfb2cf9155bf417d427a6ea7c2284e317a87736058c4140d8fe5d6", 0x81}, {&(0x7f0000001780)="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", 0x250}], 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xfff, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x6a08, 0x11, 0x0, 0x27) 20:17:58 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x400000) 20:17:58 executing program 3: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@abs={0x1}, 0x8) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) 20:17:58 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:17:58 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 20:17:58 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x400000) 20:17:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(0x0, 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:58 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:17:58 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x240007bd, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[], 0xfffffd61) shutdown(r0, 0x1) 20:17:58 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x400000) 20:17:59 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:17:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c00000002060100000000fc00000000000000000e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c000180080001400000000005001400020000000c00028008000140ec14140005000500020000000500010006"], 0x6c}}, 0x0) 20:17:59 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000001580)=[{&(0x7f00000016c0)="7507747dd9bcc24bc9201e9ab3851c2352e456a59990f36599f89b848cf73dba62e0ee4d214b4ea417ba047283d923aa85916b00b017843fb4dd334d8bf4ab10c73e81992e6fd44138b794415b5cc26106b7db3a6b8796ce064e031f8f35e3f749cb730bb38dcfb2cf9155bf417d427a6ea7c2284e317a87736058c4140d8fe5d6", 0x81}, {&(0x7f0000001780)="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", 0x250}], 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xfff, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x6a08, 0x11, 0x0, 0x27) 20:17:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="7e493c78124dac9d6f446e9cf5ef247c2cffb18fd3023247a7da1ca797f6ce82861faeedc8b2c6567fdb6fb9b215d428da9d75e3fba9c1f4ffd006b4b02a47f3e70ecd0c8f8ecad898ab4390ad0b540cd4be5e01d2fd71a8b4271ff634f9276550f5aa337e39bdcbeb0bafbd58e0a0a7adba1ae1f31f59e33165834362786f35973e68a0aada5361ac171fc3b85835b6a3f53e1bd4cfcc6e0fc0c438d6dcc113bc633741ee493816eb92be1621abf6555e39bc514f219d1017624edf04ee05823bda4c3149998f820bbabe86d9ef11bc9577d0a355638403b0cf246699b58a445e3a078542b1a2be262e5f5bd64c16fcfc2d8303040b297ea2a3271e4c42d272fe5c26532d93292c5277890dda520bf0cfc9b622d22ced5f7f306fd88e0ca2234b7dc44a4cd09c395e6b60ac8c528b8c8b19d6c5af04381567aff2ce0610580d752a645dab69d0ab852e566997cf5f266d27888aba21b41e896d249bd8d55e7086e48a5eb8884c89904cb7b6d5ff16a141a01dbfd403463075b756ae26cedd25a8247934bf1c3fe8a95cc583d0a03b15f72e44434f65a5a401dcd3e5779920d7901f39a5a482cf871e56a700ebda75e939caf5f872c1313608368feb8db00c7397068d46777d73807405576ff753a006d73f5222097a6013f757d63a049d10b33226f852fb839572e5adcd21ee294d73df8e15ddc26316318e3157af17826e89c3e371fd78de2326e502b850861e8de0e5325fe6cff6da965e2132916952cc2dd049443830bd72710794304625da015c50b134e897ff81938034377d373850a007d7412459bd6ac2de181bde7df45348514a32202bf807635bdf128de2849bde6faaa09bd766bf2362f7091a8bfc528a6f37735d9e9d6fa8b910a372ada3819cc0ef8ee5719b59c50ce57008c4fbf6b8c31e0775dd81103eb8af1075ad17942323c53bd4d2193e3e50456c80f1cca6f596ef210ca3162b84af3e4ddbfa133fc6dee4fd7331308c1c41b8f3", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c0000000206010000e0ff0000000000000000000e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c000180080001400000000005001400020000000c00028008000140ec14140005000500020000000500010006"], 0x6c}}, 0x0) 20:17:59 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400000) 20:17:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x20000000, &(0x7f00000004c0)="b95b03b700030000009e40f086dd1fff060000000000000177fbac141412ec000001c699da153f08e0e6e380f60108f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569d4c8d9a823f2c12863f7a6c0cf88ed22aae4f6f084508833b61429a25773eedf63dd9f33d430f2a0a30a7761db16fe0f743b95ded898c28aac1256ce2751b3d738899b8b19d9052b7f13ff94", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000001bc0)) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x40010141) 20:17:59 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1a0, 0x208, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:17:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c0000000206010000e0ff0000000000000000000e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c000180080001400000000005001400020000000c00028008000140ec14140005000500020000000500010006"], 0x6c}}, 0x0) 20:17:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:17:59 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400000) 20:17:59 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1a0, 0x208, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:17:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c0000000206010000e0ff0000000000000000000e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c000180080001400000000005001400020000000c00028008000140ec14140005000500020000000500010006"], 0x6c}}, 0x0) 20:17:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="7e493c78124dac9d6f446e9cf5ef247c2cffb18fd3023247a7da1ca797f6ce82861faeedc8b2c6567fdb6fb9b215d428da9d75e3fba9c1f4ffd006b4b02a47f3e70ecd0c8f8ecad898ab4390ad0b540cd4be5e01d2fd71a8b4271ff634f9276550f5aa337e39bdcbeb0bafbd58e0a0a7adba1ae1f31f59e33165834362786f35973e68a0aada5361ac171fc3b85835b6a3f53e1bd4cfcc6e0fc0c438d6dcc113bc633741ee493816eb92be1621abf6555e39bc514f219d1017624edf04ee05823bda4c3149998f820bbabe86d9ef11bc9577d0a355638403b0cf246699b58a445e3a078542b1a2be262e5f5bd64c16fcfc2d8303040b297ea2a3271e4c42d272fe5c26532d93292c5277890dda520bf0cfc9b622d22ced5f7f306fd88e0ca2234b7dc44a4cd09c395e6b60ac8c528b8c8b19d6c5af04381567aff2ce0610580d752a645dab69d0ab852e566997cf5f266d27888aba21b41e896d249bd8d55e7086e48a5eb8884c89904cb7b6d5ff16a141a01dbfd403463075b756ae26cedd25a8247934bf1c3fe8a95cc583d0a03b15f72e44434f65a5a401dcd3e5779920d7901f39a5a482cf871e56a700ebda75e939caf5f872c1313608368feb8db00c7397068d46777d73807405576ff753a006d73f5222097a6013f757d63a049d10b33226f852fb839572e5adcd21ee294d73df8e15ddc26316318e3157af17826e89c3e371fd78de2326e502b850861e8de0e5325fe6cff6da965e2132916952cc2dd049443830bd72710794304625da015c50b134e897ff81938034377d373850a007d7412459bd6ac2de181bde7df45348514a32202bf807635bdf128de2849bde6faaa09bd766bf2362f7091a8bfc528a6f37735d9e9d6fa8b910a372ada3819cc0ef8ee5719b59c50ce57008c4fbf6b8c31e0775dd81103eb8af1075ad17942323c53bd4d2193e3e50456c80f1cca6f596ef210ca3162b84af3e4ddbfa133fc6dee4fd7331308c1c41b8f3", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:18:00 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000001580)=[{&(0x7f00000016c0)="7507747dd9bcc24bc9201e9ab3851c2352e456a59990f36599f89b848cf73dba62e0ee4d214b4ea417ba047283d923aa85916b00b017843fb4dd334d8bf4ab10c73e81992e6fd44138b794415b5cc26106b7db3a6b8796ce064e031f8f35e3f749cb730bb38dcfb2cf9155bf417d427a6ea7c2284e317a87736058c4140d8fe5d6", 0x81}, {&(0x7f0000001780)="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", 0x250}], 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xfff, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x6a08, 0x11, 0x0, 0x27) 20:18:00 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400000) 20:18:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c0000000206010000e0ff0000000000000000000e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c000180080001400000000005001400020000000c00028008000140ec14140005000500020000000500010006"], 0x6c}}, 0x0) 20:18:00 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1a0, 0x208, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:18:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x6c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x24, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_NETMASK={0x5, 0x14, 0x2}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @dev}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x6c}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x60, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_NETMASK={0x5, 0x14, 0x2}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x60}}, 0x0) r3 = dup2(r1, r2) ioctl$SNDRV_PCM_IOCTL_XRUN(r3, 0x4148, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x7, 0xc100) r4 = socket$packet(0x11, 0x3, 0x300) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000040)={r5, 0x3, 0x2, @local}, 0x10) 20:18:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) [ 375.955564][ T8853] tipc: TX() has been purged, node left! [ 375.963007][ T8853] tipc: TX() has been purged, node left! 20:18:00 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5"}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:18:00 executing program 3: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c0000000206010000e0ff0000000000000000000e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c000180080001400000000005001400020000000c00028008000140ec14140005000500020000000500010006"], 0x6c}}, 0x0) 20:18:00 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x400000) 20:18:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:18:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x6c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x24, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_NETMASK={0x5, 0x14, 0x2}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @dev}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x6c}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x60, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_NETMASK={0x5, 0x14, 0x2}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x60}}, 0x0) r3 = dup2(r1, r2) ioctl$SNDRV_PCM_IOCTL_XRUN(r3, 0x4148, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x7, 0xc100) r4 = socket$packet(0x11, 0x3, 0x300) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000040)={r5, 0x3, 0x2, @local}, 0x10) 20:18:00 executing program 3: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c0000000206010000e0ff0000000000000000000e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c000180080001400000000005001400020000000c00028008000140ec14140005000500020000000500010006"], 0x6c}}, 0x0) 20:18:01 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x6c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x24, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_NETMASK={0x5, 0x14, 0x2}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @dev}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x6c}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x60, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_NETMASK={0x5, 0x14, 0x2}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x60}}, 0x0) r3 = dup2(r1, r2) ioctl$SNDRV_PCM_IOCTL_XRUN(r3, 0x4148, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x7, 0xc100) r4 = socket$packet(0x11, 0x3, 0x300) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000040)={r5, 0x3, 0x2, @local}, 0x10) 20:18:01 executing program 3: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c0000000206010000e0ff0000000000000000000e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c000180080001400000000005001400020000000c00028008000140ec14140005000500020000000500010006"], 0x6c}}, 0x0) 20:18:01 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5"}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:18:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 20:18:01 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x400000) 20:18:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x6c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x24, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_NETMASK={0x5, 0x14, 0x2}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @dev}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x6c}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x60, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_NETMASK={0x5, 0x14, 0x2}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x60}}, 0x0) r3 = dup2(r1, r2) ioctl$SNDRV_PCM_IOCTL_XRUN(r3, 0x4148, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x7, 0xc100) r4 = socket$packet(0x11, 0x3, 0x300) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000040)={r5, 0x3, 0x2, @local}, 0x10) 20:18:01 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5"}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:18:01 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000340)='./bus\x00', &(0x7f0000000380)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:18:01 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x400000) 20:18:01 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c0000000206010000e0ff0000000000000000000e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c000180080001400000000005001400020000000c00028008000140ec14140005000500020000000500010006"], 0x6c}}, 0x0) 20:18:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="7e493c78124dac9d6f446e9cf5ef247c2cffb18fd3023247a7da1ca797f6ce82861faeedc8b2c6567fdb6fb9b215d428da9d75e3fba9c1f4ffd006b4b02a47f3e70ecd0c8f8ecad898ab4390ad0b540cd4be5e01d2fd71a8b4271ff634f9276550f5aa337e39bdcbeb0bafbd58e0a0a7adba1ae1f31f59e33165834362786f35973e68a0aada5361ac171fc3b85835b6a3f53e1bd4cfcc6e0fc0c438d6dcc113bc633741ee493816eb92be1621abf6555e39bc514f219d1017624edf04ee05823bda4c3149998f820bbabe86d9ef11bc9577d0a355638403b0cf246699b58a445e3a078542b1a2be262e5f5bd64c16fcfc2d8303040b297ea2a3271e4c42d272fe5c26532d93292c5277890dda520bf0cfc9b622d22ced5f7f306fd88e0ca2234b7dc44a4cd09c395e6b60ac8c528b8c8b19d6c5af04381567aff2ce0610580d752a645dab69d0ab852e566997cf5f266d27888aba21b41e896d249bd8d55e7086e48a5eb8884c89904cb7b6d5ff16a141a01dbfd403463075b756ae26cedd25a8247934bf1c3fe8a95cc583d0a03b15f72e44434f65a5a401dcd3e5779920d7901f39a5a482cf871e56a700ebda75e939caf5f872c1313608368feb8db00c7397068d46777d73807405576ff753a006d73f5222097a6013f757d63a049d10b33226f852fb839572e5adcd21ee294d73df8e15ddc26316318e3157af17826e89c3e371fd78de2326e502b850861e8de0e5325fe6cff6da965e2132916952cc2dd049443830bd72710794304625da015c50b134e897ff81938034377d373850a007d7412459bd6ac2de181bde7df45348514a32202bf807635bdf128de2849bde6faaa09bd766bf2362f7091a8bfc528a6f37735d9e9d6fa8b910a372ada3819cc0ef8ee5719b59c50ce57008c4fbf6b8c31e0775dd81103eb8af1075ad17942323c53bd4d2193e3e50456c80f1cca6f596ef210ca3162b84af3e4ddbfa133fc6dee4fd7331308c1c41b8f3", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(0x0, 0x0) 20:18:01 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:18:01 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x6c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x24, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_NETMASK={0x5, 0x14, 0x2}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @dev}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x6c}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x60, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_NETMASK={0x5, 0x14, 0x2}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x60}}, 0x0) r3 = dup2(r1, r2) ioctl$SNDRV_PCM_IOCTL_XRUN(r3, 0x4148, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x7, 0xc100) r4 = socket$packet(0x11, 0x3, 0x300) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000040)={r5, 0x3, 0x2, @local}, 0x10) [ 377.250979][T14837] 9pnet: Insufficient options for proto=fd 20:18:01 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c0000000206010000e0ff0000000000000000000e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c000180080001400000000005001400020000000c00028008000140ec14140005000500020000000500010006"], 0x6c}}, 0x0) 20:18:01 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x139}, 0x48) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x11, 0xa, 0x300) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) syz_genetlink_get_family_id$smc(&(0x7f00000003c0)='SMC_PNETID\x00') [ 377.348598][T14842] xt_ct_set_helper: 4 callbacks suppressed [ 377.348607][T14842] xt_CT: You must specify a L4 protocol and not use inversions on it 20:18:01 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x400000) 20:18:01 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:18:02 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x3c1, 0x3, 0x468, 0x2c8, 0x3c8, 0x1a2, 0x4600007a, 0x200, 0x398, 0x2e8, 0x2e8, 0x398, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote={0xfe, 0x69}, @mcast2, [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x260, 0x2c8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96ba01000000f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz1\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'batadv_slave_1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 377.484731][T14855] xt_CT: You must specify a L4 protocol and not use inversions on it 20:18:02 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c0000000206010000e0ff0000000000000000000e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c000180080001400000000005001400020000000c00028008000140ec14140005000500020000000500010006"], 0x6c}}, 0x0) 20:18:02 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002e0, 0xe, 0x80000, &(0x7f0000000280)="b95b03b700030005439e40f088a8", 0x0, 0x1a4, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 377.598280][T14861] xt_CT: You must specify a L4 protocol and not use inversions on it 20:18:02 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="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", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(0x0, 0x0) 20:18:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f00000000c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x801, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_HOOK={0x14, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x50557982}, @NFTA_HOOK_HOOKNUM={0x8}]}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x14, 0x16, 0xa, 0x201}], {0x14}}, 0x9c}}, 0x0) 20:18:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 20:18:02 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) 20:18:02 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x400000) 20:18:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 20:18:02 executing program 2: sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6c, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x23}}}}, &(0x7f0000000080)=0x84) socket(0x10, 0x2, 0x0) keyctl$chown(0x4, 0x0, 0xee00, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4004800}, 0x800) fchdir(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 20:18:02 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r4 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r4, 0x2008001) r5 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) read(r5, &(0x7f0000000180)=""/19, 0xfffffe47) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 20:18:02 executing program 1: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0xfffffffffffffffa, 0x2, &(0x7f0000000000)=[{&(0x7f0000000440)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}, {&(0x7f0000000880)="7e493c78124dac9d6f446e9cf5ef247c2cffb18fd3023247a7da1ca797f6ce82861faeedc8b2c6567fdb6fb9b215d428da9d75e3fba9c1f4ffd006b4b02a47f3e70ecd0c8f8ecad898ab4390ad0b540cd4be5e01d2fd71a8b4271ff634f9276550f5aa337e39bdcbeb0bafbd58e0a0a7adba1ae1f31f59e33165834362786f35973e68a0aada5361ac171fc3b85835b6a3f53e1bd4cfcc6e0fc0c438d6dcc113bc633741ee493816eb92be1621abf6555e39bc514f219d1017624edf04ee05823bda4c3149998f820bbabe86d9ef11bc9577d0a355638403b0cf246699b58a445e3a078542b1a2be262e5f5bd64c16fcfc2d8303040b297ea2a3271e4c42d272fe5c26532d93292c5277890dda520bf0cfc9b622d22ced5f7f306fd88e0ca2234b7dc44a4cd09c395e6b60ac8c528b8c8b19d6c5af04381567aff2ce0610580d752a645dab69d0ab852e566997cf5f266d27888aba21b41e896d249bd8d55e7086e48a5eb8884c89904cb7b6d5ff16a141a01dbfd403463075b756ae26cedd25a8247934bf1c3fe8a95cc583d0a03b15f72e44434f65a5a401dcd3e5779920d7901f39a5a482cf871e56a700ebda75e939caf5f872c1313608368feb8db00c7397068d46777d73807405576ff753a006d73f5222097a6013f757d63a049d10b33226f852fb839572e5adcd21ee294d73df8e15ddc26316318e3157af17826e89c3e371fd78de2326e502b850861e8de0e5325fe6cff6da965e2132916952cc2dd049443830bd72710794304625da015c50b134e897ff81938034377d373850a007d7412459bd6ac2de181bde7df45348514a32202bf807635bdf128de2849bde6faaa09bd766bf2362f7091a8bfc528a6f37735d9e9d6fa8b910a372ada3819cc0ef8ee5719b59c50ce57008c4fbf6b8c31e0775dd81103eb8af1075ad17942323c53bd4d2193e3e50456c80f1cca6f596ef210ca3162b84af3e4ddbfa133fc6dee4fd7331308c1c41b8f3", 0x2cb, 0xd6}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) creat(0x0, 0x0) 20:18:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f00000000c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x801, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_HOOK={0x14, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x50557982}, @NFTA_HOOK_HOOKNUM={0x8}]}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x14, 0x16, 0xa, 0x201}], {0x14}}, 0x9c}}, 0x0) 20:18:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 20:18:02 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x400000) 20:18:02 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x36}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 20:18:02 executing program 2: sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6c, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x23}}}}, &(0x7f0000000080)=0x84) socket(0x10, 0x2, 0x0) keyctl$chown(0x4, 0x0, 0xee00, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4004800}, 0x800) fchdir(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 20:18:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, 0x0}, 0x0) 20:18:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x400000) 20:18:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4001) 20:18:03 executing program 4: ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000000)={0x9, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000000000001000"}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x71, &(0x7f0000000300)={r2, @in={{0x2, 0x0, @empty}}}, &(0x7f00000001c0)=0x90) 20:18:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x400000) [ 378.756098][ T28] audit: type=1804 audit(1589833083.296:28): pid=14892 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir724841163/syzkaller.eAFMm4/174/bus" dev="sda1" ino=16247 res=1 [ 379.202929][ T28] audit: type=1804 audit(1589833083.736:29): pid=14926 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir724841163/syzkaller.eAFMm4/174/bus" dev="sda1" ino=16247 res=1 20:18:03 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r4 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r4, 0x2008001) r5 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) read(r5, &(0x7f0000000180)=""/19, 0xfffffe47) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 20:18:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, 0x0}, 0x0) 20:18:03 executing program 2: sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6c, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x23}}}}, &(0x7f0000000080)=0x84) socket(0x10, 0x2, 0x0) keyctl$chown(0x4, 0x0, 0xee00, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4004800}, 0x800) fchdir(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 20:18:03 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "083ff2", 0x39, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 20:18:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x400000) 20:18:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4001) 20:18:03 executing program 2: sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6c, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x23}}}}, &(0x7f0000000080)=0x84) socket(0x10, 0x2, 0x0) keyctl$chown(0x4, 0x0, 0xee00, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4004800}, 0x800) fchdir(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 20:18:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, 0x0}, 0x0) 20:18:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x20000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, 0x0, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) 20:18:04 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) 20:18:04 executing program 1: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2aa482e, &(0x7f0000000140)=ANY=[@ANYBLOB='d']) 20:18:04 executing program 2: sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6c, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x23}}}}, &(0x7f0000000080)=0x84) socket(0x10, 0x2, 0x0) keyctl$chown(0x4, 0x0, 0xee00, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x180040, 0x0) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4004800}, 0x800) fchdir(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) [ 379.733858][T14962] EXT4-fs (sda1): Unrecognized mount option "d" or missing value [ 379.871392][ T28] audit: type=1804 audit(1589833084.406:30): pid=14951 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir724841163/syzkaller.eAFMm4/175/bus" dev="sda1" ino=16278 res=1 [ 379.926716][T14974] EXT4-fs (sda1): Unrecognized mount option "d" or missing value 20:18:04 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) 20:18:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x6c}}, 0x0) 20:18:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x20000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 20:18:04 executing program 1: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2aa482e, &(0x7f0000000140)=ANY=[@ANYBLOB='d']) 20:18:04 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r4 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r4, 0x2008001) r5 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) read(r5, &(0x7f0000000180)=""/19, 0xfffffe47) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 20:18:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x20000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, 0x0, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) 20:18:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x6c}}, 0x0) [ 380.377065][T14987] EXT4-fs (sda1): Unrecognized mount option "d" or missing value 20:18:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) 20:18:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0}, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r2, 0x3, 0x2, @local}, 0x10) 20:18:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x6c}}, 0x0) 20:18:05 executing program 2: socket$inet6(0xa, 0x80002, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet6(0xa, 0x2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socket(0x2000000000000021, 0x2, 0x10000000000002) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7, 0x34}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 20:18:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[], 0x6c}}, 0x0) 20:18:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) 20:18:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x20000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, 0x0, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) 20:18:05 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'vlan1\x00'}) 20:18:05 executing program 2: ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) socket(0x10, 0x2, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, 0x0, 0x180040, 0x0) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4004800}, 0x800) fchdir(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) [ 381.385359][ T28] audit: type=1804 audit(1589833085.916:31): pid=14999 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir724841163/syzkaller.eAFMm4/176/bus" dev="sda1" ino=16266 res=1 20:18:06 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[], 0x6c}}, 0x0) 20:18:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) 20:18:06 executing program 1: clone(0x2000000000200500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320(\x00'}, 0x58) r1 = memfd_create(&(0x7f0000000180)='\xa5E\f\x87\xda\n\xd9F\xde\x8c$3\x92\xe6e\xe4\xec\xad\x1c.\b\x06\xa76\x82F\xff\xff\xff\x7f\x00\x00\x00\x00\x9af\xaeM\xc4', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x98000003, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='auxv\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/mcfilter\x00') 20:18:06 executing program 2: 20:18:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x20000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, 0x0, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) 20:18:06 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[], 0x6c}}, 0x0) 20:18:06 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_crypto(0x10, 0x3, 0x15) write$binfmt_script(r0, 0x0, 0x0) 20:18:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000001580)=[{&(0x7f00000016c0)="7507747dd9bcc24bc9201e9ab3851c2352e456a59990f36599f89b848cf73dba62e0ee4d214b4ea417ba047283d923aa85916b00b017843fb4dd334d8bf4ab10c73e81992e6fd44138b794415b5cc26106b7db3a6b8796ce064e031f8f35e3f749cb730bb38dcfb2cf9155bf417d427a6ea7c2284e317a87736058c4140d8fe5d6", 0x81}, {&(0x7f0000001780)="a45d4e26c6fadcbd663ccd6c0aca006b802c18d131b5427b3d4515dee8f10570a5923f3f543435278f94c3f8f0d4c35488ecfb1bd630b2e1e0e4247bb44938f03d603b27e44942ddcd3f11f086e6bf39ab074b690284b6d6aff6cc1e736b32f7d781c315bad312c6e8062089abe9838cd011d5227aa050589d2e5f34e10165336747bc2156f8e2570a4a76d4af1ef57edb31f57834ba2486c9f253a1737d59d15a11571414ec61c17dc20d9974e58cf2925c7c6e56216d4e35e39a9977e27e21450596008761c86e216667c6f72b64fdcad802718d16b390d4b4dc05bffb838b7e6831cc53b65b1de0bbf6af1311a722a80065913d37bea8c988e3b3f05ab1eb02d6b52a11191f1ced75b0200502e5f2881204104e152b5644da9d26301ed8905156a069c61444d44d82c135ff4f20574247a4a5cc963e3c395a029125ccae1f1564a3e28e06b1a08e47bd1a9621edf1003d167cbdfc0be2a4914908198575a688a38d24bdc9881ced9fe04e119a87b9286ea15aa168163a9650a26a926c571f2f0e0b2102de1fd1a6920cb71d846f02b2c23f80a3c0116b48d14925e69c4a65126e544995e0cb5fefaa870ddd66e8eb47a3be8f07fcd361dcf144c865fe355e3b98e6d4694d74aa6d3d75c7c568feabdcb483c5c22ca40782cd2dea789dc677c603227878c369a3b7a3204bf1bc9b1fdb1e00447152e854095b9527d6e980b1bac1b1ec6e9706084ac77b383bd4e555a11410f6a830966ec9b0fa58abf22238638ea06bad5baa2b55174b0db5108d79849c1028550fb3c713875478805f961b04f94a70dcde91c0d2ea2bcd0d2dd83b09cd6a0975db4257bf599f7d82462f914e4e641aa399ba721e72fd53d21a", 0x26e}, {&(0x7f0000000300)="0ebbb218be8d3954e135df5f396071992eaf48c6be4575b2cd72c05da2dcf622ab81bfb5e04f14d17c07fe83b1e0455bfd319b6812e89ad48e9467125948fbe0fd43d11c277ad671710da0a26430c907ece2", 0x52}], 0x3) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xfff, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x6a08, 0x11, 0x0, 0x27) 20:18:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) 20:18:06 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0x6c}}, 0x0) 20:18:06 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0x6c}}, 0x0) 20:18:06 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0x6c}}, 0x0) 20:18:06 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r4 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r4, 0x2008001) r5 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) read(r5, &(0x7f0000000180)=""/19, 0xfffffe47) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 20:18:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x58, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_NETMASK={0x5, 0x14, 0x2}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @dev}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x58}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) dup2(r1, 0xffffffffffffffff) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket(0x100000000011, 0x0, 0x0) getsockname$packet(r3, 0x0, &(0x7f00000001c0)) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x3, 0x2, @local}, 0x10) 20:18:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) 20:18:06 executing program 4: perf_event_open(&(0x7f0000348f88)={0x0, 0xc0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:18:06 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c0000000206010000e0ff0000000000000000000e0003006269746d61703a697000000005000400000000000900020073797a3000"], 0x6c}}, 0x0) 20:18:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) 20:18:06 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000340)='./bus\x00', &(0x7f0000000380)='9p\x00', 0x1000002, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 382.364882][T15084] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.3'. [ 382.764402][ T28] audit: type=1804 audit(1589833087.296:32): pid=15074 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir724841163/syzkaller.eAFMm4/177/bus" dev="sda1" ino=16282 res=1 20:18:07 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='hybla\x00', 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @broadcast}, 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0xac14140d}, 0x10) recvfrom(r0, &(0x7f0000000100)=""/94, 0xffffffffffffff5e, 0x10134, 0x0, 0x0) 20:18:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c0000000206010000e0ff0000000000000000000e0003006269746d61703a697000000005000400000000000900020073797a3000"], 0x6c}}, 0x0) 20:18:07 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x20000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) socket$kcm(0x2, 0x200000000000001, 0x0) 20:18:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/nf_conntrack\x00') preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000640)=""/4093, 0xffd}], 0x1, 0x2) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, 0x0) 20:18:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) [ 382.953382][T15108] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.3'. 20:18:07 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r4 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r4, 0x2008001) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 20:18:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) 20:18:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c0000000206010000e0ff0000000000000000000e0003006269746d61703a697000000005000400000000000900020073797a3000"], 0x6c}}, 0x0) 20:18:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/nf_conntrack\x00') preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000640)=""/4093, 0xffd}], 0x1, 0x2) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, 0x0) 20:18:07 executing program 1: ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6c, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x23}}}}, &(0x7f0000000080)=0x84) socket(0x0, 0x2, 0x0) keyctl$chown(0x4, 0x0, 0xee00, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x180040, 0x0) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4004800}, 0x800) fchdir(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 20:18:07 executing program 2: ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000000)={0x9, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000000000001000"}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000300)={r2, @in={{0x2, 0x0, @empty}}}, &(0x7f00000001c0)=0x90) [ 383.237800][T15121] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.3'. 20:18:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) 20:18:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c0000000206010000e0ff0000000000000000000e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c000180080001400000000005001400020000"], 0x6c}}, 0x0) [ 383.319451][T15122] IPVS: ftp: loaded support on port[0] = 21 20:18:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000000e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c000180080001400000000005001400020000000c00028008000140ec14140005000500020000000500010006"], 0x6c}}, 0x0) 20:18:08 executing program 1: ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6c, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x23}}}}, &(0x7f0000000080)=0x84) socket(0x0, 0x2, 0x0) keyctl$chown(0x4, 0x0, 0xee00, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x180040, 0x0) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4004800}, 0x800) fchdir(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) [ 383.476260][T15156] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 20:18:08 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) 20:18:08 executing program 4: ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6c, &(0x7f000059aff8), 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x23}}}}, &(0x7f0000000080)=0x84) socket(0x0, 0x2, 0x0) keyctl$chown(0x4, 0x0, 0xee00, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x180040, 0x0) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4004800}, 0x800) fchdir(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) [ 383.671041][T15167] IPVS: ftp: loaded support on port[0] = 21 [ 383.734514][T15171] IPVS: ftp: loaded support on port[0] = 21 [ 384.044270][ T28] audit: type=1804 audit(1589833088.576:33): pid=15150 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir724841163/syzkaller.eAFMm4/178/bus" dev="sda1" ino=16280 res=1 20:18:08 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r4 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r4, 0x2008001) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 20:18:08 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) 20:18:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c0000000206010000e0ff0000000000000000000e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c000180080001400000000005001400020000"], 0x6c}}, 0x0) 20:18:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c000000020601000000000000000000000000000e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c000180080001400000000005001400020000000c00028008000140ec14140005000500020000000500010006"], 0x6c}}, 0x0) 20:18:08 executing program 1: 20:18:08 executing program 4: [ 384.115218][ T8853] tipc: TX() has been purged, node left! 20:18:08 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@abs={0x1}, 0x8) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) [ 384.214681][T15240] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 20:18:08 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="0400000900000000666174000404090a0200027400f8017d", 0x18}], 0x0, 0x0) 20:18:08 executing program 2: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x132a2100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:18:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c0000000206010000e0ff0000000000000000000e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c000180080001400000000005001400020000"], 0x6c}}, 0x0) 20:18:08 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) 20:18:08 executing program 1: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000340)='./bus\x00', &(0x7f0000000380)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 384.419461][T15249] FAT-fs (loop4): count of clusters too big (16384510) [ 384.485771][T15249] FAT-fs (loop4): Can't find a valid FAT filesystem [ 384.521705][T15263] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 384.594642][T15249] FAT-fs (loop4): count of clusters too big (16384510) [ 384.611653][T15249] FAT-fs (loop4): Can't find a valid FAT filesystem 20:18:09 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) creat(&(0x7f0000000100)='./bus\x00', 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 20:18:09 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) 20:18:09 executing program 2: 20:18:09 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c0000000206010000e0ff0000000000000000000e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c000180080001400000000005001400020000000c00028008000140ec141400"], 0x6c}}, 0x0) 20:18:09 executing program 1: 20:18:09 executing program 4: [ 384.955449][T15282] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 20:18:09 executing program 1: 20:18:09 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c0000000206010000e0ff0000000000000000000e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c000180080001400000000005001400020000000c00028008000140ec141400"], 0x6c}}, 0x0) 20:18:09 executing program 2: 20:18:09 executing program 4: 20:18:09 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) [ 385.164924][T15289] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 20:18:09 executing program 2: 20:18:10 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 20:18:10 executing program 1: 20:18:10 executing program 4: 20:18:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c0000000206010000e0ff0000000000000000000e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c000180080001400000000005001400020000000c00028008000140ec141400"], 0x6c}}, 0x0) 20:18:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) 20:18:10 executing program 2: 20:18:10 executing program 1: 20:18:10 executing program 2: 20:18:10 executing program 4: 20:18:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c0000000206010000e0ff0000000000000000000e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c000180080001400000000005001400020000000c00028008000140ec14140005000500020000"], 0x6c}}, 0x0) 20:18:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) 20:18:10 executing program 2: [ 385.919939][T15313] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 20:18:10 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 20:18:10 executing program 1: 20:18:10 executing program 4: 20:18:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c0000000206010000e0ff0000000000000000000e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c000180080001400000000005001400020000000c00028008000140ec14140005000500020000"], 0x6c}}, 0x0) 20:18:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) 20:18:10 executing program 2: 20:18:10 executing program 4: [ 386.380907][T15332] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 386.405062][ T8853] tipc: TX() has been purged, node left! 20:18:11 executing program 1: 20:18:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c0000000206010000e0ff0000000000000000000e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c000180080001400000000005001400020000000c00028008000140ec14140005000500020000"], 0x6c}}, 0x0) 20:18:11 executing program 2: 20:18:11 executing program 4: 20:18:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) 20:18:11 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 20:18:11 executing program 4: 20:18:11 executing program 2: 20:18:11 executing program 1: 20:18:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c0000000206010000e0ff0000000000000000000e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c000180080001400000000005001400020000000c00028008000140ec14140005000500020000000500"], 0x6c}}, 0x0) 20:18:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) 20:18:11 executing program 1: 20:18:11 executing program 2: 20:18:11 executing program 4: 20:18:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c0000000206010000e0ff0000000000000000000e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c000180080001400000000005001400020000000c00028008000140ec14140005000500020000000500"], 0x6c}}, 0x0) 20:18:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400000) 20:18:11 executing program 2: 20:18:12 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 20:18:12 executing program 1: 20:18:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c0000000206010000e0ff0000000000000000000e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c000180080001400000000005001400020000000c00028008000140ec14140005000500020000000500"], 0x6c}}, 0x0) 20:18:12 executing program 4: 20:18:12 executing program 2: 20:18:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400000) 20:18:12 executing program 2: 20:18:12 executing program 4: 20:18:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c0000000206010000e0ff0000000000000000000e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c000180080001400000000005001400020000000c00028008000140ec141400050005000200000005000100"], 0x6c}}, 0x0) 20:18:12 executing program 1: 20:18:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400000) 20:18:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c0000000206010000e0ff0000000000000000000e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c000180080001400000000005001400020000000c00028008000140ec141400050005000200000005000100"], 0x6c}}, 0x0) 20:18:12 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 20:18:12 executing program 2: 20:18:12 executing program 4: 20:18:12 executing program 1: 20:18:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, 0x0, 0x0) 20:18:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c0000000206010000e0ff0000000000000000000e0003006269746d61703a697000000005000400000000000900020073797a3000000000240007800c000180080001400000000005001400020000000c00028008000140ec141400050005000200000005000100"], 0x6c}}, 0x0) 20:18:12 executing program 2: 20:18:13 executing program 1: 20:18:13 executing program 4: 20:18:13 executing program 3: 20:18:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, 0x0, 0x0) 20:18:13 executing program 2: 20:18:13 executing program 1: 20:18:13 executing program 4: 20:18:13 executing program 3: 20:18:13 executing program 2: 20:18:13 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 20:18:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, 0x0, 0x0) 20:18:13 executing program 4: 20:18:13 executing program 2: 20:18:13 executing program 3: 20:18:13 executing program 1: 20:18:13 executing program 5: 20:18:13 executing program 3: 20:18:13 executing program 2: 20:18:13 executing program 4: 20:18:13 executing program 1: 20:18:13 executing program 5: 20:18:14 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 20:18:14 executing program 2: 20:18:14 executing program 3: 20:18:14 executing program 1: 20:18:14 executing program 4: 20:18:14 executing program 5: 20:18:14 executing program 1: 20:18:14 executing program 5: 20:18:14 executing program 2: 20:18:14 executing program 4: 20:18:14 executing program 3: 20:18:14 executing program 5: 20:18:14 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 20:18:14 executing program 4: 20:18:14 executing program 1: 20:18:14 executing program 3: 20:18:14 executing program 2: 20:18:14 executing program 5: 20:18:14 executing program 1: 20:18:14 executing program 3: 20:18:14 executing program 2: 20:18:15 executing program 5: 20:18:15 executing program 4: 20:18:15 executing program 2: 20:18:15 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 20:18:15 executing program 3: 20:18:15 executing program 5: 20:18:15 executing program 1: 20:18:15 executing program 4: 20:18:15 executing program 2: 20:18:15 executing program 3: 20:18:15 executing program 5: 20:18:15 executing program 2: 20:18:15 executing program 1: 20:18:15 executing program 4: 20:18:15 executing program 3: 20:18:16 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 20:18:16 executing program 2: 20:18:16 executing program 1: 20:18:16 executing program 3: 20:18:16 executing program 4: 20:18:16 executing program 5: 20:18:16 executing program 4: 20:18:16 executing program 5: 20:18:16 executing program 3: 20:18:16 executing program 2: 20:18:16 executing program 1: 20:18:16 executing program 4: 20:18:16 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 20:18:16 executing program 3: 20:18:16 executing program 2: 20:18:16 executing program 5: 20:18:16 executing program 4: 20:18:16 executing program 1: 20:18:16 executing program 3: 20:18:16 executing program 4: 20:18:16 executing program 2: 20:18:16 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0xa4}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x61], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) 20:18:16 executing program 1: 20:18:16 executing program 3: 20:18:17 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 20:18:17 executing program 4: 20:18:17 executing program 2: 20:18:17 executing program 1: 20:18:17 executing program 5: 20:18:17 executing program 3: 20:18:17 executing program 5: 20:18:17 executing program 1: 20:18:17 executing program 4: 20:18:17 executing program 3: 20:18:17 executing program 2: 20:18:17 executing program 3: 20:18:17 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 20:18:17 executing program 5: 20:18:17 executing program 2: 20:18:17 executing program 4: 20:18:17 executing program 1: 20:18:17 executing program 3: 20:18:17 executing program 2: 20:18:17 executing program 4: 20:18:18 executing program 1: 20:18:18 executing program 3: 20:18:18 executing program 5: 20:18:18 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x80000000008a01, 0x0) write$binfmt_aout(r2, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) r3 = syz_open_pts(r2, 0x0) ioctl$TCSETSW(r3, 0x5403, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfff7, 0x0, "00000000000000ff07000000e9ff00"}) 20:18:18 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 20:18:18 executing program 4: dup(0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x80000000008a01, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, '\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000ff07000000e9ff00"}) 20:18:18 executing program 2: preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0xf2, 0x0) 20:18:18 executing program 3: preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev\x00') r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0xf2, 0x0) 20:18:18 executing program 5: 20:18:18 executing program 1: 20:18:18 executing program 1: unshare(0x6000400) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) 20:18:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0xee00) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x7, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32, @ANYBLOB="000000000000000018000000", @ANYRES32, @ANYRES32=0x0], &(0x7f0000000080)='GPL\x00', 0x0, 0x2f, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x3f, 0x10, 0x0}, 0x25) 20:18:18 executing program 2: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r0, r1, 0x0, 0x7fffffff) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x149042, 0x0) sendfile(r2, r0, 0x0, 0xffffff38) 20:18:18 executing program 3: r0 = open(&(0x7f0000000180)='./bus\x00', 0x1fb842, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/tty/drivers\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) 20:18:18 executing program 4: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x40000000ffc00040, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="04000000eca40000666174000404090a0200027400f801", 0x17}], 0x12, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) lseek(r2, 0x800002, 0x0) write$binfmt_aout(r2, &(0x7f0000000180)=ANY=[], 0x8a) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r4, 0x0, 0x7fffffa7) 20:18:18 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000880)=@acquire={0x16c, 0x17, 0x1, 0x0, 0x0, {{@in6=@remote}, @in=@dev, {@in6=@local, @in=@remote}, {{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@tmpl={0x44, 0x5, [{{@in=@dev}, 0x0, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x5}]}]}, 0x16c}}, 0x0) [ 394.291241][ T28] audit: type=1800 audit(1589833098.826:34): pid=15604 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16377 res=0 [ 394.405591][ T28] audit: type=1804 audit(1589833098.856:35): pid=15604 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir208266041/syzkaller.IOzGsP/248/file0" dev="sda1" ino=16377 res=1 [ 394.604531][ T28] audit: type=1800 audit(1589833098.886:36): pid=15608 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=164 res=0 [ 394.724685][ T28] audit: type=1804 audit(1589833098.936:37): pid=15612 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir208266041/syzkaller.IOzGsP/248/file0" dev="sda1" ino=16377 res=1 [ 394.747971][ T28] audit: type=1804 audit(1589833098.986:38): pid=15615 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir474628279/syzkaller.7YSLam/208/file0/file0" dev="loop4" ino=164 res=1 20:18:19 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 20:18:19 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_int(r1, &(0x7f0000000200), 0x2000) 20:18:19 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000880)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in6=@remote}, @in=@dev, {@in6=@local, @in=@remote}, {{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x84, 0x5, [{{@in=@dev, 0x0, 0x6c}, 0x0, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, {{@in6=@remote, 0x0, 0x33}}]}]}, 0x1ac}}, 0x0) 20:18:19 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) link(&(0x7f0000000200)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') truncate(&(0x7f0000000040)='./bus/file0\x00', 0x0) 20:18:19 executing program 4: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x40000000ffc00040, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="04000000eca40000666174000404090a0200027400f801", 0x17}], 0x12, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) lseek(r2, 0x800002, 0x0) write$binfmt_aout(r2, &(0x7f0000000180)=ANY=[], 0x8a) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r4, 0x0, 0x7fffffa7) 20:18:19 executing program 2: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r0, r1, 0x0, 0x7fffffff) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x149042, 0x0) sendfile(r2, r0, 0x0, 0xffffff38) [ 395.086888][ T28] audit: type=1804 audit(1589833099.627:39): pid=15636 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir208266041/syzkaller.IOzGsP/248/file0" dev="sda1" ino=16377 res=1 20:18:19 executing program 3: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x40000000ffc00040, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="04000000eca40000666174000404090a0200027400f801", 0x17}], 0x12, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) lseek(r2, 0x800002, 0x0) write$binfmt_aout(r2, &(0x7f0000000180)=ANY=[], 0x8a) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5069c8ecba1aa0a4e2a631b5180e1fbde798a5f2dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564aca1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022828ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r4, 0x0, 0x7fffffa7) [ 395.263251][ T28] audit: type=1804 audit(1589833099.637:40): pid=15638 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir208266041/syzkaller.IOzGsP/248/file0" dev="sda1" ino=16377 res=1 20:18:19 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="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", 0x112}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 395.349849][T15648] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 395.471208][ T28] audit: type=1800 audit(1589833099.697:41): pid=15632 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=166 res=0 20:18:20 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) r1 = inotify_init() r2 = socket$packet(0x11, 0x2, 0x300) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xda00) [ 395.609315][ T28] audit: type=1800 audit(1589833099.717:42): pid=15646 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16364 res=0 20:18:20 executing program 5: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) pipe(0x0) ioctl$HIDIOCGDEVINFO(0xffffffffffffffff, 0x801c4803, &(0x7f0000000140)=""/154) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x7fffffff) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000200)) r2 = open(&(0x7f0000000040)='./file0\x00', 0x149042, 0x0) sendfile(r2, r0, 0x0, 0xffffff38) [ 395.838162][ T28] audit: type=1804 audit(1589833099.737:43): pid=15646 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir208266041/syzkaller.IOzGsP/249/file0" dev="sda1" ino=16364 res=1 20:18:20 executing program 4: syz_usb_connect(0x0, 0x5a, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0xb9, 0x10, 0xc2, 0x20, 0x2304, 0x22e, 0x8bdb, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x6, 0x9, 0xfc, 0xe, 0x0, [], [{{0x9, 0x5, 0x0, 0x2, 0x200}}, {{0x9, 0x5, 0x0, 0x3, 0x40}}, {{0x9, 0x5, 0x0, 0x3, 0x10}}, {{0x9, 0x5, 0x0, 0x3, 0x8}}, {{0x9, 0x5, 0x0, 0x3, 0x3ff}}, {{0x9, 0x5, 0x0, 0x0, 0x8}}]}}]}}]}}, 0x0) 20:18:20 executing program 2: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r0, r1, 0x0, 0x7fffffff) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x149042, 0x0) sendfile(r2, r0, 0x0, 0xffffff38) 20:18:20 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 20:18:20 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) r1 = inotify_init() r2 = socket$packet(0x11, 0x2, 0x300) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xda00) 20:18:21 executing program 3: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$read(0xb, r1, 0x0, 0x0) 20:18:21 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x2, &(0x7f0000000280)=[{0x2}, {0x6}]}) [ 396.645010][ T9897] usb 5-1: new high-speed USB device number 2 using dummy_hcd 20:18:21 executing program 3: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) io_setup(0xd, &(0x7f0000000100)=0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_submit(r1, 0x200002f1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) [ 396.735282][ T9897] usb 5-1: Using ep0 maxpacket: 32 20:18:21 executing program 5: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000280)={0x4001}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, 0x16, 0xa01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) [ 396.855347][ T9897] usb 5-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 396.882909][ T9897] usb 5-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping 20:18:21 executing program 5: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x98428d57a99b5f44) io_setup(0xd, &(0x7f0000000100)=0x0) r2 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0xc00c) write$binfmt_elf64(r2, 0x0, 0xfd14) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_submit(r1, 0x200002f1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) [ 396.952777][ T9897] usb 5-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 396.973445][ T9897] usb 5-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 397.014596][ T9897] usb 5-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 397.058687][ T9897] usb 5-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping 20:18:21 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_int(r1, &(0x7f0000000200), 0x3fe00) [ 397.255429][ T9897] usb 5-1: New USB device found, idVendor=2304, idProduct=022e, bcdDevice=8b.db [ 397.284560][ T9897] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 397.293041][ T9897] usb 5-1: Product: syz 20:18:21 executing program 2: unshare(0x6000400) r0 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x80086601, &(0x7f0000000040)) 20:18:21 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) [ 397.344546][ T9897] usb 5-1: Manufacturer: syz [ 397.349196][ T9897] usb 5-1: SerialNumber: syz [ 397.401844][ T9897] usb 5-1: config 0 descriptor?? [ 397.457094][ T9897] hub 5-1:0.0: bad descriptor, ignoring hub [ 397.463038][ T9897] hub: probe of 5-1:0.0 failed with error -5 [ 397.684506][ T9897] dvb-usb: found a 'Pinnacle Expresscard 320cx' in cold state, will try to load a firmware [ 397.725022][ T9897] usb 5-1: Direct firmware load for dvb-usb-dib0700-1.20.fw failed with error -2 [ 397.734177][ T9897] dvb-usb: did not find the firmware file 'dvb-usb-dib0700-1.20.fw' (status -2). You can use /scripts/get_dvb_firmware to get the firmware [ 397.805408][ T9897] usb 5-1: USB disconnect, device number 2 [ 398.464535][ T17] usb 5-1: new high-speed USB device number 3 using dummy_hcd [ 398.566032][ T17] usb 5-1: Using ep0 maxpacket: 32 [ 398.684502][ T17] usb 5-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 398.695973][ T17] usb 5-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 398.708756][ T17] usb 5-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 398.719923][ T17] usb 5-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 398.732022][ T17] usb 5-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 398.743378][ T17] usb 5-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 398.947829][ T17] usb 5-1: New USB device found, idVendor=2304, idProduct=022e, bcdDevice=8b.db [ 398.957097][ T17] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 398.968452][ T17] usb 5-1: Product: syz [ 398.972687][ T17] usb 5-1: Manufacturer: syz [ 398.978276][ T17] usb 5-1: SerialNumber: syz [ 398.984145][ T17] usb 5-1: config 0 descriptor?? [ 399.035065][ T17] hub 5-1:0.0: bad descriptor, ignoring hub [ 399.041100][ T17] hub: probe of 5-1:0.0 failed with error -5 [ 399.274468][ T17] dvb-usb: found a 'Pinnacle Expresscard 320cx' in cold state, will try to load a firmware [ 399.308981][ T17] usb 5-1: Direct firmware load for dvb-usb-dib0700-1.20.fw failed with error -2 20:18:23 executing program 4: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/mnt\x00') setns(r0, 0x4000000) 20:18:23 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) connect$inet(r1, &(0x7f0000001100)={0x2, 0x0, @local}, 0x10) sendfile(r1, r0, 0x0, 0xedc0) 20:18:23 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x14, 0x0) 20:18:23 executing program 1: r0 = inotify_init() r1 = socket$packet(0x11, 0x2, 0x300) r2 = dup2(r1, r0) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f00000001c0)={'ip6tnl0\x00'}) 20:18:23 executing program 3: unshare(0x6000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f00000000c0)={r0, 0x0, 0x0}, 0x20) 20:18:23 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) [ 399.350752][ T17] dvb-usb: did not find the firmware file 'dvb-usb-dib0700-1.20.fw' (status -2). You can use /scripts/get_dvb_firmware to get the firmware [ 399.515374][ T17] usb 5-1: USB disconnect, device number 3 20:18:24 executing program 2: r0 = inotify_init() r1 = socket$packet(0x11, 0x2, 0x300) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x11, 0x2, 0xfffffffc) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1}, 0x4) 20:18:24 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/softnet_stat\x00') sendfile(r0, r1, &(0x7f0000000240)=0x202, 0x4000000000dc) 20:18:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') 20:18:24 executing program 4: clock_adjtime(0x0, &(0x7f00000002c0)={0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b00000000}) 20:18:24 executing program 3: unshare(0x6000400) r0 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x2000) 20:18:24 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x40000000ffc00040, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="04000000eca40000666174000404090a0200027400f801", 0x17}], 0x12, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) lseek(r2, 0x800002, 0x0) write$binfmt_aout(r2, &(0x7f0000000180)=ANY=[], 0x8a) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r5, 0x0, 0x7fffffa7) 20:18:24 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000880)=@acquire={0x1ac, 0x17, 0x1, 0x0, 0x0, {{@in6=@remote}, @in=@dev, {@in6=@local, @in=@remote}, {{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@tmpl={0x84, 0x5, [{{@in=@dev, 0x0, 0x2b}, 0x0, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, {{@in6=@remote}}]}]}, 0x1ac}}, 0x0) 20:18:24 executing program 3: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x40000000ffc00040, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="04000000eca40000666174000404090a0200027400f801", 0x17}], 0x12, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r1, 0x800002, 0x0) write$binfmt_aout(r1, &(0x7f0000000180)=ANY=[], 0x8a) 20:18:24 executing program 5: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[], 0x4}, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x37cb1133) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@dev, 0x77}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 400.017930][ T28] kauditd_printk_skb: 14 callbacks suppressed [ 400.017946][ T28] audit: type=1800 audit(1589833104.557:58): pid=15805 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=168 res=0 20:18:24 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f480800b100000000050000be5d2dd15b6210d53eed19bca008388e736e518b98d91c22def1125d7b1e821039a95ad8b91ceaf3e0b5556a98593de38ea2c15a71c1669a99da1166bc3b315fc2a5a6433fc1122b", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 400.216961][T15814] ptrace attach of "/root/syz-executor.5"[15813] was attempted by "/root/syz-executor.5"[15814] 20:18:24 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000880)=@acquire={0x16c, 0x17, 0x1, 0x0, 0x0, {{@in6=@remote}, @in=@dev, {@in6=@local, @in=@remote}, {{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x44, 0x5, [{{@in=@dev, 0x0, 0x2b}, 0x0, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}, 0x16c}}, 0x0) [ 400.436389][ T28] audit: type=1804 audit(1589833104.677:59): pid=15809 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir026833168/syzkaller.vAYFnr/208/file0/file0" dev="loop1" ino=168 res=1 [ 400.655292][T15823] ptrace attach of "/root/syz-executor.5"[15822] was attempted by "/root/syz-executor.5"[15823] 20:18:25 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x79) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_elf32(r0, 0x0, 0xa38) 20:18:25 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_int(r1, &(0x7f0000000200), 0x3fe00) 20:18:25 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)='+', 0x1}], 0x1) 20:18:25 executing program 3: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x40000000ffc00040, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="04000000eca40000666174000404090a0200027400f801", 0x17}], 0x12, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r1, 0x800002, 0x0) write$binfmt_aout(r1, &(0x7f0000000180)=ANY=[], 0x8a) 20:18:25 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 20:18:25 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x40000000ffc00040, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="04000000eca40000666174000404090a0200027400f801", 0x17}], 0x12, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) lseek(r2, 0x800002, 0x0) write$binfmt_aout(r2, &(0x7f0000000180)=ANY=[], 0x8a) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r5, 0x0, 0x7fffffa7) 20:18:25 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x40000000ffc00040, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="04000000eca40000666174000404090a0200027400f801", 0x17}], 0x12, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) lseek(r2, 0x800002, 0x0) write$binfmt_aout(r2, &(0x7f0000000180)=ANY=[], 0x8a) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r5, 0x0, 0x7fffffa7) [ 401.278850][ T28] audit: type=1800 audit(1589833105.817:60): pid=15849 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=172 res=0 20:18:25 executing program 4: unshare(0x6000400) r0 = creat(&(0x7f0000000380)='./bus\x00', 0x0) tee(r0, 0xffffffffffffffff, 0x1, 0x0) 20:18:26 executing program 2: clock_adjtime(0x0, &(0x7f00000002c0)={0x7fffffff, 0x0, 0x100000000000000}) [ 401.481295][ T28] audit: type=1800 audit(1589833105.917:61): pid=15854 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=173 res=0 [ 401.726012][ T28] audit: type=1804 audit(1589833106.047:62): pid=15859 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir119821825/syzkaller.VxDxQ3/223/file0/file0" dev="loop5" ino=173 res=1 [ 401.751971][ T28] audit: type=1804 audit(1589833106.127:63): pid=15862 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir026833168/syzkaller.vAYFnr/209/file0/file0" dev="loop1" ino=172 res=1 20:18:26 executing program 4: unshare(0x6000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) 20:18:26 executing program 2: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x3, &(0x7f0000000040)=0x8001) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x12d142, 0x0) sendfile(r2, r0, 0x0, 0xffffff38) 20:18:26 executing program 3: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x6) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x7fffffff) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x149042, 0x0) sendfile(r2, r0, 0x0, 0xffffff38) 20:18:26 executing program 1: r0 = inotify_init() r1 = socket$packet(0x11, 0x2, 0x300) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000017c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001840)={&(0x7f0000000240)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="070500000000000000000100000000000000014100000018001700002000000000006574683a73"], 0x34}}, 0x0) 20:18:26 executing program 5: mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) rmdir(&(0x7f0000000100)='./file0\x00') [ 402.206214][ T28] audit: type=1800 audit(1589833106.747:64): pid=15872 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16381 res=0 20:18:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x28, r1, 0x1707, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x28}}, 0x0) [ 402.396886][ T28] audit: type=1804 audit(1589833106.747:65): pid=15872 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir200292630/syzkaller.s76C36/239/file0" dev="sda1" ino=16381 res=1 [ 402.564161][ T28] audit: type=1800 audit(1589833106.757:66): pid=15873 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16383 res=0 [ 402.591033][T15883] tipc: Enabling of bearer rejected, failed to enable media 20:18:27 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) [ 402.660217][T15888] tipc: Enabling of bearer rejected, failed to enable media [ 402.681989][ T28] audit: type=1804 audit(1589833106.757:67): pid=15873 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir208266041/syzkaller.IOzGsP/258/file0" dev="sda1" ino=16383 res=1 20:18:27 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 20:18:27 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000780)='\x8e', 0x0) write(r1, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='./control\x00', 0xa4000960) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000000040)='./control\x00', 0xa4000960) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 20:18:27 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000880)=@acquire={0x16c, 0x17, 0x1, 0x0, 0x0, {{@in6=@remote}, @in=@dev, {@in6=@local, @in=@remote}, {{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@tmpl={0x44, 0x5, [{{@in=@dev, 0x0, 0x3c}, 0x0, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}, 0x16c}}, 0x0) 20:18:27 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='timerslack_ns\x00') write$P9_RXATTRWALK(r0, 0x0, 0x0) 20:18:27 executing program 2: r0 = gettid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x15, 0x0) ptrace(0xffffffffffffffff, r1) ptrace$cont(0xffffffffffffffff, r1, 0x7, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r0, r2, 0x0, 0xc, &(0x7f0000000100)='keyringeth1\x00'}, 0x30) 20:18:27 executing program 4: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x37cb1133) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) 20:18:27 executing program 3: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x98428d57a99b5f44) io_setup(0xd, &(0x7f0000000100)=0x0) r2 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_submit(r1, 0x200002f1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 20:18:27 executing program 5: unshare(0x6000400) finit_module(0xffffffffffffffff, 0x0, 0x0) 20:18:27 executing program 4: unshare(0x6000400) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) [ 403.289929][T15913] ptrace attach of "/root/syz-executor.4"[15911] was attempted by "/root/syz-executor.4"[15913] 20:18:27 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = getpid() sched_setaffinity(r2, 0x8, &(0x7f0000000000)=0x91) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x149042, 0x0) sendfile(r3, r0, 0x0, 0xffffff38) 20:18:28 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff}) fsconfig$FSCONFIG_SET_FD(r0, 0x5, 0x0, 0x0, 0xffffffffffffffff) 20:18:28 executing program 2: unshare(0x6000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x16, &(0x7f00000000c0)={r0, 0x0, 0x0}, 0x20) [ 403.840506][T15926] ================================================================== [ 403.849079][T15926] BUG: KCSAN: data-race in __add_to_page_cache_locked / filemap_write_and_wait_range [ 403.860950][T15926] [ 403.863374][T15926] write to 0xffff88811ec60740 of 8 bytes by task 15924 on cpu 1: [ 403.871594][T15926] __add_to_page_cache_locked+0x28a/0x800 [ 403.877523][T15926] add_to_page_cache_lru+0xc7/0x260 [ 403.882876][T15926] ext4_mpage_readpages+0x31c/0x14d0 [ 403.888214][T15926] ext4_readpages+0x8e/0xb0 [ 403.892735][T15926] read_pages+0xa2/0x360 [ 403.897218][T15926] __do_page_cache_readahead+0x358/0x380 [ 403.903035][T15926] ondemand_readahead+0x369/0x730 [ 403.908110][T15926] page_cache_sync_readahead+0x1b0/0x1e0 [ 403.913887][T15926] generic_file_read_iter+0xf24/0x18c0 [ 403.920008][T15926] ext4_file_read_iter+0x103/0x360 [ 403.925123][T15926] generic_file_splice_read+0x2df/0x470 [ 403.930670][T15926] do_splice_to+0xc7/0x100 [ 403.935093][T15926] splice_direct_to_actor+0x1b9/0x540 [ 403.940657][T15926] do_splice_direct+0x152/0x1d0 [ 403.945607][T15926] do_sendfile+0x380/0x800 [ 403.950211][T15926] __x64_sys_sendfile64+0x121/0x140 [ 403.955454][T15926] do_syscall_64+0xc7/0x3b0 [ 403.960408][T15926] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 403.966583][T15926] [ 403.968916][T15926] read to 0xffff88811ec60740 of 8 bytes by task 15926 on cpu 0: [ 403.976717][T15926] filemap_write_and_wait_range+0x6c/0x140 [ 403.982702][T15926] iomap_dio_rw+0x3a2/0x9a0 [ 403.987205][T15926] ext4_file_read_iter+0x2b4/0x360 [ 403.992408][T15926] generic_file_splice_read+0x2df/0x470 [ 403.998014][T15926] do_splice_to+0xc7/0x100 [ 404.002614][T15926] splice_direct_to_actor+0x1b9/0x540 [ 404.008134][T15926] do_splice_direct+0x152/0x1d0 [ 404.013679][T15926] do_sendfile+0x380/0x800 [ 404.018496][T15926] __x64_sys_sendfile64+0x121/0x140 [ 404.024423][T15926] do_syscall_64+0xc7/0x3b0 [ 404.028933][T15926] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 404.034894][T15926] [ 404.037281][T15926] Reported by Kernel Concurrency Sanitizer on: [ 404.043708][T15926] CPU: 0 PID: 15926 Comm: syz-executor.1 Not tainted 5.7.0-rc1-syzkaller #0 [ 404.052555][T15926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 404.062986][T15926] ================================================================== [ 404.072020][T15926] Kernel panic - not syncing: panic_on_warn set ... [ 404.079181][T15926] CPU: 0 PID: 15926 Comm: syz-executor.1 Not tainted 5.7.0-rc1-syzkaller #0 [ 404.087970][T15926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 404.098328][T15926] Call Trace: [ 404.101632][T15926] dump_stack+0x11d/0x187 [ 404.105973][T15926] panic+0x210/0x640 [ 404.110293][T15926] ? vprintk_func+0x89/0x13a [ 404.115100][T15926] kcsan_report.cold+0xc/0x1a [ 404.120366][T15926] kcsan_setup_watchpoint+0x3fb/0x440 [ 404.125864][T15926] filemap_write_and_wait_range+0x6c/0x140 [ 404.131891][T15926] iomap_dio_rw+0x3a2/0x9a0 [ 404.136427][T15926] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 404.142332][T15926] ? ext4_file_read_iter+0x2b4/0x360 [ 404.148578][T15926] ext4_file_read_iter+0x2b4/0x360 [ 404.153843][T15926] generic_file_splice_read+0x2df/0x470 [ 404.159650][T15926] ? add_to_pipe+0x1b0/0x1b0 [ 404.165259][T15926] do_splice_to+0xc7/0x100 [ 404.169870][T15926] splice_direct_to_actor+0x1b9/0x540 [ 404.175261][T15926] ? generic_pipe_buf_nosteal+0x20/0x20 [ 404.181217][T15926] do_splice_direct+0x152/0x1d0 [ 404.186539][T15926] do_sendfile+0x380/0x800 [ 404.191175][T15926] __x64_sys_sendfile64+0x121/0x140 [ 404.196740][T15926] do_syscall_64+0xc7/0x3b0 [ 404.201557][T15926] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 404.207630][T15926] RIP: 0033:0x45ca29 [ 404.211531][T15926] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 404.231450][T15926] RSP: 002b:00007fa918f1ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 404.240086][T15926] RAX: ffffffffffffffda RBX: 00000000004fc540 RCX: 000000000045ca29 [ 404.249280][T15926] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000005 [ 404.257472][T15926] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 404.267183][T15926] R10: 00000000ffffff38 R11: 0000000000000246 R12: 00000000ffffffff [ 404.275373][T15926] R13: 00000000000008dc R14: 00000000004cba16 R15: 00007fa918f1b6d4 [ 404.285677][T15926] Kernel Offset: disabled [ 404.291084][T15926] Rebooting in 86400 seconds..