man_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 366.675318][T12741] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 366.687753][T12741] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 366.698646][T12741] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 366.709871][T12741] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 366.720882][T12741] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 366.732669][T12741] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 366.747169][T12741] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 366.756362][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 366.766078][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 366.775741][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 366.785778][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 366.843533][T12741] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 366.854391][T12741] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 366.864470][T12741] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 366.875047][T12741] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 366.885292][T12741] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 366.895844][T12741] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 366.905957][T12741] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 366.916525][T12741] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 366.930470][T12741] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 366.943567][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 366.954214][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 16:51:36 executing program 4: 16:51:36 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x4e21, @broadcast}, {0x6, @local}, 0x8, {0x2, 0x4e20, @multicast1}, 'macvtap0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x8ffd0000, 0x61, 0x10, 0x18}, [@ldst={0x6, 0x5, 0x3, 0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 16:51:36 executing program 3: socket$netlink(0x10, 0x3, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x38200, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="5000000010000fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000300012800b00010067656e657665000020009b1a5e01d7990e94902a7773c73f6930028008000200ac1414bb14000700"/72], 0x3}}, 0x4) 16:51:36 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x4c0000) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e05411, &(0x7f0000000040)=""/224) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x80c00, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x8000, 0x94) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x800400, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r3, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10084200}, 0xc, &(0x7f0000000480)={&(0x7f00000002c0)={0x19c, r4, 0x1, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x44, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0xc0, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_NODE={0x38, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x40}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x14, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}]}, @TIPC_NLA_NODE={0xc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x495a}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x823}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x1}, 0x20044000) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000500), &(0x7f0000000540)=0x4) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000580)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast1}}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000600)}], 0x1, &(0x7f0000000680)=""/81, 0x51}, 0x40012022) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000740)='/dev/null\x00', 0x121000, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r5, 0x10e, 0x4, &(0x7f0000000780)=0x1ff, 0x4) r6 = syz_open_procfs(0x0, &(0x7f00000007c0)='net/llc/socket\x00') setsockopt$SO_RDS_TRANSPORT(r6, 0x114, 0x8, &(0x7f0000000800), 0x4) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000840)=0x0) pidfd_open(r7, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r5, 0x40044900, 0xe8) setsockopt$ax25_SO_BINDTODEVICE(r6, 0x101, 0x19, &(0x7f0000000880)=@rose={'rose', 0x0}, 0x10) r8 = openat$null(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/null\x00', 0x400800, 0x0) ioctl$SOUND_MIXER_WRITE_VOLUME(r8, 0xc0044d16, &(0x7f0000000900)=0x28) r9 = eventfd2(0x7, 0x80801) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r9) fchdir(r0) r10 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000940)='/dev/vga_arbiter\x00', 0x200000, 0x0) setsockopt$CAIFSO_LINK_SELECT(r10, 0x116, 0x7f, &(0x7f0000000980)=0x3, 0x4) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f00000009c0), &(0x7f0000000a00)=0x4) ioctl$BLKALIGNOFF(r6, 0x127a, &(0x7f0000000a40)) getresgid(&(0x7f0000000ac0)=0x0, &(0x7f0000000b00), &(0x7f0000000b40)) lchown(&(0x7f0000000a80)='./file0\x00', 0x0, r11) 16:51:36 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:51:36 executing program 2: pipe(&(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @rand_addr=0x81}, 0x10) 16:51:37 executing program 2: pipe(&(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @rand_addr=0x81}, 0x10) 16:51:37 executing program 3: 16:51:37 executing program 4: 16:51:37 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:51:37 executing program 3: 16:51:37 executing program 2: pipe(&(0x7f0000000040)) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @rand_addr=0x81}, 0x10) 16:51:37 executing program 4: 16:51:37 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:51:38 executing program 0: 16:51:38 executing program 3: [ 369.288589][T12839] IPVS: ftp: loaded support on port[0] = 21 [ 369.557865][T12839] chnl_net:caif_netlink_parms(): no params data found [ 369.651567][T12839] bridge0: port 1(bridge_slave_0) entered blocking state [ 369.658960][T12839] bridge0: port 1(bridge_slave_0) entered disabled state [ 369.668625][T12839] device bridge_slave_0 entered promiscuous mode [ 369.680866][T12839] bridge0: port 2(bridge_slave_1) entered blocking state [ 369.688370][T12839] bridge0: port 2(bridge_slave_1) entered disabled state [ 369.697835][T12839] device bridge_slave_1 entered promiscuous mode [ 369.737050][T12839] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 369.752461][T12839] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 369.786216][T12839] team0: Port device team_slave_0 added [ 369.797540][T12839] team0: Port device team_slave_1 added [ 369.827022][T12839] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 369.835202][T12839] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 369.861602][T12839] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 369.877913][T12839] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 369.885459][T12839] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 369.911779][T12839] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 369.995926][T12839] device hsr_slave_0 entered promiscuous mode [ 370.043756][T12839] device hsr_slave_1 entered promiscuous mode [ 370.082318][T12839] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 370.090067][T12839] Cannot create hsr debugfs directory [ 370.243527][T12839] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 370.297400][T12839] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 370.357872][T12839] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 370.408990][T12839] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 370.488924][T12839] bridge0: port 2(bridge_slave_1) entered blocking state [ 370.496186][T12839] bridge0: port 2(bridge_slave_1) entered forwarding state [ 370.504023][T12839] bridge0: port 1(bridge_slave_0) entered blocking state [ 370.511199][T12839] bridge0: port 1(bridge_slave_0) entered forwarding state [ 370.596880][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 370.607811][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 370.657256][T12839] 8021q: adding VLAN 0 to HW filter on device bond0 [ 370.686746][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 370.696694][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 370.714842][T12839] 8021q: adding VLAN 0 to HW filter on device team0 [ 370.730950][ T2674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 370.740843][ T2674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 370.750170][ T2674] bridge0: port 1(bridge_slave_0) entered blocking state [ 370.757569][ T2674] bridge0: port 1(bridge_slave_0) entered forwarding state [ 370.776636][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 370.787079][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 370.797459][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 370.804909][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 370.827228][ T2674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 370.852872][ T2674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 370.873875][ T2674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 370.885056][ T2674] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 370.901258][ T2674] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 370.911673][ T2674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 370.921839][ T2674] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 370.942950][ T2674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 370.952313][ T2674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 370.977234][ T2674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 370.989357][ T2674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 371.005296][T12839] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 371.046104][ T2674] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 371.054421][ T2674] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 371.081582][T12839] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 371.194632][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 371.206124][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 371.250834][ T2674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 371.260093][ T2674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 371.274462][ T2674] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 371.283764][ T2674] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 371.296017][T12839] device veth0_vlan entered promiscuous mode [ 371.329187][T12839] device veth1_vlan entered promiscuous mode [ 371.381984][ T2674] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 371.391149][ T2674] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 371.400262][ T2674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 371.409852][ T2674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 371.430362][T12839] device veth0_macvtap entered promiscuous mode [ 371.450245][T12839] device veth1_macvtap entered promiscuous mode [ 371.490914][T12839] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 371.501516][T12839] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 371.512559][T12839] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 371.523192][T12839] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 371.533213][T12839] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 371.543757][T12839] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 371.553707][T12839] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 371.564274][T12839] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 371.574221][T12839] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 371.584782][T12839] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 371.597087][T12839] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 371.607276][ T2674] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 371.617327][ T2674] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 371.626697][ T2674] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 371.636711][ T2674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 371.659534][T12839] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 371.670489][T12839] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 371.680497][T12839] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 371.691075][T12839] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 371.701122][T12839] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 371.711716][T12839] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 371.721751][T12839] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 371.732308][T12839] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 371.742333][T12839] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 371.752849][T12839] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 371.765378][T12839] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 371.774978][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 371.785586][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 16:51:41 executing program 5: 16:51:41 executing program 4: 16:51:41 executing program 2: pipe(&(0x7f0000000040)) close(0xffffffffffffffff) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @rand_addr=0x81}, 0x10) 16:51:41 executing program 0: 16:51:41 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:51:41 executing program 3: 16:51:41 executing program 0: 16:51:41 executing program 4: 16:51:41 executing program 3: 16:51:41 executing program 2: pipe(&(0x7f0000000040)) close(0xffffffffffffffff) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @rand_addr=0x81}, 0x10) 16:51:41 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:51:41 executing program 5: 16:51:41 executing program 0: 16:51:42 executing program 4: 16:51:42 executing program 3: 16:51:42 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:51:42 executing program 2: pipe(&(0x7f0000000040)) close(0xffffffffffffffff) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @rand_addr=0x81}, 0x10) 16:51:42 executing program 4: 16:51:42 executing program 5: 16:51:42 executing program 0: 16:51:42 executing program 3: 16:51:42 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @rand_addr=0x81}, 0x10) 16:51:42 executing program 3: 16:51:42 executing program 4: 16:51:42 executing program 5: 16:51:42 executing program 0: socket$l2tp(0x2, 0x2, 0x73) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x4, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xffffffffffffffff, 0x40000, 0x4}, 0x40) munlockall() bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) 16:51:43 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:51:43 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x209fe, 0x0) write$binfmt_aout(r0, &(0x7f0000000480)=ANY=[@ANYRESHEX, @ANYPTR=&(0x7f0000000100)=ANY=[]], 0x1a) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r0, &(0x7f0000000140), 0x8080fffffffc) r2 = socket(0x2, 0x803, 0xff) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:51:43 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 16:51:43 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:51:43 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @rand_addr=0x81}, 0x10) 16:51:43 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8) socket$inet(0x2, 0x3, 0x4) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 374.484306][ T32] audit: type=1804 audit(1584031903.530:67): pid=12941 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir814911229/syzkaller.DpJOTz/17/bus" dev="sda1" ino=16667 res=1 16:51:43 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) [ 374.627960][ T32] audit: type=1804 audit(1584031903.670:68): pid=12945 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir814911229/syzkaller.DpJOTz/17/bus" dev="sda1" ino=16667 res=1 [ 374.780900][ T32] audit: type=1804 audit(1584031903.820:69): pid=12945 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir814911229/syzkaller.DpJOTz/17/bus" dev="sda1" ino=16667 res=1 16:51:43 executing program 5: clone(0x10fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x3c1, 0x3, 0x460, 0x278, 0x0, 0x0, 0x278, 0x278, 0x390, 0x390, 0x390, 0x390, 0x390, 0x3, 0x0, {[{{@ipv6={@local, @local, [], [], 'veth1_to_team\x00', 'rose0\x00'}, 0x14e, 0x210, 0x278, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @ipv4={[], [], @remote}, @mcast2, @dev, @mcast1, @empty, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast1, @remote, @rand_addr="7f9837ea773c98720835692f2420310b", @ipv4={[], [], @multicast2}, @rand_addr="b031008172107be318e2df1e03fb2068", @mcast1, @mcast1, @empty], 0x6}}, @common=@ah={{0x30, 'ah\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@common=@inet=@socket3={{0x28, 'socket\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@mcast2, 'xfrm0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c0) 16:51:44 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000300)) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f0000000180)="b9800000c00f320f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c4e21903a05d000000c7442406000000000f011424f30f090f013a360f06c4c141f683b0a2e5a666baa100ed", 0x50}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 374.893856][ T32] audit: type=1804 audit(1584031903.870:70): pid=12945 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir814911229/syzkaller.DpJOTz/17/bus" dev="sda1" ino=16667 res=1 16:51:44 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) syz_open_procfs(0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$IP_SET_OP_GET_BYINDEX(r1, 0x1, 0x53, &(0x7f0000000000)={0x7, 0x7, 0x2}, &(0x7f0000000040)=0x28) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet(0x2, 0x6, 0xa) r3 = socket$inet(0x2, 0x0, 0x0) tee(r3, r3, 0x2, 0x2) pipe(&(0x7f0000000400)={0xffffffffffffffff}) tee(r4, r2, 0x3, 0x0) ioctl$PPPIOCSFLAGS(r4, 0x40047459, &(0x7f00000000c0)=0x82) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) socket$alg(0x26, 0x5, 0x0) 16:51:44 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:51:44 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @rand_addr=0x81}, 0x10) 16:51:44 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) gettid() getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, 0x0, &(0x7f0000000040)) pipe(0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) socket$alg(0x26, 0x5, 0x0) 16:51:44 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r1 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @rand_addr=0x81}, 0x10) 16:51:44 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:51:44 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0xffffffffffffffff) fstat(r0, &(0x7f0000000540)) 16:51:44 executing program 4: clone(0x10fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x3c1, 0x3, 0x460, 0x278, 0x0, 0x0, 0x278, 0x278, 0x390, 0x390, 0x390, 0x390, 0x390, 0x3, 0x0, {[{{@ipv6={@local, @local, [], [], 'veth1_to_team\x00', 'rose0\x00'}, 0x14e, 0x210, 0x278, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [0x401], 0x0, 0x4, 0x0, [@remote, @ipv4={[], [], @remote}, @mcast2, @dev, @mcast1, @empty, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast1, @remote, @rand_addr="7f9837ea773c98720835692f2420310b", @ipv4={[], [], @multicast2}, @rand_addr="b031008172107be318e2df1e03fb2068", @mcast1, @mcast1, @empty]}}, @common=@ah={{0x30, 'ah\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@common=@inet=@socket3={{0x28, 'socket\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@mcast2, 'xfrm0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c0) 16:51:45 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x0, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @rand_addr=0x81}, 0x10) 16:51:45 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:51:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fault user:e'], 0x1, 0xfffffffffffffffd) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 16:51:45 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getitimer(0x0, &(0x7f0000000300)) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000b00)={'syz1\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x33]}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 376.589481][T13005] encrypted_key: keylen parameter is missing [ 376.670620][T13009] encrypted_key: keylen parameter is missing [ 376.752350][T13012] input: syz1 as /devices/virtual/input/input7 [ 377.170141][ T32] audit: type=1400 audit(1584031906.210:71): avc: denied { getopt } for pid=12964 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 16:51:47 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) syz_open_procfs(0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$IP_SET_OP_GET_BYINDEX(r1, 0x1, 0x53, &(0x7f0000000000)={0x7, 0x7, 0x2}, &(0x7f0000000040)=0x28) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet(0x2, 0x6, 0xa) r3 = socket$inet(0x2, 0x0, 0x0) tee(r3, r3, 0x2, 0x2) pipe(&(0x7f0000000400)={0xffffffffffffffff}) tee(r4, r2, 0x3, 0x0) ioctl$PPPIOCSFLAGS(r4, 0x40047459, &(0x7f00000000c0)=0x82) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) socket$alg(0x26, 0x5, 0x0) 16:51:47 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x0, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @rand_addr=0x81}, 0x10) 16:51:47 executing program 1: r0 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:51:47 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f00000000c0)=r0) 16:51:47 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getitimer(0x0, &(0x7f0000000300)) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000b00)={'syz1\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x33]}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) socketpair$unix(0x1, 0x0, 0x0, 0x0) 16:51:47 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffd, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x6, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x8, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000080)={@loopback, 0x5e}) getitimer(0x0, &(0x7f0000000300)) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x0) write$uinput_user_dev(r1, &(0x7f0000000b00)={'syz1\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x33]}, 0x45c) ioctl$UI_DEV_CREATE(r1, 0x5501) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) [ 378.428963][T13039] input: syz1 as /devices/virtual/input/input10 [ 378.440244][T13037] input: syz1 as /devices/virtual/input/input9 16:51:47 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x0, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @rand_addr=0x81}, 0x10) 16:51:47 executing program 1: r0 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:51:47 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) utimensat(r1, 0x0, &(0x7f00000003c0)={{0x0, 0x3ffffffe}}, 0x0) close(0xffffffffffffffff) 16:51:47 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffd, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x6, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x8, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000080)={@loopback, 0x5e}) getitimer(0x0, &(0x7f0000000300)) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x0) write$uinput_user_dev(r1, &(0x7f0000000b00)={'syz1\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x33]}, 0x45c) ioctl$UI_DEV_CREATE(r1, 0x5501) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) 16:51:48 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) rt_sigaction(0x2a, 0x0, 0x0, 0x8, &(0x7f00000006c0)) 16:51:48 executing program 1: r0 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}], 0x1, 0x0) [ 379.247341][T13059] input: syz1 as /devices/virtual/input/input12 [ 379.810482][ T32] audit: type=1326 audit(1584031908.850:72): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13061 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=265 compat=1 ip=0xf7f3ed99 code=0xffff0000 [ 380.039404][ T32] audit: type=1326 audit(1584031909.080:73): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13061 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=265 compat=1 ip=0xf7f3ed99 code=0xffff0000 16:51:49 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[]], 0x8) setrlimit(0x7, &(0x7f0000000180)) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:51:49 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x40000000002, 0x0, 0x2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @rand_addr=0x81}, 0x10) 16:51:49 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0x10132) recvmmsg(r1, &(0x7f0000001140)=[{{0x0, 0x0, 0x0}}], 0x700, 0x2, 0x0) 16:51:49 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040)={0x7, 0x7}, 0x8) close(r0) 16:51:49 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="4c00000012001f15b9409b849ac00ad6a5784002000000000000030038c88cc055c5ac27a6c5b068d0bf46d323456536005ad94a461cdbfee9bdb9423523598451d1ec0cffc8792cd8000000", 0x4c, 0x0, 0x0, 0x0) 16:51:49 executing program 1: r0 = epoll_create1(0x0) close(0xffffffffffffffff) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, 0xffffffffffffffff, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:51:50 executing program 1: r0 = epoll_create1(0x0) close(0xffffffffffffffff) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, 0xffffffffffffffff, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:51:50 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x40000000002, 0x0, 0x2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @rand_addr=0x81}, 0x10) 16:51:50 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) 16:51:50 executing program 4: r0 = socket$inet6(0x10, 0x3, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="4c00000012001f15b9409b849ac00a00a5784002000000580000030038c88cc055c5ac27a6c5b068d0bf46d323456536005ad94a461cdbfee9bdb9423523598451d1ec0cffc8792cd8000000", 0x4c, 0x0, 0x0, 0x0) 16:51:50 executing program 1: r0 = epoll_create1(0x0) close(0xffffffffffffffff) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, 0xffffffffffffffff, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:51:50 executing program 5: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000300)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x8}, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f0000000180)="b9800000c00f320f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c4e21903a05d000000c7442406000000000f011424f30f090f013a360f06c4c141f683b0a2e5a666baa100ed", 0x50}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:51:50 executing program 3: 16:51:50 executing program 0: 16:51:51 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x40000000002, 0x0, 0x2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @rand_addr=0x81}, 0x10) 16:51:51 executing program 4: 16:51:51 executing program 3: 16:51:51 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(0xffffffffffffffff) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:51:51 executing program 0: 16:51:51 executing program 4: 16:51:51 executing program 3: 16:51:51 executing program 5: 16:51:51 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(0xffffffffffffffff) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:51:51 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x40000000002, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @rand_addr=0x81}, 0x10) 16:51:51 executing program 0: 16:51:52 executing program 4: 16:51:52 executing program 5: 16:51:52 executing program 3: 16:51:52 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(0xffffffffffffffff) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:51:52 executing program 0: 16:51:52 executing program 4: 16:51:52 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x40000000002, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @rand_addr=0x81}, 0x10) 16:51:52 executing program 3: 16:51:52 executing program 5: 16:51:52 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, 0x0, 0x0) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:51:52 executing program 0: 16:51:52 executing program 4: 16:51:53 executing program 3: 16:51:53 executing program 5: 16:51:53 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x40000000002, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @rand_addr=0x81}, 0x10) 16:51:53 executing program 4: 16:51:53 executing program 0: 16:51:53 executing program 3: 16:51:53 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, 0x0, 0x0) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:51:53 executing program 5: 16:51:53 executing program 0: 16:51:53 executing program 4: 16:51:53 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @rand_addr=0x81}, 0x10) 16:51:53 executing program 3: 16:51:54 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, 0x0, 0x0) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:51:54 executing program 5: 16:51:54 executing program 4: 16:51:54 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @rand_addr=0x81}, 0x10) 16:51:54 executing program 0: 16:51:54 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000200)={{0x14, 0x10, 0x1, 0xb4}, [@NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}], {0x14}}, 0x68}}, 0x0) 16:51:54 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x20000, 0x0) read$snddsp(r0, &(0x7f0000000140)=""/4096, 0x1000) 16:51:54 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x0, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:51:54 executing program 4: 16:51:54 executing program 0: 16:51:54 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @rand_addr=0x81}, 0x10) 16:51:55 executing program 3: 16:51:55 executing program 5: 16:51:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x4b71, &(0x7f0000000000)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000240)={0x800000000000053, 0x0, 0x7, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f00000002c0)="fbbc7bd7fc8ddc", 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)={0x30, 0x0, 0x2, 0x0, 0x25dfdbfc, {}, [@L2TP_ATTR_FD={0x8}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @local}]}, 0x30}}, 0x0) 16:51:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e20, @loopback}}}, 0x90) 16:51:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@mpol={'mpol', 0x3d, {'default', '', @val={0x3a, [0x2d]}}}}]}) 16:51:55 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x0, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:51:55 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @rand_addr=0x81}, 0x10) 16:51:55 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x5, 0xccd7}, 0x8) close(r0) 16:51:55 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) creat(0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f0000000100)='-md5sum(\x00', 0x9) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0xece40000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x24fa, 0x1f4}, 0xfffffff2}], 0x1, 0x100, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, 0x0, 0x40000000) getpid() socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={0x0, @phonet={0x23, 0x3, 0xff, 0x1}, @xdp={0x2c, 0x0, 0x0, 0x2c}, @can, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x17, &(0x7f0000000000), 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) getpid() setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="726177000000080000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802090000000000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e40000000100000674a66500000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f73653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff00000000000000000000000003000000070000000000000000000000000000004800435400"/574], 0x1) [ 386.716503][T13270] tmpfs: Bad value for 'mpol' 16:51:55 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @rand_addr=0x81}, 0x10) 16:51:56 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110039a918310008000100010423dcffdf00", 0x1f) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, 0x1, 0x4, 0x3, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x1c}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r5, 0x0, 0x4ffe0, 0x0) 16:51:56 executing program 0: r0 = socket$kcm(0x11, 0x8000000000000003, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x4}, 0x80, &(0x7f0000000140)=[{&(0x7f00000027c0)="84843600e80d08233e496d5671dc71ff04291b2c1501772502bb867063f72b47862a15257781bcf1d1e498104d082833914ee68afc14ac7cb85975751b8c3127", 0x40}], 0x1, 0x0, 0x0, 0x1a0}, 0x0) 16:51:56 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x0, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:51:56 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @rand_addr=0x81}, 0x10) [ 387.374399][T13295] __nla_validate_parse: 8 callbacks suppressed [ 387.374428][T13295] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.3'. 16:51:56 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @rand_addr=0x81}, 0x10) 16:51:56 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x0, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:51:56 executing program 0: close(0xffffffffffffffff) r0 = getpid() perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x0) syz_open_procfs$namespace(r0, 0x0) 16:51:57 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%n'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) 16:51:57 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) creat(0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f0000000100)='-md5sum(\x00', 0x9) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0xece40000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x24fa, 0x1f4}, 0xfffffff2}], 0x1, 0x100, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, 0x0, 0x40000000) getpid() socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={0x0, @phonet={0x23, 0x3, 0xff, 0x1}, @xdp={0x2c, 0x0, 0x0, 0x2c}, @can, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x17, &(0x7f0000000000), 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) getpid() setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/574], 0x1) 16:51:57 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @rand_addr=0x81}, 0x10) 16:51:57 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) creat(0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f0000000100)='-md5sum(\x00', 0x9) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0xece40000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x24fa, 0x1f4}, 0xfffffff2}], 0x1, 0x100, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, 0x0, 0x40000000) getpid() socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={0x0, @phonet={0x23, 0x3, 0xff, 0x1}, @xdp={0x2c, 0x0, 0x0, 0x2c}, @can, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x17, &(0x7f0000000000), 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) getpid() setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/574], 0x1) 16:51:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r2, 0x0, 0x10000000000443) read(r1, &(0x7f00000003c0)=""/72, 0x100000104) sendmsg$xdp(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) 16:51:57 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x0, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:51:57 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @rand_addr=0x81}, 0x10) 16:51:57 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x541b, 0x0) 16:51:58 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x0, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) [ 389.115769][T13348] binder: 13346:13348 ioctl 541b 0 returned -22 16:51:58 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(r0, 0x0, 0x0) [ 389.216676][T13352] binder: 13346:13352 ioctl 541b 0 returned -22 16:51:58 executing program 0: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x7c, &(0x7f0000000100)=[{&(0x7f0000000000)="24000000100007031dfffd946fa2830020200a0009000100000000010000aba20400ff7e280000000c0affffba01000000ff000000000000008be3518546c8243929db2406b20cd37ed01cc0", 0xff04}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:58 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) creat(0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f0000000100)='-md5sum(\x00', 0x9) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0xece40000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x24fa, 0x1f4}, 0xfffffff2}], 0x1, 0x100, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, 0x0, 0x40000000) getpid() socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={0x0, @phonet={0x23, 0x3, 0xff, 0x1}, @xdp={0x2c, 0x0, 0x0, 0x2c}, @can, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x17, &(0x7f0000000000), 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) getpid() setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/574], 0x1) 16:51:58 executing program 5: 16:51:58 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) creat(0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f0000000100)='-md5sum(\x00', 0x9) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0xece40000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x24fa, 0x1f4}, 0xfffffff2}], 0x1, 0x100, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, 0x0, 0x40000000) getpid() socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={0x0, @phonet={0x23, 0x3, 0xff, 0x1}, @xdp={0x2c, 0x0, 0x0, 0x2c}, @can, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x17, &(0x7f0000000000), 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) getpid() setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/574], 0x1) 16:51:58 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(r0, 0x0, 0x0) 16:51:58 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) [ 389.824767][T13371] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 389.833267][T13371] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 16:51:58 executing program 5: [ 389.986295][T13371] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 389.995072][T13371] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 16:51:59 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(r0, 0x0, 0x0) 16:51:59 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:51:59 executing program 0: 16:51:59 executing program 5: 16:51:59 executing program 4: 16:51:59 executing program 3: 16:51:59 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(r0, &(0x7f0000000000), 0x10) 16:51:59 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:51:59 executing program 5: 16:51:59 executing program 0: 16:51:59 executing program 4: 16:52:00 executing program 3: 16:52:00 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(r0, &(0x7f0000000000), 0x10) 16:52:00 executing program 5: 16:52:00 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:52:00 executing program 0: 16:52:00 executing program 4: 16:52:00 executing program 3: 16:52:00 executing program 0: 16:52:00 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='batadv0\x00', 0x10) connect$inet(r0, &(0x7f0000000000), 0x10) 16:52:00 executing program 4: 16:52:00 executing program 5: 16:52:00 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:52:00 executing program 3: 16:52:01 executing program 4: 16:52:01 executing program 0: 16:52:01 executing program 5: 16:52:01 executing program 2: 16:52:01 executing program 3: 16:52:01 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:52:01 executing program 0: 16:52:01 executing program 5: mknod(&(0x7f0000000000)='./bus\x00', 0x8, 0x0) lsetxattr$security_capability(&(0x7f0000000140)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) setreuid(r1, 0xffffffffffffffff) execve(&(0x7f0000000340)='./bus\x00', 0x0, 0x0) 16:52:01 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) poll(&(0x7f0000000300)=[{r0}, {}, {}, {}], 0x4, 0x0) 16:52:01 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2b, 'pids'}]}, 0x7) 16:52:01 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) ppoll(&(0x7f00000000c0)=[{r0}], 0x1, &(0x7f00000003c0), 0x0, 0x0) 16:52:01 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:52:02 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/72, 0x48}], 0x1, 0xc8) 16:52:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/raw6\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000180)=""/72, 0x48}], 0x1, 0x9c) 16:52:02 executing program 3: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564703a73797a31000000004715add403c38d44000400200001000a0000000000000000000000f0be00000000000000000000000100080000200002000a00000000000000ff0200000000000000000000000000010000"], 0x6c}}, 0x0) 16:52:02 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000180)=""/72, 0x48}], 0x1, 0x9c) [ 393.343008][T13456] warning: `./bus' has both setuid-root and effective capabilities. Therefore not raising all capabilities. 16:52:02 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:52:02 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x240, 0x0, 0xa) [ 393.566632][T13481] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.3'. [ 393.576404][T13481] tipc: Enabling of bearer rejected, failed to enable media 16:52:02 executing program 5: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2f42f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffc000/0x4000)=nil, 0x0) 16:52:02 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000000016, &(0x7f00000004c0)) ptrace(0x4206, r0) wait4(0x0, 0x0, 0x8, 0x0) [ 393.690776][T13487] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.3'. [ 393.700979][T13487] tipc: Enabling of bearer rejected, failed to enable media 16:52:03 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'pids'}]}, 0x7) 16:52:03 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:52:03 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f00000002c0)="14", 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000000004, 0x11, r0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x2, &(0x7f0000000340)={'security\x00', 0x2, [{}, {}]}, 0x48) 16:52:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0xf000, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x7c}}, 0x0) 16:52:03 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="214e017c6f767920"], 0xda00) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) 16:52:03 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) [ 394.440343][ T32] audit: type=1400 audit(1584031923.480:74): avc: denied { map } for pid=13505 comm="syz-executor.4" path=2F6D656D66643A0B656D31C1F8A68D4EC0A35CE2CBA2BAE5F497AC232AFF202864656C6574656429 dev="tmpfs" ino=37236 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 16:52:03 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) r2 = io_uring_setup(0x12d, &(0x7f0000000200)) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/164, 0xa4}, {0x0}], 0x2) 16:52:03 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@flushpolicy={0x10, 0x1d, 0x1}, 0x10}}, 0x0) 16:52:03 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x2) 16:52:03 executing program 4: mknod(&(0x7f0000000000)='./bus\x00', 0x8, 0x0) lsetxattr$security_capability(&(0x7f0000000140)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000100)=@v2, 0x14, 0x0) r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) r2 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(r3, r1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) execve(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) 16:52:04 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:52:04 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2f42f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) sendto$inet(r0, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x240, 0x0, 0xa) socket$inet6_tcp(0xa, 0x1, 0x0) 16:52:04 executing program 2: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9}, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x28001) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x10, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_RELEASEINTERFACE(r0, 0x80045519, 0x0) 16:52:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sync() 16:52:04 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) r2 = io_uring_setup(0x12d, &(0x7f0000000200)) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/164, 0xa4}, {0x0}], 0x2) 16:52:04 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:52:04 executing program 4: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) r2 = io_uring_setup(0x12d, &(0x7f0000000200)) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/164, 0xa4}, {0x0}], 0x2) 16:52:04 executing program 3: r0 = socket(0x11, 0x2, 0x0) getsockopt$packet_int(r0, 0x107, 0x9, 0x0, &(0x7f0000000140)) 16:52:04 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) r2 = io_uring_setup(0x12d, &(0x7f0000000200)) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/164, 0xa4}, {0x0}], 0x2) 16:52:05 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:52:05 executing program 5: r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000200)={0x1, 0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, 0x0}) r2 = dup2(r1, r0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f0000000140)=[@acquire], 0x0, 0x0, 0x0}) 16:52:05 executing program 2: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9}, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x28001) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000000)={0x23, 0x3, 0x10, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_RELEASEINTERFACE(r0, 0x80045519, 0x0) 16:52:05 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='gid_map\x00') lseek(r0, 0x38, 0x0) preadv(r0, &(0x7f00000014c0)=[{&(0x7f0000000100)=""/202, 0xca}], 0x1, 0x80000000) 16:52:05 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x3}, @mpls={[], @ipv4=@tcp={{0x6, 0x4, 0x2, 0x0, 0xfde5, 0x0, 0x0, 0x0, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}, 0xfdef) 16:52:05 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) [ 396.479362][ T32] audit: type=1400 audit(1584031925.520:75): avc: denied { set_context_mgr } for pid=13591 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 16:52:05 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x0) 16:52:05 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) r2 = io_uring_setup(0x12d, &(0x7f0000000200)) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/164, 0xa4}, {0x0}], 0x2) [ 396.720561][T13604] sit: non-ECT from 172.30.0.5 with TOS=0x2 16:52:05 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_tables_targets\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000180)=""/72, 0x48}], 0x1, 0x9c) 16:52:05 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='gid_map\x00') lseek(r0, 0x38, 0x0) readv(r0, &(0x7f0000000940)=[{&(0x7f0000000100)=""/236, 0xec}], 0x1) 16:52:06 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:52:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) dup2(r2, r3) 16:52:06 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ff00000}]}) 16:52:06 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='uid_map\x00') lseek(r0, 0x38, 0x0) 16:52:06 executing program 2: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66731f66617400020401ed01000270fff8", 0x26}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f00000002c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x200) 16:52:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = memfd_create(&(0x7f0000000140)='\x9d#\x00\x00\x00\xa7?3\xeb\xc6\xd1\xa6#\r\x83y\x00\x00\x00\x00\x00\xff\xff\x7f\x17\x94$^\xe1Ob\xe1\x10yUzi\xfa6\x7f\xa89\x10K\xa2\x1ev\x83\xa2>u\xa31a\xaaj\x94\xcf|\xb8\xc3\x99\xc2\x96\xff\xd4\xddL\x7f\xd0O\x1d\x1b\xf8\x1c\x85\xaen6\t\x8e7\xbc\x82bcq\x93\xa7\r\xafy!\tv\x84fo\aW\xfe\xa4\xf4/\x0f\xc0x\x93\xbc\xb7\"}ad\xe2_\xd0S\x96\x10\b\xe4\x8c\xd3\x14>\x15\x817\xd6\roN=\x85\xab\xd0\xc3t\xb8\xd0Xx\xcd\x94)\xefT\x1c\xeb\x82%\xa9\x8bzL\x11\xa2\x1em\xb1\xb9\x8b\xe8\xea\xe0\xbbAV\x04\x17\xc3\xe9\xbb-\xb9\x94\x92\x18\xc8\xfcr\x8e\x01)Z\xdc\xdba\b\x12F@.E\xd5\xfaYu\xef\x86X\x18\xab\xef\x1f\xaf u\xd7\xa0\x89\xd9S\x18\xf7u(\x86X0\t\xe2\xe0@&\xa6\v\x8aAN|D\xe1\x05\x00!\x98v\xe4\xbb\xdf\xd4\x9a\x01>|\xba\x83z\x88\xc4\xaf\x14\x1a>\xe2(\x02\x87', 0x0) fallocate(r1, 0x0, 0x0, 0x3718) [ 397.553417][T13634] sit: non-ECT from 172.30.0.5 with TOS=0x2 16:52:07 executing program 4: r0 = socket(0x28, 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x1) 16:52:07 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, 0xffffffffffffffff, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:52:07 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000700)={0x0, 0x0}, &(0x7f00000006c0)=0x7) setresuid(0x0, r1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f00000002c0)={'caif0\x00', {0x2, 0x0, @dev}}) 16:52:07 executing program 2: request_key(&(0x7f0000000200)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:52:07 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000000016, &(0x7f00000004c0)) ptrace(0x4206, r0) rt_tgsigqueueinfo(r0, r0, 0x12, &(0x7f0000001180)={0x0, 0x0, 0xffffbfffffffc58e}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) wait4(0x0, 0x0, 0x8, 0x0) 16:52:07 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 16:52:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000a00)=@raw={'raw\x00', 0x3c1, 0x3, 0x2b0, 0x2, 0x270, 0x0, 0x270, 0x270, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48], 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x310) 16:52:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0xf000, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x7c}}, 0x0) 16:52:07 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, 0xffffffffffffffff, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:52:07 executing program 5: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x400002200006007, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2, 0x31, 0xffffffffffffffff, 0x0) ioctl$BLKGETSIZE64(r2, 0x1263, &(0x7f0000000040)) 16:52:08 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) poll(&(0x7f0000000300)=[{r0}, {}, {}, {}], 0x4, 0x0) 16:52:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14, 0x0, 0x1, 0x801}, 0x14}}, 0x0) [ 399.135165][T13681] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.2'. 16:52:08 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, 0xffffffffffffffff, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:52:08 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setaffinity(0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x49d0, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x291962b, 0x45833af92e4b39ff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000240), &(0x7f00000002c0)=0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x80, 0x54) write$selinux_attr(r1, &(0x7f00000000c0)='system_u:object_r:apt_var_cache_t:s0\x00', 0x25) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) getsockopt$EBT_SO_GET_INIT_INFO(r2, 0x0, 0x82, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000200)=0x78) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x800001d, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000050d00"/20, @ANYRES32, @ANYBLOB="000000000000000014001280090001007663616e0000000004000280"], 0x34}}, 0x0) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000540)="fc0000001a000700ab092500090007000aab0700a90100001d60369321000100fe24ffff000000000000000000037515fa2c1ec28656aaa79bb94b44fe000000bc00030005000000140000270400117c22ebc20521400000d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd2000175e63fb8d38a8700"/252, 0xfc) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x40000, 0x0) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x10000, 0x2) r7 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x2812, r7, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$TUNSETLINK(r8, 0x400454cd, 0x230) r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)=@ipv6_delrule={0x24, 0x21, 0x889966e8e85f8887, 0x0, 0x0, {0x2, 0x0, 0x0, 0x3}, [@FIB_RULE_POLICY=@FRA_PROTOCOL={0x5}]}, 0x24}}, 0x0) r10 = socket(0x100000000011, 0x2, 0x0) bind(r10, &(0x7f0000000940)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendmmsg$sock(r10, &(0x7f0000001400)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@timestamping={{0x14, 0x1, 0x25, 0xfffffeff}}], 0x18}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r12 = socket$inet_udp(0x2, 0x2, 0x0) close(r12) splice(r11, 0x0, r12, 0x0, 0x4ffe0, 0x0) r13 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r13, 0x29, 0x2d, &(0x7f00000004c0)={0xff, {{0xa, 0x4e20, 0x469, @mcast1, 0xfffffea6}}}, 0x88) setsockopt$inet6_int(r13, 0x29, 0x8, &(0x7f00000000c0)=0xfffffffffffffffc, 0x4) getsockopt$inet6_buf(r13, 0x29, 0x6, 0x0, &(0x7f0000000000)) r14 = accept4(r13, &(0x7f0000000140)=@caif=@util, &(0x7f0000000000)=0x80, 0x40800) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r15, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r15, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') r16 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r15, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="1af5eff25331f2c060d7f77959a2f8d4cb0baf48ba8a8d24a25bf5f947d295fb747f57b749cf9c62d9a5ff3ada239f3b62d2e25f348b729db5ccf8a8c771329c6867a9e6d3616c829a9eb1c09f0794b0d3760f6b", @ANYRES16=r16, @ANYBLOB="02002bbd7000ffdbdf250200000c080002"], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmsg$NLBL_CIPSOV4_C_REMOVE(r14, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000440)={&(0x7f0000000200)={0x238, r16, 0x2, 0x70bd28, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x4c}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0xd4}, @NLBL_CIPSOV4_A_MLSLVLLST={0xe4}]}, 0x238}, 0x1, 0x0, 0x0, 0x40040}, 0x2004c010) sendmsg$NLBL_CIPSOV4_C_ADD(r11, &(0x7f0000007bc0)={&(0x7f00000079c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000007b80)={&(0x7f0000007a00)=ANY=[@ANYBLOB="44010000", @ANYRES16=r16, @ANYBLOB="300328bd7000fcdbdf250100000030010c8024000b8008000900ef30823908000a000e940000080009000300000008000a00373f00003c000b503a000a00801f000008000a009807000008000a00d2bb000008000a00ce7f000008000900d5202f0e0800090082f56675080009007d43802c34000b8008000a0070f50000080009006393b44c08000a00a0d2000008000a007706000008000a00fcc5000008000900fce57d432c000a00d391000008000a00dcc500003808000a00528200004c000b8008000a004d2c00000800090017db623c08000900ea984050080009002065273208000900645b0a3c08000a00da36000008000a007dde0000080009009b94c77308000900f9db1e4514000b8008000a00329a000008000a00ad3200000c000b8008000900dc22b96400"/318], 0x144}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) sendmsg$NLBL_CIPSOV4_C_LISTALL(r10, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000040)={&(0x7f0000000300)={0x190, r16, 0x4, 0x70bd2d, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x18, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7c85}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x412cc459}]}]}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0xc, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x148, 0xc, 0x0, 0x1, [{0x4c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x93a6}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe72b}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3cd2d1de}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x393e1758}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf0a6}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdc29}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5b531cca}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x173b61eb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5f05}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x785a97bc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x12bf406b}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf450}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdd6f}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc429}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4337}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x767d}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x59d54399}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xef67}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4bbd}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2dc7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5c60}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4b4e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x81c4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x716a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x72cee822}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x61fd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x24dcf855}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3b12bb26}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xaf36}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3e802a19}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1a3d98bd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3f20d7e4}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa7e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf572}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc30e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb896}]}]}]}, 0x190}, 0x1, 0x0, 0x0, 0x80}, 0xc000800) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000001300)={0x248, r16, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x124, 0xc, 0x0, 0x1, [{0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcd0f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x103ce7ac}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5467c18f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa97c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa99}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x33de}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4b68cb10}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x254281dd}]}, {0x4}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x45bf}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4777d6dc}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2edd}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x57a1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x584f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3698e5ec}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x42656264}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x23ff75aa}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9425}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1c081130}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x368f6254}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xab39}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x166d5b9e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4f1e68}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x31fc}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7545b911}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x19ed42f3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x663fd1f1}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4d786ea0}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd088}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x46f8}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcc6}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7c83d381}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x21f11213}]}, {0x4}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5}, {0x5}, {0x5, 0x3, 0x7}, {0x5}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x2}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0xa8, 0x8, 0x0, 0x1, [{0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x34aa5808}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x36}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x610b54d9}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x80}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7fd29eaa}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2b7d3db7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xff}]}, {0x54, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5834e2af}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2b0705d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x97}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc0}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7ba3cf63}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x30968a75}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x248}, 0x1, 0x0, 0x0, 0x20004800}, 0x4000) sendmsg$NLBL_CIPSOV4_C_ADD(r9, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r16, 0x2, 0x70bd2d, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x4000080) sendmsg$NLBL_CIPSOV4_C_LIST(r8, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, r16, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0xc000) sendmsg$NLBL_CIPSOV4_C_ADD(r7, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xa8, r16, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x8c, 0xc, 0x0, 0x1, [{0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe243}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1b7a203c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2f0a02dc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x227dcf98}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xad6e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x564d3f5f}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x28dc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6e1b0eaf}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8aa7}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3f02c19}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x222b}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6956939f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x18e4e34a}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x622a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6455cfb5}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}]}, 0xa8}, 0x1, 0x0, 0x0, 0x20000000}, 0x40840) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB=',\x00', @ANYRES16=r16, @ANYBLOB="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"], 0x124}, 0x1, 0x0, 0x0, 0x8008000}, 0x4040) sendmsg$NLBL_CIPSOV4_C_LISTALL(r6, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, r16, 0x10, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4004800}, 0x80) sendmsg$NLBL_CIPSOV4_C_ADD(r5, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="28010000", @ANYRES16=r16, @ANYBLOB="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"/290], 0x128}, 0x1, 0x0, 0x0, 0x8080}, 0x24002000) sendmsg$NLBL_CIPSOV4_C_ADD(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB="2cc7aff8", @ANYRES16=r16, @ANYBLOB="00012abd7000fcdbdf250100000018000880140007800800060034000000080006005f000000"], 0x2c}, 0x1, 0x0, 0x0, 0x890}, 0x40) sendmsg$NLBL_CIPSOV4_C_REMOVE(r3, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x3c, r16, 0x300, 0x70bd2a, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4001}, 0x20) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x11c, r16, 0x0, 0x70bd26, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x108, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x29e8968b}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x60028612}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7a510ae5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3405ea69}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xed}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5a65ed7c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x81}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x62c354f6}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x39}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcd}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2f323a38}]}, {0x54, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4ef2699d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x18d1e837}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x66}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x723fc301}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xad}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4033932a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5ddd7d56}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdb}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x61}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x37}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xfd}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x19c1d28}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x608a5fc8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbf}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd5}]}]}]}, 0x11c}, 0x1, 0x0, 0x0, 0x810}, 0x8000) sendmsg$NLBL_CIPSOV4_C_LISTALL(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, r16, 0x4, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0xc000}, 0x8000) 16:52:08 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.origin\x00', &(0x7f0000000240)=""/219, 0xdb) 16:52:08 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r3, @ANYBLOB="00000016010000001800120008000100736974000c00020008000300", @ANYRES32=r4], 0x38}}, 0x0) bind$can_raw(r0, &(0x7f00000000c0)={0x1d, r4}, 0x10) 16:52:08 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x400002200006007, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) close(r2) [ 400.187792][T13712] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 400.534236][T13712] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13712 comm=syz-executor.2 [ 400.578778][T13705] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=13705 comm=syz-executor.2 [ 400.600392][T13705] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13705 comm=syz-executor.2 [ 400.780978][T13718] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13718 comm=syz-executor.2 [ 400.804779][T13705] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=13705 comm=syz-executor.2 [ 400.818668][T13705] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13705 comm=syz-executor.2 16:52:10 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2, 0x31, 0xffffffffffffffff, 0x0) ioctl$BLKGETSIZE64(r2, 0x2, &(0x7f0000000040)) 16:52:10 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_tables_targets\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000180)=""/72, 0x48}], 0x1, 0xd5) 16:52:10 executing program 4: r0 = epoll_create1(0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = socket$netlink(0x10, 0x3, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r2) 16:52:10 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, 0x0) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:52:10 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795eca00", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) 16:52:10 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setaffinity(0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x49d0, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x291962b, 0x45833af92e4b39ff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000240), &(0x7f00000002c0)=0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x80, 0x54) write$selinux_attr(r1, &(0x7f00000000c0)='system_u:object_r:apt_var_cache_t:s0\x00', 0x25) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) getsockopt$EBT_SO_GET_INIT_INFO(r2, 0x0, 0x82, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000200)=0x78) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x800001d, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000050d00"/20, @ANYRES32, @ANYBLOB="000000000000000014001280090001007663616e0000000004000280"], 0x34}}, 0x0) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000540)="fc0000001a000700ab092500090007000aab0700a90100001d60369321000100fe24ffff000000000000000000037515fa2c1ec28656aaa79bb94b44fe000000bc00030005000000140000270400117c22ebc20521400000d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd2000175e63fb8d38a8700"/252, 0xfc) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x40000, 0x0) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x10000, 0x2) r7 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x2812, r7, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$TUNSETLINK(r8, 0x400454cd, 0x230) r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)=@ipv6_delrule={0x24, 0x21, 0x889966e8e85f8887, 0x0, 0x0, {0x2, 0x0, 0x0, 0x3}, [@FIB_RULE_POLICY=@FRA_PROTOCOL={0x5}]}, 0x24}}, 0x0) r10 = socket(0x100000000011, 0x2, 0x0) bind(r10, &(0x7f0000000940)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendmmsg$sock(r10, &(0x7f0000001400)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@timestamping={{0x14, 0x1, 0x25, 0xfffffeff}}], 0x18}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r12 = socket$inet_udp(0x2, 0x2, 0x0) close(r12) splice(r11, 0x0, r12, 0x0, 0x4ffe0, 0x0) r13 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r13, 0x29, 0x2d, &(0x7f00000004c0)={0xff, {{0xa, 0x4e20, 0x469, @mcast1, 0xfffffea6}}}, 0x88) setsockopt$inet6_int(r13, 0x29, 0x8, &(0x7f00000000c0)=0xfffffffffffffffc, 0x4) getsockopt$inet6_buf(r13, 0x29, 0x6, 0x0, &(0x7f0000000000)) r14 = accept4(r13, &(0x7f0000000140)=@caif=@util, &(0x7f0000000000)=0x80, 0x40800) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r15, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r15, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') r16 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r15, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="1af5eff25331f2c060d7f77959a2f8d4cb0baf48ba8a8d24a25bf5f947d295fb747f57b749cf9c62d9a5ff3ada239f3b62d2e25f348b729db5ccf8a8c771329c6867a9e6d3616c829a9eb1c09f0794b0d3760f6b", @ANYRES16=r16, @ANYBLOB="02002bbd7000ffdbdf250200000c080002"], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmsg$NLBL_CIPSOV4_C_REMOVE(r14, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000440)={&(0x7f0000000200)={0x238, r16, 0x2, 0x70bd28, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x4c}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0xd4}, @NLBL_CIPSOV4_A_MLSLVLLST={0xe4}]}, 0x238}, 0x1, 0x0, 0x0, 0x40040}, 0x2004c010) sendmsg$NLBL_CIPSOV4_C_ADD(r11, &(0x7f0000007bc0)={&(0x7f00000079c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000007b80)={&(0x7f0000007a00)=ANY=[@ANYBLOB="44010000", @ANYRES16=r16, @ANYBLOB="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"/318], 0x144}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) sendmsg$NLBL_CIPSOV4_C_LISTALL(r10, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000040)={&(0x7f0000000300)={0x190, r16, 0x4, 0x70bd2d, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x18, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7c85}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x412cc459}]}]}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0xc, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x148, 0xc, 0x0, 0x1, [{0x4c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x93a6}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe72b}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3cd2d1de}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x393e1758}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf0a6}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdc29}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5b531cca}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x173b61eb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5f05}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x785a97bc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x12bf406b}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf450}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdd6f}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc429}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4337}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x767d}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x59d54399}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xef67}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4bbd}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2dc7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5c60}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4b4e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x81c4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x716a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x72cee822}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x61fd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x24dcf855}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3b12bb26}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xaf36}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3e802a19}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1a3d98bd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3f20d7e4}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa7e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf572}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc30e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb896}]}]}]}, 0x190}, 0x1, 0x0, 0x0, 0x80}, 0xc000800) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000001300)={0x248, r16, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x124, 0xc, 0x0, 0x1, [{0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcd0f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x103ce7ac}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5467c18f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa97c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa99}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x33de}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4b68cb10}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x254281dd}]}, {0x4}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x45bf}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4777d6dc}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2edd}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x57a1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x584f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3698e5ec}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x42656264}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x23ff75aa}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9425}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1c081130}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x368f6254}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xab39}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x166d5b9e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4f1e68}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x31fc}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7545b911}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x19ed42f3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x663fd1f1}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4d786ea0}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd088}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x46f8}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcc6}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7c83d381}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x21f11213}]}, {0x4}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5}, {0x5}, {0x5, 0x3, 0x7}, {0x5}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x2}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0xa8, 0x8, 0x0, 0x1, [{0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x34aa5808}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x36}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x610b54d9}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x80}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7fd29eaa}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2b7d3db7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xff}]}, {0x54, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5834e2af}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2b0705d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x97}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc0}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7ba3cf63}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x30968a75}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x248}, 0x1, 0x0, 0x0, 0x20004800}, 0x4000) sendmsg$NLBL_CIPSOV4_C_ADD(r9, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r16, 0x2, 0x70bd2d, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_DOI={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x4000080) sendmsg$NLBL_CIPSOV4_C_LIST(r8, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, r16, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0xc000) sendmsg$NLBL_CIPSOV4_C_ADD(r7, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xa8, r16, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x8c, 0xc, 0x0, 0x1, [{0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe243}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1b7a203c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2f0a02dc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x227dcf98}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xad6e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x564d3f5f}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x28dc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6e1b0eaf}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8aa7}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3f02c19}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x222b}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6956939f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x18e4e34a}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x622a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6455cfb5}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}]}, 0xa8}, 0x1, 0x0, 0x0, 0x20000000}, 0x40840) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB=',\x00', @ANYRES16=r16, @ANYBLOB="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"], 0x124}, 0x1, 0x0, 0x0, 0x8008000}, 0x4040) sendmsg$NLBL_CIPSOV4_C_LISTALL(r6, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, r16, 0x10, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4004800}, 0x80) sendmsg$NLBL_CIPSOV4_C_ADD(r5, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="28010000", @ANYRES16=r16, @ANYBLOB="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"/290], 0x128}, 0x1, 0x0, 0x0, 0x8080}, 0x24002000) sendmsg$NLBL_CIPSOV4_C_ADD(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB="2cc7aff8", @ANYRES16=r16, @ANYBLOB="00012abd7000fcdbdf250100000018000880140007800800060034000000080006005f000000"], 0x2c}, 0x1, 0x0, 0x0, 0x890}, 0x40) sendmsg$NLBL_CIPSOV4_C_REMOVE(r3, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x3c, r16, 0x300, 0x70bd2a, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4001}, 0x20) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x11c, r16, 0x0, 0x70bd26, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x108, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x29e8968b}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x60028612}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7a510ae5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3405ea69}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xed}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5a65ed7c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x81}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x62c354f6}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x39}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcd}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2f323a38}]}, {0x54, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4ef2699d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x18d1e837}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x66}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x723fc301}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xad}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4033932a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5ddd7d56}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdb}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x61}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x37}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xfd}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x19c1d28}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x608a5fc8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbf}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd5}]}]}]}, 0x11c}, 0x1, 0x0, 0x0, 0x810}, 0x8000) sendmsg$NLBL_CIPSOV4_C_LISTALL(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, r16, 0x4, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0xc000}, 0x8000) 16:52:10 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0xc4042, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x14, 0x2, @loopback}]}, 0x2c}}, 0x0) 16:52:10 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x7) 16:52:10 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, 0x0) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) [ 401.599160][T13739] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 16:52:10 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) capset(&(0x7f00000fc000)={0x20080522}, &(0x7f000047efe8)) 16:52:10 executing program 5: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x400002200006007, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RLERROR(r0, &(0x7f0000000080)={0x21, 0x7, 0x0, {0x18, 'mime_type&\\ppp1{&wlan0lo'}}, 0x21) [ 401.976048][ T32] audit: type=1800 audit(1584031931.000:76): pid=13750 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=16822 res=0 [ 402.044280][T13739] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13739 comm=syz-executor.2 [ 402.063149][ T32] audit: type=1800 audit(1584031931.070:77): pid=13750 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=16822 res=0 16:52:11 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, 0x0) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) [ 402.094196][T13752] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13752 comm=syz-executor.3 16:52:11 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x7) [ 402.185270][T13731] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=13731 comm=syz-executor.2 [ 402.266516][T13755] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13755 comm=syz-executor.2 16:52:11 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=@dellink={0x28, 0x11, 0x1, 0x0, 0x0, {}, [@IFLA_TARGET_NETNSID={0x8}]}, 0x28}}, 0x0) 16:52:11 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@mcast1}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0x4}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 16:52:11 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000100)=@urb_type_interrupt={0x1, {}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 16:52:11 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:52:11 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000001880)=[{{&(0x7f0000000040)={0x2, 0x0, @remote}, 0x10, &(0x7f0000001500)=[{&(0x7f0000001340)='GQ', 0x2}], 0x1}}, {{&(0x7f0000000080)={0x3, 0x0, @broadcast}, 0x10, 0x0}}], 0x2, 0x0) 16:52:11 executing program 4: getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000040)={'TPROXY\x00'}, &(0x7f0000000080)=0x1e) 16:52:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x5) 16:52:11 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x200000c7) [ 403.004280][T13784] raw_sendmsg: syz-executor.2 forgot to set AF_INET. Fix it! 16:52:12 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:52:12 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x1}, {0x6, 0x0, 0x0, 0x50000}]}) 16:52:12 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000340)='./file0\x00', 0x173640, 0x0) 16:52:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0xf000, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x7c}}, 0x0) 16:52:12 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x200000c7) 16:52:12 executing program 0: r0 = io_uring_setup(0x12d, &(0x7f0000000200)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000000)=""/173, 0xad}], 0x1) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) 16:52:12 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:52:12 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x200000c7) 16:52:12 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='uid_map\x00') write$binfmt_script(r0, 0x0, 0x0) 16:52:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = io_uring_setup(0x12d, &(0x7f0000000200)) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000000)=""/27, 0x1b}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x2) 16:52:13 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 16:52:13 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000400)=""/4096, 0x1000, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x2, 0x0) sendto$inet6(r1, &(0x7f00000000c0)="1ba0000010001d0200fdc5cbdd041d8e828003000000000001a7960fab0fc8da78031c6660b08f00003f71aced466b4644434a88fed7d75725e1069e42dc4b3844e5fb82bb02fec770967c740c00000000d02830b5a4c01a92317320f0c0a5adb7b5b8bf255f1a8dffa8", 0xfe0b, 0x40800, 0x0, 0xffffffffffffff95) 16:52:13 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x200000c7) 16:52:13 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:52:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0xf000, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x7c}}, 0x0) 16:52:13 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x200000c7) [ 404.488704][T13847] netlink: 40067 bytes leftover after parsing attributes in process `syz-executor.5'. 16:52:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = io_uring_setup(0x12d, &(0x7f0000000200)) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000000)=""/27, 0x1b}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x2) 16:52:13 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) 16:52:13 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:52:13 executing program 4: connect$rxrpc(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x25, &(0x7f00000003c0)=@gcm_256={{}, "3580bcc9ca62bc1c", "29c5f6257af475cc1fd1fd64e7022e9fe9f448dc22acd8452cac328693712091", "8b8c17bd", "3fad15656f83ec8e"}, 0x38) 16:52:14 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x200000c7) 16:52:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000201ffffb23c9e37ecf6ca0800023fc0beb9601cc02136ca757884efb10000"], 0x14}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 16:52:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = io_uring_setup(0x12d, &(0x7f0000000200)) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000000)=""/27, 0x1b}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x2) [ 405.187957][T13869] TCP: TCP_TX_DELAY enabled [ 405.194733][T13847] netlink: 37403 bytes leftover after parsing attributes in process `syz-executor.5'. 16:52:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe80, 0x0, &(0x7f0000000100)="000e003f0000007e5bc5795eca003f", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) 16:52:14 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(0xffffffffffffffff, &(0x7f0000000000)=[{}], 0x1, 0x0) 16:52:14 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c0001006272696467650000000200"], 0x34}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_MASTER={0x8, 0xa, r4}]}, 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="200000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0980000000000000"], 0x20}}, 0x0) 16:52:14 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x200000c7) 16:52:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = io_uring_setup(0x12d, &(0x7f0000000200)) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000000)=""/27, 0x1b}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x2) 16:52:14 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, 0x0, 0x0, 0x0) [ 405.826695][T13892] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 405.921402][T13897] device bridge_slave_0 left promiscuous mode [ 405.928642][T13897] bridge0: port 1(bridge_slave_0) entered disabled state 16:52:15 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x200000c7) [ 406.024423][T13897] bridge1: port 1(bridge_slave_0) entered blocking state [ 406.031659][T13897] bridge1: port 1(bridge_slave_0) entered disabled state [ 406.041356][T13897] device bridge_slave_0 entered promiscuous mode 16:52:15 executing program 0: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000640)={0x5c, r2, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}, @WGDEVICE_A_PEERS={0x2c, 0x8, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg='\xdb\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff'}]}]}, @WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}]}, 0x5c}}, 0x0) [ 406.193546][T13892] bridge1: port 1(bridge_slave_0) entered blocking state [ 406.201050][T13892] bridge1: port 1(bridge_slave_0) entered forwarding state 16:52:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x3000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000300)=ANY=[@ANYBLOB="000202010000000000000000000000000000e7176b05e2eed47b046712702500000000009575bfe745a09c6129861adf4ddecc6021920b19c894909dd48d613f089ddbfbe7c0e8b6fbdf5cea0463e405eb4d75dbd45154cb69c772585ea82d3fe95846b11d550d87fb3de9fcbde6c309e51bc858af3730d1837fa1e4423da2f1b26ad294f10474a90dacc297f415624f399756d418f9cbace83dd1e0eb3c512521c480dcbec47f6bec611db2e749f799354a52ae09e0494dddf7e0000000000000000000000000a3e2e2a9a393b074b4ea1182e1a49b635bc5f379c312dabfae7096fa565d044a7ff44e608ce9bf277170386383f60b0e6c9ab24327a93bac5d925737afc833ab05000000ed9900767ec2e9c16297e4017564e6a95b92fa67cf142ef3a2ed0bf321ee2be7afb0b7bdbffeb22904b79a9a447f342df0300468c87d1cbd91c7983faa8355d5d838e0fe49303e5f07dacd3a9afd25c828182d9b51e29bdb94578ef6d66fe107712ef36002dc11703cde1ec58d423a842644e830679a9d57ad1ea68bb4a9cc61baf259606b7defdfd148aea1cce1d300e03a80b1788cd071d91f64e1178c727852d89935592bd46000ab795f72cd247515157a14a1b65480146c7694b1f45275e90eb687cf37ab4bf42a7364a97049a4a6fa155ba8218bec925272dd9189f60d4844d9ccf2a9505fe3be5520029c"], 0x18) sendto$inet6(r0, &(0x7f0000000040)="02", 0x1, 0xc050, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) 16:52:15 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, 0x0, 0x0, 0x0) [ 406.281024][T13897] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 16:52:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000000)=""/27, 0x1b}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x2) 16:52:15 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x200000c7) 16:52:15 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x2e, 0x71], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 16:52:15 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) 16:52:15 executing program 5: socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x10000, @mcast1, 0x4}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000380), &(0x7f0000000340)=0xffa7) socket(0xa, 0x1, 0x0) socket(0x1000000010, 0x400000400080803, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000040)=0xfffffffffffffd52) r2 = socket(0x1e, 0x0, 0x0) bind$bt_rfcomm(r2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000000)={0xffffffffffff1e7a}, 0x10) write(0xffffffffffffffff, &(0x7f0000000040), 0x0) bind$xdp(0xffffffffffffffff, &(0x7f0000000300)={0x2c, 0x0, 0x0, 0x1d}, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000000)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'\x00', r1}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000080)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @remote, @mcast2, 0x0, 0x0, 0x0, 0x100}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000002c0)={@remote, 0x7e, r3}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000840)=ANY=[@ANYBLOB="0000002d940000000180c2000000b300ebff800000000800400000000001000000009078000000000000e407470db9eecb6c36db3ec4fac57f4de632f0aaeb3dc1e8850792b3a801409485314a707b8e4c9601006bba7e2fc494cdbe799d4dffda2c03569ffa000000ff090000002ce1a8509e19673f96763b5fa2a67d241a7790e05da9d81dee76c5c33ebe2d0177fec36be2db698389d94e7003465e24001f10fa0d659b2716a014c4bfac9b1cfe0d957e136c396c4534a7640d8413f9f8338aea007800"/210], 0x0) 16:52:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000000)=""/27, 0x1b}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x2) 16:52:15 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x200000c7) 16:52:16 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, 0x0, 0x0, 0x0) [ 407.063136][ T2674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge1: link becomes ready 16:52:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="2e0000003000815be00f80ecdb4cb904054865160800030014000000000004140e000a001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0) 16:52:16 executing program 0: r0 = socket$kcm(0x10, 0x400000002, 0x0) recvmsg$kcm(r0, &(0x7f0000001900)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="160000001a0081aee4050c00000f00fe078bc36f1600", 0x16}], 0x1}, 0x0) 16:52:16 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x200000c7) 16:52:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000000)=""/27, 0x1b}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x2) 16:52:16 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000), 0x0, 0x0) 16:52:16 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip_mr_cache\x00') r1 = socket(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f0000000080)=0x130, 0x33) 16:52:16 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x4400) io_setup(0x1ff, &(0x7f00000004c0)=0x0) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ftruncate(r4, 0x8200) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) 16:52:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) r1 = io_uring_setup(0x12d, &(0x7f0000000200)) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000000)=""/27, 0x1b}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x2) 16:52:16 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x200000c7) 16:52:17 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgid() socketpair$unix(0x1, 0x1, 0x0, 0x0) getgid() r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000080)={@local, @random="4ea35c9f13fc", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "083ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 16:52:17 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000), 0x0, 0x0) [ 408.263439][T13973] tpacket_rcv: packet too big, clamped from 64993 to 32624. macoff=96 16:52:17 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @multicast2}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r3}) sendto$inet6(r0, 0x0, 0x0, 0x8080, &(0x7f0000000240)={0xa, 0x4e1d, 0x1000, @initdev={0xfe, 0x88, [], 0x80, 0x0}, 0x5}, 0x1c) 16:52:17 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x200000c7) [ 408.294458][ T32] audit: type=1804 audit(1584031937.340:78): pid=13980 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir936082734/syzkaller.pklj4i/102/bus" dev="sda1" ino=16864 res=1 [ 408.378994][ T32] audit: type=1800 audit(1584031937.380:79): pid=13976 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="sda1" ino=16864 res=0 [ 408.401792][ T32] audit: type=1804 audit(1584031937.380:80): pid=13971 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir936082734/syzkaller.pklj4i/102/bus" dev="sda1" ino=16864 res=1 16:52:17 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = io_uring_setup(0x12d, &(0x7f0000000200)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000000)=""/27, 0x1b}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x2) 16:52:17 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)='w', 0x1}], 0x1, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r2, 0x0) splice(r0, 0x0, r1, 0x0, 0x101000000, 0x0) 16:52:17 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x6e) socket(0x2000000000000021, 0x2, 0x10000000000002) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) epoll_wait(r1, &(0x7f0000000000), 0x0, 0x0) 16:52:17 executing program 4: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x1, &(0x7f0000000180)=ANY=[@ANYRES32=0x41424344], 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit(0x0) 16:52:17 executing program 3: mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x200000c7) 16:52:18 executing program 5: 16:52:18 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = io_uring_setup(0x12d, &(0x7f0000000200)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000000)=""/27, 0x1b}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x2) 16:52:18 executing program 0: 16:52:18 executing program 1: 16:52:18 executing program 3: mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x200000c7) 16:52:18 executing program 4: 16:52:18 executing program 5: 16:52:18 executing program 0: 16:52:18 executing program 2: r0 = io_uring_setup(0x12d, &(0x7f0000000200)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000000)=""/27, 0x1b}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x2) 16:52:18 executing program 1: 16:52:18 executing program 3: mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x200000c7) 16:52:18 executing program 5: 16:52:18 executing program 4: 16:52:19 executing program 0: 16:52:19 executing program 1: 16:52:19 executing program 2: r0 = io_uring_setup(0x0, &(0x7f0000000200)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000000)=""/27, 0x1b}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x2) 16:52:19 executing program 3: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x200000c7) 16:52:19 executing program 4: 16:52:19 executing program 5: 16:52:19 executing program 1: 16:52:19 executing program 0: 16:52:19 executing program 2: r0 = io_uring_setup(0x0, &(0x7f0000000200)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000000)=""/27, 0x1b}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x2) 16:52:19 executing program 3: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x200000c7) 16:52:19 executing program 5: 16:52:20 executing program 0: 16:52:20 executing program 1: 16:52:20 executing program 4: 16:52:20 executing program 3: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x200000c7) 16:52:20 executing program 5: 16:52:20 executing program 2: r0 = io_uring_setup(0x0, &(0x7f0000000200)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000000)=""/27, 0x1b}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x2) 16:52:20 executing program 1: 16:52:20 executing program 0: 16:52:20 executing program 4: 16:52:20 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x200000c7) 16:52:20 executing program 5: 16:52:20 executing program 1: 16:52:20 executing program 0: 16:52:20 executing program 2: r0 = io_uring_setup(0x12d, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000000)=""/27, 0x1b}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x2) 16:52:21 executing program 4: 16:52:21 executing program 5: 16:52:21 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x200000c7) 16:52:21 executing program 1: 16:52:21 executing program 0: 16:52:21 executing program 2: r0 = io_uring_setup(0x12d, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000000)=""/27, 0x1b}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x2) 16:52:21 executing program 4: 16:52:21 executing program 5: 16:52:21 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x200000c7) 16:52:21 executing program 0: 16:52:21 executing program 1: 16:52:21 executing program 4: 16:52:22 executing program 2: r0 = io_uring_setup(0x12d, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000000)=""/27, 0x1b}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x2) 16:52:22 executing program 5: 16:52:22 executing program 0: 16:52:22 executing program 1: 16:52:22 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x200000c7) 16:52:22 executing program 2: io_uring_setup(0x12d, &(0x7f0000000200)) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000000)=""/27, 0x1b}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x2) 16:52:22 executing program 1: 16:52:22 executing program 0: 16:52:22 executing program 5: 16:52:22 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x200000c7) 16:52:22 executing program 4: 16:52:22 executing program 1: 16:52:22 executing program 5: 16:52:23 executing program 0: 16:52:23 executing program 4: 16:52:23 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x200000c7) 16:52:23 executing program 2: io_uring_setup(0x12d, &(0x7f0000000200)) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000000)=""/27, 0x1b}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x2) 16:52:23 executing program 4: 16:52:23 executing program 1: 16:52:23 executing program 5: 16:52:23 executing program 0: 16:52:23 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x200000c7) 16:52:23 executing program 5: 16:52:23 executing program 2: io_uring_setup(0x12d, &(0x7f0000000200)) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000000)=""/27, 0x1b}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x2) 16:52:23 executing program 1: 16:52:23 executing program 4: 16:52:23 executing program 0: 16:52:24 executing program 5: 16:52:24 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x200000c7) 16:52:24 executing program 1: 16:52:24 executing program 0: 16:52:24 executing program 2: r0 = io_uring_setup(0x12d, &(0x7f0000000200)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) 16:52:24 executing program 4: 16:52:24 executing program 5: 16:52:24 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x200000c7) 16:52:24 executing program 1: 16:52:24 executing program 0: 16:52:24 executing program 4: 16:52:24 executing program 2: r0 = io_uring_setup(0x12d, &(0x7f0000000200)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) 16:52:24 executing program 1: 16:52:25 executing program 5: 16:52:25 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x200000c7) 16:52:25 executing program 0: 16:52:25 executing program 4: 16:52:25 executing program 5: 16:52:25 executing program 1: 16:52:25 executing program 2: r0 = io_uring_setup(0x12d, &(0x7f0000000200)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) 16:52:25 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x200000c7) 16:52:25 executing program 0: 16:52:25 executing program 4: 16:52:25 executing program 5: 16:52:25 executing program 1: 16:52:26 executing program 0: 16:52:26 executing program 2: r0 = io_uring_setup(0x12d, &(0x7f0000000200)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000000)=""/27, 0x1b}], 0x1) 16:52:26 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x200000c7) 16:52:26 executing program 5: 16:52:26 executing program 4: 16:52:26 executing program 1: 16:52:26 executing program 0: 16:52:26 executing program 5: 16:52:26 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x200000c7) 16:52:26 executing program 2: r0 = io_uring_setup(0x12d, &(0x7f0000000200)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000000)=""/27, 0x1b}], 0x1) 16:52:26 executing program 4: 16:52:26 executing program 1: 16:52:27 executing program 0: 16:52:27 executing program 5: 16:52:27 executing program 4: 16:52:27 executing program 2: r0 = io_uring_setup(0x12d, &(0x7f0000000200)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000000)=""/27, 0x1b}], 0x1) 16:52:27 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x200000c7) 16:52:27 executing program 1: 16:52:27 executing program 0: 16:52:27 executing program 5: 16:52:27 executing program 4: 16:52:27 executing program 1: 16:52:27 executing program 2: r0 = io_uring_setup(0x12d, &(0x7f0000000200)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000000)=""/27, 0x1b}, {0x0}], 0x2) 16:52:27 executing program 0: 16:52:27 executing program 5: 16:52:27 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x200000c7) 16:52:28 executing program 4: 16:52:28 executing program 1: 16:52:28 executing program 0: 16:52:28 executing program 2: r0 = io_uring_setup(0x12d, &(0x7f0000000200)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000000)=""/27, 0x1b}, {0x0}], 0x2) 16:52:28 executing program 5: 16:52:28 executing program 4: 16:52:28 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x200000c7) 16:52:28 executing program 1: 16:52:28 executing program 5: 16:52:28 executing program 0: 16:52:28 executing program 2: r0 = io_uring_setup(0x12d, &(0x7f0000000200)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000000)=""/27, 0x1b}, {0x0}], 0x2) 16:52:28 executing program 4: 16:52:29 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x200000c7) 16:52:29 executing program 1: 16:52:29 executing program 0: 16:52:29 executing program 5: 16:52:29 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000004b00)=ANY=[@ANYBLOB="400000001400b59500000000000000000a400000", @ANYRES32, @ANYBLOB="1400020000000000000000000000e5ffac141400140006000000000006000000000013000000000029974b41432af9f86413ec097eb39fed67ba38fc0315f645b57e1f6e2d7c2d6b5ec4eabdcae0bbf42f5bb3e34fc84057fc33e9be67b945059867cd6fad645a60a87402f8bfa7066d63eb81c7121e02d71725504ba2319b9b1a22854890c61ec4f199e117ae24c2faf556ab9ee26b2fc3fab6a4a70a3085592a64a87cd358b7ea8690aca77b4b62fbb1e20ba3829f9993374570c073acc68255d6088386d5bdad30aa9d821c5a2887d1b21e7f82836a823e6ecea53aa7423f4e9580e99a0b775bc2fedf0081b7e736e094"], 0x40}}, 0x0) 16:52:29 executing program 2: r0 = io_uring_setup(0x12d, &(0x7f0000000200)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1) 16:52:29 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/diskstats\x00', 0x0, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 16:52:29 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'pids'}]}, 0x200000c7) 16:52:29 executing program 5: r0 = syz_open_procfs(0x0, 0xffffffffffffffff) openat(r0, &(0x7f00000005c0)='./file0\x00', 0x40, 0x0) 16:52:29 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:52:29 executing program 4: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 16:52:30 executing program 2: r0 = io_uring_setup(0x12d, &(0x7f0000000200)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1) 16:52:30 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) 16:52:30 executing program 5: r0 = syz_open_procfs(0x0, 0xffffffffffffffff) openat(r0, &(0x7f00000005c0)='./file0\x00', 0x40, 0x0) 16:52:30 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 421.368582][T14410] IPVS: ftp: loaded support on port[0] = 21 16:52:30 executing program 5: r0 = syz_open_procfs(0x0, 0xffffffffffffffff) openat(r0, &(0x7f00000005c0)='./file0\x00', 0x40, 0x0) 16:52:30 executing program 1: r0 = io_uring_setup(0xa4, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000200)=""/172, 0xac}], 0x1) 16:52:30 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) 16:52:30 executing program 2: r0 = io_uring_setup(0x12d, &(0x7f0000000200)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1) 16:52:31 executing program 5: r0 = syz_open_procfs(0x0, 0xffffffffffffffff) openat(r0, &(0x7f00000005c0)='./file0\x00', 0x40, 0x0) 16:52:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x5, 0x0) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$dri(0x0, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) kcmp(0x0, 0x0, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) fsopen(&(0x7f0000000200)='ceph\x00', 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000001540)=',ppp0!+-]\x00', 0x0, r2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) getpid() openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/mdstat\x00', 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(0xffffffffffffffff, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000400)='#em0\x00'}, 0x30) 16:52:31 executing program 2: r0 = io_uring_setup(0x12d, &(0x7f0000000200)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000023c0)=[{0x0}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x2) 16:52:31 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:52:31 executing program 5: openat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0x40, 0x0) 16:52:31 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) 16:52:31 executing program 2: r0 = io_uring_setup(0x12d, &(0x7f0000000200)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000023c0)=[{0x0}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x2) [ 422.845375][ T1470] tipc: TX() has been purged, node left! 16:52:32 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x90760100000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:52:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000f00)={&(0x7f0000001800)=@ipv6_delroute={0x1c, 0x19, 0xa11, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}}, 0x1c}}, 0x0) 16:52:32 executing program 5: openat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0x40, 0x0) 16:52:32 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0), 0x0) 16:52:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) accept4(0xffffffffffffffff, &(0x7f0000000480)=@isdn, 0x0, 0x0) r1 = socket(0x0, 0x0, 0x0) connect$tipc(r1, 0x0, 0x0) sendmsg(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r4) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000000)={r6}, 0x8) ioctl$KVM_IRQ_LINE_STATUS(r4, 0xc008ae67, &(0x7f0000000000)={0x9, 0xfffffff8}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r7, 0x200004) sendfile(r2, r7, 0x0, 0x80001d00c0d0) 16:52:32 executing program 2: r0 = io_uring_setup(0x12d, &(0x7f0000000200)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000023c0)=[{0x0}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x2) 16:52:32 executing program 5: openat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0x40, 0x0) 16:52:33 executing program 2: add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000940)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/arp\x00') preadv(r4, 0x0, 0x0, 0x10400003) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000440)={{{@in6, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@local}}, 0x0) stat(&(0x7f0000000ac0)='\x00', 0x0) setresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) getpid() r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r5, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x10, r5, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) bind$packet(r7, &(0x7f0000000140)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmmsg(r7, &(0x7f0000009e80)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="b3967e3cde6f83925f1e22d1670b", 0xe}], 0x1}}], 0x1, 0x0) r9 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r9, 0x107, 0x14, &(0x7f0000000000)=0xfc, 0x4) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) bind$packet(r9, &(0x7f0000000140)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmmsg(r9, &(0x7f0000009e80)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="b3967e3cde6f83925f1e22d1670b", 0xe}], 0x1}}], 0x1, 0x0) fcntl$setpipe(r9, 0x407, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000180)=ANY=[@ANYRES32=r5, @ANYBLOB="7b7334a20f51a48186ad2238437fd0bc05773e2224", @ANYRES16, @ANYRESOCT=r6, @ANYPTR64=&(0x7f0000000240)=ANY=[@ANYPTR], @ANYBLOB, @ANYPTR64, @ANYRES32, @ANYRESOCT], 0x9, 0x3) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r11 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r11, 0x4, 0x6100) write$cgroup_type(r11, &(0x7f0000000200)='threaded\x00', 0x175d900f) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x0) 16:52:33 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0), 0x0) 16:52:33 executing program 1: r0 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x2081ff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) r4 = syz_open_dev$ttys(0xc, 0x2, 0x1) r5 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) ioprio_get$uid(0x0, r6) fsetxattr$security_capability(r4, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x7}, {0x8c, 0x7f}], r6}, 0x18, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x58}, 0x840) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x80800) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7bf63282530360d2}) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r7 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r7, 0x0, 0x80001d00c0d0) r8 = socket$inet6(0xa, 0x6, 0x3) r9 = syz_open_procfs(0x0, &(0x7f00000004c0)='mountstats\x00') sendfile(r8, r9, &(0x7f0000000240)=0xccb2, 0x8) getsockopt$EBT_SO_GET_INFO(r9, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000300)=0x78) 16:52:33 executing program 5: syz_open_procfs(0x0, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0x40, 0x0) 16:52:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r2, &(0x7f0000001300), 0x266, 0xf7c7ac320226deca) dup(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000580)) recvfrom(r1, &(0x7f0000000140)=""/163, 0x100000345, 0x0, 0x0, 0x0) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) recvfrom(r1, &(0x7f0000003240)=""/4096, 0x100000205, 0x0, 0x0, 0x415) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYRES64], 0x1}}, 0x0) [ 424.661456][ T32] audit: type=1804 audit(1584031953.700:81): pid=14512 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir249689744/syzkaller.HPKBsH/141/bus" dev="sda1" ino=16961 res=1 16:52:33 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0), 0x0) [ 424.796660][ T32] audit: type=1800 audit(1584031953.830:82): pid=14514 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16962 res=0 16:52:34 executing program 5: syz_open_procfs(0x0, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0x40, 0x0) [ 424.932306][ T32] audit: type=1804 audit(1584031953.920:83): pid=14524 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir249689744/syzkaller.HPKBsH/141/bus" dev="sda1" ino=16961 res=1 16:52:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) accept4(0xffffffffffffffff, &(0x7f0000000480)=@isdn, 0x0, 0x0) r1 = socket(0x0, 0x0, 0x0) connect$tipc(r1, 0x0, 0x0) sendmsg(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r4) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000000)={r6}, 0x8) ioctl$KVM_IRQ_LINE_STATUS(r4, 0xc008ae67, &(0x7f0000000000)={0x9, 0xfffffff8}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r7, 0x200004) sendfile(r2, r7, 0x0, 0x80001d00c0d0) 16:52:34 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000), 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 16:52:34 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x405c5503, &(0x7f0000000040)={{0xfffe}, 'syz0\x00', 0x56}) ioctl$UI_DEV_CREATE(r4, 0x5501) write(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, r4) open(0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x10000fc) 16:52:34 executing program 5: syz_open_procfs(0x0, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0x40, 0x0) 16:52:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x3a, 0x1, 0x0, 0x24) [ 425.885331][T14551] input: syz0 as /devices/virtual/input/input13 16:52:35 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0) 16:52:35 executing program 5: r0 = syz_open_procfs(0x0, 0xffffffffffffffff) openat(r0, 0x0, 0x40, 0x0) [ 426.620085][T14567] input: syz0 as /devices/virtual/input/input14 [ 427.125580][ T32] audit: type=1804 audit(1584031956.170:84): pid=14520 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir249689744/syzkaller.HPKBsH/141/bus" dev="sda1" ino=16961 res=1 [ 427.167087][ T32] audit: type=1804 audit(1584031956.210:85): pid=14524 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir249689744/syzkaller.HPKBsH/141/bus" dev="sda1" ino=16961 res=1 16:52:36 executing program 5: r0 = syz_open_procfs(0x0, 0xffffffffffffffff) openat(r0, 0x0, 0x40, 0x0) 16:52:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=@newtaction={0x50, 0x30, 0x1, 0x0, 0x0, {}, [{0x3c, 0x1, [@m_skbedit={0x38, 0x1, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18, 0x2, {0x0, 0x0, 0x49020000}}, @TCA_SKBEDIT_MARK={0x8}]}, {0x4}}}]}]}, 0x50}}, 0x0) 16:52:36 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[]], 0x8) setrlimit(0x7, &(0x7f0000000180)) close(r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:52:36 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r2 = socket(0x2, 0x803, 0xff) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) 16:52:36 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x24c201, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000180)="d3da66b9800000c00f326635000800000f3066b9800000c00f326635008000000f302ef081360000009866b9800000c00f326635002000000f3066b9010b00000f320f001566b9800000c00f326635000800000f30baf80c66b84de17d8a66efbafc0cec0f01c2", 0x67}], 0x1, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x1, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$VHOST_GET_FEATURES(0xffffffffffffffff, 0x8008af00, 0x0) getpgrp(0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, &(0x7f00000004c0)={0x8, 0x0, [{0x80000008, 0x0, 0x0, 0xb3bb, 0xfb8a}, {0x0, 0x0, 0xfe5}, {0x1, 0x1, 0x6, 0x9, 0x1}, {0x80000000, 0x0, 0xfffffffd}, {0xc0000000, 0x3, 0x9, 0x1, 0x2}, {0xa, 0xff, 0x0, 0x0, 0x6}, {0x7, 0xe0a, 0x80f, 0x92a, 0x9}, {0x0, 0x200, 0xfff}]}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) fchmod(0xffffffffffffffff, 0xa) r6 = socket$inet(0x10, 0x2, 0x0) sendmsg(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000130007351dfffd946f6105000a2800091f0000072428080008001e4004000300", 0x24}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:52:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2a0) 16:52:36 executing program 5: r0 = syz_open_procfs(0x0, 0xffffffffffffffff) openat(r0, 0x0, 0x40, 0x0) 16:52:36 executing program 0: 16:52:36 executing program 4: 16:52:36 executing program 2: 16:52:37 executing program 5: r0 = syz_open_procfs(0x0, 0xffffffffffffffff) openat(r0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0) [ 428.054988][ T32] audit: type=1804 audit(1584031957.100:86): pid=14607 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir249689744/syzkaller.HPKBsH/142/bus" dev="sda1" ino=16979 res=1 16:52:37 executing program 0: 16:52:37 executing program 3: 16:52:37 executing program 2: 16:52:37 executing program 4: [ 428.754400][ T32] audit: type=1804 audit(1584031957.800:87): pid=14621 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir249689744/syzkaller.HPKBsH/142/bus" dev="sda1" ino=16979 res=1 16:52:37 executing program 1: 16:52:37 executing program 5: r0 = syz_open_procfs(0x0, 0xffffffffffffffff) openat(r0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0) 16:52:37 executing program 0: 16:52:37 executing program 3: 16:52:37 executing program 4: 16:52:37 executing program 2: 16:52:38 executing program 0: 16:52:38 executing program 3: 16:52:38 executing program 4: 16:52:38 executing program 5: r0 = syz_open_procfs(0x0, 0xffffffffffffffff) openat(r0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0) 16:52:38 executing program 2: 16:52:38 executing program 1: 16:52:38 executing program 3: 16:52:38 executing program 0: 16:52:38 executing program 2: 16:52:38 executing program 4: 16:52:38 executing program 5: 16:52:39 executing program 1: 16:52:39 executing program 0: 16:52:39 executing program 2: 16:52:39 executing program 3: 16:52:39 executing program 4: 16:52:39 executing program 5: 16:52:39 executing program 1: 16:52:39 executing program 0: 16:52:39 executing program 2: 16:52:39 executing program 4: 16:52:39 executing program 3: 16:52:39 executing program 5: 16:52:39 executing program 1: 16:52:40 executing program 0: 16:52:40 executing program 2: 16:52:40 executing program 4: 16:52:40 executing program 3: 16:52:40 executing program 5: 16:52:40 executing program 1: 16:52:40 executing program 2: 16:52:40 executing program 4: 16:52:40 executing program 3: 16:52:40 executing program 0: 16:52:40 executing program 5: 16:52:40 executing program 2: 16:52:40 executing program 1: 16:52:40 executing program 3: 16:52:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000000c0), 0x0, &(0x7f0000000000)={0x0, 0x1c9c380}, 0x8) 16:52:41 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffe58) fallocate(r0, 0x0, 0x0, 0x8000) 16:52:41 executing program 5: socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="ddffffbfffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab49d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b2d1d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317de78cdb2817ab63d36fe439c6479605528726a068cdc76a22067b3534442da88bc00000100000000000000000000f6a0d766"], 0x34}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0xfffffffd, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) 16:52:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000500)=@newtfilter={0x24, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 16:52:41 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x41}}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x1) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 16:52:41 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0xfffffffd, 0x5, 0x2, 0x4}, 0x0) socket$inet6(0xa, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000000), 0x0, 0x0) r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r4) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f0000000100)=[0x289, 0x81]) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000), 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x3, 0x7) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000340)={{{@in=@empty, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@empty, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r6, &(0x7f0000000480), 0x2e9, 0x0) 16:52:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r0, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0}) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000280)="a7", 0x1, 0xffffffffffffffff) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)="a7", 0x1, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, r2, 0xffffffffffffffff, r3, 0x0) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r3) keyctl$KEYCTL_MOVE(0x1e, r1, 0xffffffffffffffff, r4, 0x0) keyctl$assume_authority(0x10, r4) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{0x0}], 0x1, 0x0) timer_create(0x8, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000000040)) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x141000, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f00000002c0)={0x1, 0x0, 0xa, 0xf, 0x184, &(0x7f0000000c40)}) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x20a) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r6, 0x10, 0x0, 0x8020001) open(0x0, 0x700481, 0x33) r7 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r8 = socket(0x10, 0x3, 0x0) getsockopt$SO_BINDTODEVICE(r8, 0x1, 0x7, &(0x7f0000000000), 0x20a154cc) r9 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r9, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r7, 0xc028660f, &(0x7f0000000200)={0x0, r9, 0x8020}) creat(&(0x7f0000000240)='./file0\x00', 0x80) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 432.747997][T14722] device bridge1 entered promiscuous mode [ 432.834812][T14731] FAT-fs (loop3): bogus number of reserved sectors [ 432.841560][T14731] FAT-fs (loop3): Can't find a valid FAT filesystem 16:52:42 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000aa22aaaaaaaa86dd60451a7c00302b00fefe8000000000000000000000000000aa0300907800000000602e547300020000ff020000000000000000000000000001fe80000000000000000000000000000000000000000000000000000000000049be7a35ed775f5df819f9111a07851e8dc497b6463bd7ee44a92150000b67d714e35cf1a1307600611007018e1d58f2cb81490b9337a44d5f3ae57c7a1c5c89bcdb9e7ed857571df8c3f3ea021f47f1d73c05635de5c2c075d03ef31481814775f0ef5449dea2fed82568f0241f71a5ec3c0f00"/230], 0x0) [ 432.984801][T14722] device bridge_slave_0 left promiscuous mode [ 432.992232][T14722] bridge0: port 1(bridge_slave_0) entered disabled state 16:52:42 executing program 5: socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r3, @ANYBLOB="ddffffbfffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab49d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b2d1d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317de78cdb2817ab63d36fe439c6479605528726a068cdc76a22067b3534442da88bc00000100000000000000000000f6a0d766"], 0x34}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0xfffffffd, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) 16:52:42 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xc, &(0x7f0000000440)=0x1, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080), 0x10) 16:52:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 16:52:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r0, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0}) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000280)="a7", 0x1, 0xffffffffffffffff) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)="a7", 0x1, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, r2, 0xffffffffffffffff, r3, 0x0) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r3) keyctl$KEYCTL_MOVE(0x1e, r1, 0xffffffffffffffff, r4, 0x0) keyctl$assume_authority(0x10, r4) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{0x0}], 0x1, 0x0) timer_create(0x8, &(0x7f00000001c0)={0x0, 0x0, 0x4}, &(0x7f0000000040)) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x141000, 0x0) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f00000002c0)={0x1, 0x0, 0xa, 0xf, 0x184, &(0x7f0000000c40)}) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x20a) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r6, 0x10, 0x0, 0x8020001) open(0x0, 0x700481, 0x33) r7 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r8 = socket(0x10, 0x3, 0x0) getsockopt$SO_BINDTODEVICE(r8, 0x1, 0x7, &(0x7f0000000000), 0x20a154cc) r9 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r9, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r7, 0xc028660f, &(0x7f0000000200)={0x0, r9, 0x8020}) creat(&(0x7f0000000240)='./file0\x00', 0x80) creat(&(0x7f0000000040)='./bus\x00', 0x0) 16:52:42 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) [ 433.879112][T14751] device bridge2 entered promiscuous mode 16:52:43 executing program 2: creat(&(0x7f000002bff8)='./file0\x00', 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, 0x0) 16:52:43 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clock_nanosleep(0x2, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) 16:52:43 executing program 0: bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) [ 434.440228][T14770] EXT4-fs (sda1): re-mounted. Opts: [ 434.455814][T14772] ptrace attach of "/root/syz-executor.3"[14771] was attempted by "/root/syz-executor.3"[14772] [ 434.646974][T14775] EXT4-fs (sda1): re-mounted. Opts: 16:52:43 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syncfs(r0) timer_delete(0x0) 16:52:43 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000012c0)='\f', 0x1, 0x11, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x7, 0x0) 16:52:43 executing program 4: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2, 0x6, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 16:52:43 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="0201a6ffffff0a000000ff45ac0000ffffff81000800000000000000004000ffffff81000000e100000088770072003007006300000000000000008000da55aa", 0x40, 0x1c0}]) 16:52:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$random(0xffffffffffffff9c, &(0x7f0000000280)='/dev/urandom\x00', 0x2040, 0x0) sendmmsg(r0, &(0x7f0000005600)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002400)=ANY=[]}}, {{0x0, 0x0, &(0x7f0000005400)=[{&(0x7f0000003fc0)}, {0x0}, {&(0x7f0000005280)="e563635b45a19e98a0c8ffc60434cd87dcc910cba67b32198de65cc359bb7e1406cff34b37e86e8e83e28ed7fddbd68d68d3958ed9f43feba4d89d15f802d7cf4a28d7a3be10844e4c8d2d8d465c1506f0b83745e44b993b833a67e603be1cc73016bdc3bf69fcca34f81cd6aac94dd1efc0fc85da58254885c39cfe7d32bcbe44b6d71c53ce06e3f8938f4830b87b6b748d12c8dc721079a6952f35ef66cb16c83998fcb6b33bc4f0fe6bab46470b3fd84a09d81485d6e1712b70f414ccd572bd47e060d06994e7b5231ca668cd6eec7de2f7274ca6e8889bc35fbe", 0xdc}, {&(0x7f0000005380)="77aa7567ac346b1787edec90b6f26e410e21b1d333718f395693dc93d2002901850baba9eb844ae5ee6404a5501cc78435aa0c22f1408b99f19d9a4bce50258f2974e1376834cb34ac08dee034", 0x4d}], 0x4}}], 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) sendmsg$inet6(r1, &(0x7f0000001840)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c, 0x0}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_dev$sndtimer(0x0, 0x0, 0x0) r2 = memfd_create(0x0, 0x0) r3 = creat(0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000003940)={&(0x7f0000003a00)=@sco={0x1f, @none}, 0x80, &(0x7f0000006a40)=[{0x0}, {&(0x7f00000058c0)="1c4088cdfe7c9c0d4cac1d1628c97833b1af91b06b2a0366b4c280bfe482811769d5a848dd7f292a245642f98de7cb332490e17f1872eb06648f486a55a43be813e863d7b59158c5c8c13520868462827465fe745e49caeaff7871356b12a8def2612f2ade8ede5c53c06e5a35", 0x6d}], 0x2}, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) read$eventfd(r3, 0x0, 0x0) setsockopt$sock_void(r1, 0x1, 0x24, 0x0, 0x0) fallocate(r2, 0x0, 0xfa9, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000080)) r4 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r5 = msgget$private(0x0, 0x204) msgctl$IPC_STAT(r5, 0x2, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r6, 0x0, 0x8810) r7 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000000480)=""/4096) r8 = dup(r7) setsockopt$inet6_tcp_int(r8, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r7, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r7, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100), 0x2}, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x800fe) sendfile(r8, r9, 0x0, 0x8000fffffffe) [ 435.094531][T14792] loop3: p1 p2 p3 p4 [ 435.098751][T14792] loop3: partition table partially beyond EOD, truncated [ 435.106622][T14792] loop3: p1 start 10 is beyond EOD, truncated [ 435.113237][T14792] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 435.133249][T14792] loop3: p3 start 225 is beyond EOD, truncated [ 435.139942][T14792] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 435.218449][T14796] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 16:52:44 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) eventfd(0x0) [ 435.372792][T14792] loop3: p1 p2 p3 p4 [ 435.377105][T14792] loop3: partition table partially beyond EOD, truncated [ 435.385071][T14792] loop3: p1 start 10 is beyond EOD, truncated [ 435.391222][T14792] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 435.414070][T14792] loop3: p3 start 225 is beyond EOD, truncated [ 435.421047][T14792] loop3: p4 size 3657465856 extends beyond EOD, truncated 16:52:44 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) pivot_root(0x0, 0x0) 16:52:44 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) setitimer(0x0, 0x0, 0x0) 16:52:45 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 16:52:45 executing program 4: [ 436.699884][T14942] syz-executor.2 calls setitimer() with new_value NULL pointer. Misfeature support will be removed 16:52:46 executing program 0: 16:52:46 executing program 4: 16:52:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x3f) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000a80)=@newtfilter={0x44, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0x10}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x14, 0x2, [@TCA_BASIC_EMATCHES={0x10, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xf78e}}, @TCA_EMATCH_TREE_LIST={0x4}]}]}}]}, 0x44}}, 0x0) 16:52:47 executing program 4: 16:52:47 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000340)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) 16:52:47 executing program 3: 16:52:47 executing program 5: 16:52:47 executing program 2: 16:52:47 executing program 4: 16:52:47 executing program 0: 16:52:47 executing program 3: 16:52:47 executing program 2: 16:52:47 executing program 5: 16:52:47 executing program 1: 16:52:47 executing program 4: 16:52:47 executing program 0: 16:52:47 executing program 3: 16:52:48 executing program 1: 16:52:48 executing program 5: 16:52:48 executing program 2: 16:52:48 executing program 4: 16:52:48 executing program 0: 16:52:48 executing program 3: 16:52:48 executing program 2: 16:52:48 executing program 1: 16:52:48 executing program 5: 16:52:48 executing program 4: 16:52:48 executing program 3: 16:52:48 executing program 0: 16:52:49 executing program 1: 16:52:49 executing program 5: 16:52:49 executing program 2: 16:52:49 executing program 3: 16:52:49 executing program 4: 16:52:49 executing program 0: 16:52:49 executing program 1: 16:52:49 executing program 5: 16:52:49 executing program 2: 16:52:49 executing program 4: 16:52:49 executing program 3: 16:52:49 executing program 0: 16:52:49 executing program 1: r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xb5fdc948ee8456b6, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r3 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r0, r3, 0x0, 0x8000fffffffe) 16:52:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1000000000022, &(0x7f0000000080)=0x1, 0x4) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000002980)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000200)="90", 0x1}], 0x1}}], 0x1, 0x24044075) 16:52:50 executing program 2: 16:52:50 executing program 3: 16:52:50 executing program 0: 16:52:50 executing program 4: 16:52:50 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x58) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4802, 0x0) [ 441.544282][ T32] audit: type=1800 audit(1584031970.590:88): pid=15086 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=16530 res=0 16:52:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000040)=@fragment, 0x8) add_key$user(&(0x7f0000000680)='user\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000580)="b3", 0x1, 0xffffffffffffffff) r2 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, 0x0, 0x0) pipe2(0x0, 0x80000) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r3, 0xc05812fe, 0x0) getegid() keyctl$chown(0x4, r2, 0x0, 0x0) sendmmsg(r1, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0, 0x0, 0x0, 0x0, 0x106}}], 0x400000000000107, 0x0) 16:52:50 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="03000000000000009d6c10119e06d85f02635d2c7a4299e22153d32132f88a181ee9589df63eaf3050b9568e6bb20639e2d01f2dfdc87c8ea92815b757dc7d65fd046d533368df3fef8c000000002e880e95e3d4b3bee88664e8fdafbfab3e18d3e924d36671e0d9625cc57a50caddc2cc0ca4f70f842cd6e1aa504f02782c3c35a79d9c3971b4b086b07641d9a7b29452505efb1fe4a04b7bb29e068a0000000000000000000000000000000000000000000000000000a4c73cdb32823b297c5dbcb8672b40ad16e36163fbea462dd5527db8eee997b5ef860abd3d4a0638322b2e3cd8f213e3115b020400000326eb88f1d55f9c2d3b9e8bc67bbd3f9797bcd87925312f33d960c672df7178a5f619bffe7100d62973c91d91d4e7adc729d5bd3262c0325a81f3d8487b21b90da25eabe755173329b53c11cb32952dfd17ed87020f79d750d8f936a965d497c6dad922e6618172c21ae6c52637d8628020662f7049248fe016715b46937c444eeecfa0"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 16:52:50 executing program 0: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=""/222, 0xde}, 0x5}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) 16:52:50 executing program 4: perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000003c0)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x7fff, 0x0, [{}, {}, {}, {}, {}, {}, {0x6}, {}, {0x0, 0x8}]}}) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') socket$vsock_stream(0x28, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) ftruncate(0xffffffffffffffff, 0x10099b7) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in6=@empty, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, 0x0) socket(0x10, 0x803, 0x0) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x40) 16:52:50 executing program 1: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002680)=[{{0x0, 0x0, &(0x7f0000000400)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) [ 442.095592][T15115] Unknown ioctl 21508 16:52:51 executing program 3: write$evdev(0xffffffffffffffff, &(0x7f0000000480)=[{{0x77359400}, 0x12, 0x9}], 0x10) r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f0000000000)=[{{0x77359400}}], 0x7200) 16:52:51 executing program 0: dup(0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f00000000c0)="0f20d86635200000000f22d826d33566b91109000066b80060000066ba000000000f306766c74424000d0000006766c7442402f60000006766c744240600000000670f0114246766c74424003f8c00006766c7442402e4d400006766c744240600000000670f011424650f01c8b8dd000f00d80f21f30f01c3ddc3", 0x7b}], 0x1, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x38, 0x0, 0x10, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x6}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x8}, @NBD_ATTR_TIMEOUT={0xc}]}, 0x38}}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:52:51 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000040)=@fragment, 0x8) pipe2(0x0, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, 0x0, 0x0) creat(0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000100)) getegid() keyctl$chown(0x4, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0, 0x0, 0x0, 0x0, 0x106}}], 0x400000000000107, 0x0) [ 442.634555][T15108] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 442.684753][T15108] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 442.694857][T15108] EXT4-fs (loop2): group descriptors corrupted! [ 442.709516][T15115] Unknown ioctl 21508 16:52:51 executing program 4: tkill(0x0, 0x0) r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000040)=@fragment, 0x8) add_key$user(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc05812fe, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) getegid() keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) add_key$user(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0, 0x0, 0x0, 0x0, 0x106}}], 0x400000000000107, 0x0) 16:52:52 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xa0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000700)=@newtaction={0x48, 0x30, 0x1, 0x0, 0x0, {}, [{0x34, 0x1, [@m_gact={0x30, 0x1, 0x0, 0x0, {{0x9, 0x1, 'gact\x00'}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18}]}, {0x4}}}]}]}, 0x48}}, 0x0) 16:52:52 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x11, &(0x7f0000000180)={@local}, 0x20) 16:52:52 executing program 2: rt_sigprocmask(0x0, &(0x7f000078b000)={[0xfffffffffffffffa]}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000200), 0x0) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x989680}, &(0x7f0000000080)={&(0x7f0000000040), 0x8}) 16:52:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x1) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000009002000000070000c800000060010000c8000000c8000080f8010000f8010000f8010000f8010000f80100000400000000000000000000000000000000e07500eeff0000000000010000000000000000000000000000000000000000000000000000000000000000eb000000000000000003000000000000000200000000000000000000000000000000000000000000a000c8000000000000000000000000000000000000000000300061646472747970650000"], 0x1) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000600)={@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x14) syz_genetlink_get_family_id$tipc(0x0) 16:52:52 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="03000000000000009d6c10119e06d85f02635d2c7a4299e22153d32132f88a181ee9589df63eaf3050b9568e6bb20639e2d01f2dfdc87c8ea92815b757dc7d65fd046d533368df3fef8c000000002e880e95e3d4b3bee88664e8fdafbfab3e18d3e924d36671e0d9625cc57a50caddc2cc0ca4f70f842cd6e1aa504f02782c3c35a79d9c3971b4b086b07641d9a7b29452505efb1fe4a04b7bb29e068a0000000000000000000000000000000000000000000000000000a4c73cdb32823b297c5dbcb8672b40ad16e36163fbea462dd5527db8eee997b5ef860abd3d4a0638322b2e3cd8f213e3115b020400000326eb88f1d55f9c2d3b9e8bc67bbd3f9797bcd87925312f33d960c672df7178a5f619bffe7100d62973c91d91d4e7adc729d5bd3262c0325a81f3d8487b21b90da25eabe755173329b53c11cb32952dfd17ed87020f79d750d8f936a965d497c6dad922e6618172c21ae6c52637d8628020662f7049248fe016715b46937c444eeecfa0"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 16:52:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a0000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000527c6c0093bf4819510dc5538b660000000000000000000000000000000000000000000000000000000000000000000000000000000000560000000000000000000000000000002ab9908f5e1ec43daa2db1cde6b344486c8970a8422921e423c65f70ce77af589f9fa0b5af3a42012fd1b8f120d20d8beaec5470a3e12aa86ec69bcd5ec2afe30731afaee5ef9d43f6703e62f77f694b"], 0x4}}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x38, 0x0, 0x0) 16:52:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x80002, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000527c6c0093bf4819510dc5538b660000000000000000000000000000000000000000000000000000000000000000000000000000000000560000000000000000000000000000002ab9908f5e1ec43daa2db1cde6b344486c8970a8422921e423c65f70ce77af"], 0x4}}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x30, &(0x7f00000013c0)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, 0x200014a8) [ 443.904365][T15176] Unknown ioctl 21508 16:52:53 executing program 2: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) pread64(r1, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) dup2(r2, r1) 16:52:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd23e793e6e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09c0180b89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e08580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db18dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b777a6f941ba359c46bf277811a07748aa6147edda46525e536d056847d9c00724ccfa99221c9b10f530749ff179657570a19d74527643e2e2b632fffbbb337eeeceb7fd1e5dd2e32e673ccc8b30c040000004dbd9542e6c49e87df53b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79018b0bd7348e4ec6747c58a9bb2479590df27190c1aee60272677e3c000000"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000007c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/fuse\x00', 0x2, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) 16:52:53 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x6, &(0x7f00000013c0)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, 0x200014a8) 16:52:53 executing program 1: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_VERDICT(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x14, 0x1, 0x3, 0x801}, 0x14}}, 0x0) 16:52:53 executing program 4: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x0, 0x0, 0x0) r1 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x0, 0x0, 0x0) dup2(r0, r1) 16:52:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000001680)=ANY=[@ANYBLOB="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"], 0x1) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="ff4e34443227c5d388144f479d005aff"}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') sendfile(r3, r4, 0x0, 0xa808) 16:52:53 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 16:52:54 executing program 1: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x50, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x50}}, 0x0) 16:52:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x2a7) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x20) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 445.287796][T15218] Unknown ioctl 21508 16:52:54 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x80, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCDELRT(r2, 0x890b, &(0x7f0000000040)={0x0, @in={0x2, 0x0, @broadcast=0x1e}, @in={0x2, 0x0, @dev}, @sco, 0x5e}) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000380)=[{{&(0x7f0000000000)=@isdn={0x22, 0x3, 0x2, 0x1, 0xfe}, 0x80, 0x0}}], 0x1, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0xfe, "00000000000000000000000000ddc1517600"}) r4 = syz_open_pts(r3, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000200)=0x2) read(0xffffffffffffffff, 0x0, 0xfffffffffffffe0b) r5 = dup2(r1, r4) dup3(r4, r3, 0x0) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000000)) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') socket$netlink(0x10, 0x3, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') connect$inet6(0xffffffffffffffff, 0x0, 0x0) fcntl$getownex(r5, 0x10, &(0x7f0000000280)={0x0, 0x0}) r7 = syz_open_procfs(r6, &(0x7f00000001c0)='net/udp\x00') r8 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r8, &(0x7f0000003b40)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) setsockopt$sock_int(r7, 0x1, 0x2e, &(0x7f0000000000)=0x100, 0x4) shutdown(r8, 0x0) sendfile(0xffffffffffffffff, r7, 0x0, 0x0) r9 = dup2(r0, 0xffffffffffffffff) ioctl$BLKBSZSET(r9, 0x40081271, &(0x7f0000000100)=0x3) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3000005, 0x40010, 0xffffffffffffffff, 0x1cdb6000) 16:52:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x47f) connect$inet(r0, &(0x7f0000000180), 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000040)=0xffffffffffffffff, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0xfffffffd, 0x7fff, 0x80000001}, 0x14) shutdown(r0, 0x2) 16:52:54 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x80, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x0, 0x2, 0x0) ioctl$sock_SIOCDELRT(r2, 0x890b, &(0x7f0000000040)={0x0, @in={0x2, 0x0, @broadcast=0x1e}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2}}, @sco, 0x5e}) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000380)=[{{&(0x7f0000000000)=@isdn={0x22, 0x3, 0x2, 0x1, 0xfe}, 0x80, 0x0}}], 0x1, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0xfe, "00000000000000000000000000ddc1517600"}) r4 = syz_open_pts(r3, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000200)=0x2) read(0xffffffffffffffff, 0x0, 0xfffffffffffffe0b) r5 = dup2(r1, r4) dup3(r4, r3, 0x0) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000000)) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') socket$netlink(0x10, 0x3, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') connect$inet6(0xffffffffffffffff, 0x0, 0x0) fcntl$getownex(r5, 0x10, &(0x7f0000000280)={0x0, 0x0}) r7 = syz_open_procfs(r6, &(0x7f00000001c0)='net/udp\x00') r8 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003b40)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) shutdown(r8, 0x0) dup2(r8, r4) sendfile(0xffffffffffffffff, r7, 0x0, 0x0) r9 = dup2(r0, 0xffffffffffffffff) ioctl$BLKBSZSET(r9, 0x40081271, &(0x7f0000000100)=0x3) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3000005, 0x40010, 0xffffffffffffffff, 0x1cdb6000) 16:52:54 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="03000000000000009d6c10119e06d85f02635d2c7a4299e22153d32132f88a181ee9589df63eaf3050b9568e6bb20639e2d01f2dfdc87c8ea92815b757dc7d65fd046d533368df3fef8c000000002e880e95e3d4b3bee88664e8fdafbfab3e18d3e924d36671e0d9625cc57a50caddc2cc0ca4f70f842cd6e1aa504f02782c3c35a79d9c3971b4b086b07641d9a7b29452505efb1fe4a04b7bb29e068a0000000000000000000000000000000000000000000000000000a4c73cdb32823b297c5dbcb8672b40ad16e36163fbea462dd5527db8eee997b5ef860abd3d4a0638322b2e3cd8f213e3115b020400000326eb88f1d55f9c2d3b9e8bc67bbd3f9797bcd87925312f33d960c672df7178a5f619bffe7100d62973c91d91d4e7adc729d5bd3262c0325a81f3d8487b21b90da25eabe755173329b53c11cb32952dfd17ed87020f79d750d8f936a965d497c6dad922e6618172c21ae6c52637d8628020662f7049248fe016715b46937c444eeecfa0"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 16:52:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f00000003c0)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000fdff00000000000000000000000000000000000000000000000000527c6c0093bf4819510dc5538b6600000000000000000000000000000000000000000000000000000000000000000000000000560000000000000000000000000000002ab9908f5e1ec43daa2db1cde6b344486c8970a8422921e423c65f70ce77af589f9fa0b5af3a42012fd1b8f120d20d8beaec5470a3e12aa86ec69bcd5ec2afe30731afaee5ef9d43f6703e62f77f69"], 0x3}}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x30, &(0x7f00000013c0)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) 16:52:55 executing program 1: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x50, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x50}}, 0x0) 16:52:55 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x80, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCDELRT(r2, 0x890b, &(0x7f0000000040)={0x0, @in={0x2, 0x0, @broadcast=0x1e}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2}}, @sco, 0x5e}) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000380)=[{{&(0x7f0000000000)=@isdn={0x22, 0x3, 0x2, 0x1, 0xfe}, 0x80, 0x0}}], 0x1, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0xfe, "00000000000000000000000000ddc1517600"}) r4 = syz_open_pts(r3, 0x0) read(0xffffffffffffffff, 0x0, 0xfffffffffffffe0b) r5 = dup2(r1, r4) dup3(r4, r3, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') socket$netlink(0x10, 0x3, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') fcntl$getownex(r5, 0x10, &(0x7f0000000280)) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000003b40)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2e, &(0x7f0000000000)=0x100, 0x4) shutdown(r6, 0x0) dup2(r6, r4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r7 = dup2(r0, 0xffffffffffffffff) ioctl$BLKBSZSET(r7, 0x40081271, &(0x7f0000000100)=0x3) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3000005, 0x40010, 0xffffffffffffffff, 0x1cdb6000) [ 446.211424][T15256] Unknown ioctl 21508 16:52:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) 16:52:55 executing program 1: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x50, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x50}}, 0x0) 16:52:56 executing program 3: 16:52:56 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x80, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x0, 0x2, 0x0) ioctl$sock_SIOCDELRT(r2, 0x890b, &(0x7f0000000040)={0x0, @in={0x2, 0x0, @broadcast=0x1e}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2}}, @sco, 0x5e}) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000380)=[{{&(0x7f0000000000)=@isdn={0x22, 0x3, 0x2, 0x1, 0xfe}, 0x80, 0x0}}], 0x1, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0xfe, "00000000000000000000000000ddc1517600"}) r4 = syz_open_pts(r3, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000200)=0x2) read(0xffffffffffffffff, 0x0, 0xfffffffffffffe0b) r5 = dup2(r1, r4) dup3(r4, r3, 0x0) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000000)) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') socket$netlink(0x10, 0x3, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') connect$inet6(0xffffffffffffffff, 0x0, 0x0) fcntl$getownex(r5, 0x10, &(0x7f0000000280)={0x0, 0x0}) r7 = syz_open_procfs(r6, &(0x7f00000001c0)='net/udp\x00') r8 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003b40)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) shutdown(r8, 0x0) dup2(r8, r4) sendfile(0xffffffffffffffff, r7, 0x0, 0x0) r9 = dup2(r0, 0xffffffffffffffff) ioctl$BLKBSZSET(r9, 0x40081271, &(0x7f0000000100)=0x3) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3000005, 0x40010, 0xffffffffffffffff, 0x1cdb6000) 16:52:56 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:52:56 executing program 2: 16:52:56 executing program 3: 16:52:56 executing program 1: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x50, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x50}}, 0x0) 16:52:56 executing program 4: [ 447.731756][T15304] Unknown ioctl 21508 16:52:56 executing program 2: 16:52:57 executing program 4: 16:52:57 executing program 3: 16:52:57 executing program 0: 16:52:57 executing program 1: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x50, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x50}}, 0x0) 16:52:57 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) 16:52:57 executing program 2: 16:52:57 executing program 3: 16:52:57 executing program 0: 16:52:57 executing program 4: 16:52:57 executing program 2: [ 448.886356][T15332] Unknown ioctl 21508 16:52:58 executing program 1: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x50, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x50}}, 0x0) 16:52:58 executing program 4: 16:52:58 executing program 0: 16:52:58 executing program 2: 16:52:58 executing program 3: 16:52:58 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) 16:52:58 executing program 4: 16:52:58 executing program 0: 16:52:58 executing program 1: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x50, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x50}}, 0x0) 16:52:58 executing program 2: 16:52:58 executing program 3: [ 449.880002][T15356] Unknown ioctl 21508 16:52:59 executing program 4: 16:52:59 executing program 0: 16:52:59 executing program 2: 16:52:59 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) wait4(r3, 0x0, 0x1, 0x0) 16:52:59 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x50, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x50}}, 0x0) 16:52:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x7a, &(0x7f0000000080)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8}]}, @IFLA_GROUP={0x8}]}, 0x34}, 0x1, 0xfcffffff00000000}, 0x0) 16:52:59 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) 16:52:59 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) [ 450.771286][T15380] ptrace attach of "/root/syz-executor.3"[12541] was attempted by "/root/syz-executor.3"[15380] 16:52:59 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) mknod$loop(&(0x7f0000000000)='.//ile0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r2, &(0x7f0000000180)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') [ 450.865780][T15380] ptrace attach of "/root/syz-executor.3"[12541] was attempted by "/root/syz-executor.3"[15380] 16:53:00 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x50, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x50}}, 0x0) 16:53:00 executing program 4: [ 451.065494][T15389] Unknown ioctl 21508 16:53:00 executing program 3: 16:53:00 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) 16:53:00 executing program 4: r0 = creat(&(0x7f000002bff8)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000140)={0x28}, 0x28) 16:53:00 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x50, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x50}}, 0x0) 16:53:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000108000000000000a3d6c4450000", @ANYRES32=0x0, @ANYBLOB="0000000000000000050010000500000008001b000000000024e8af6d35bfaedcf41f472fa65f80ffff68c27624911babb3bbbdb31ad4d1ee1f92b1bb3af46fc5fa62acc11bc5fafcc79f26ad5ca80dada27528e95ee7531d9c30701aafd48f2063f55102081faa55052b5ab324a5a7556eb117d1c97c443f4be7ab4df13034ea09c373d56f10099dce34"], 0x30}}, 0x0) 16:53:00 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="03000000000000009d6c10119e06d85f02635d2c7a4299e22153d32132f88a181ee9589df63eaf3050b9568e6bb20639e2d01f2dfdc87c8ea92815b757dc7d65fd046d533368df3fef8c000000002e880e95e3d4b3bee88664e8fdafbfab3e18d3e924d36671e0d9625cc57a50caddc2cc0ca4f70f842cd6e1aa504f02782c3c35a79d9c3971b4b086b07641d9a7b29452505efb1fe4a04b7bb29e068a0000000000000000000000000000000000000000000000000000a4c73cdb32823b297c5dbcb8672b40ad16e36163fbea462dd5527db8eee997b5ef860abd3d4a0638322b2e3cd8f213e3115b020400000326eb88f1d55f9c2d3b9e8bc67bbd3f9797bcd87925312f33d960c672df7178a5f619bffe7100d62973c91d91d4e7adc729d5bd3262c0325a81f3d8487b21b90da25eabe755173329b53c11cb32952dfd17ed87020f79d750d8f936a965d497c6dad922e6618172c21ae6c52637d8628020662f7049248fe016715b46937c444eeecfa0"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) socket(0x0, 0x0, 0x0) 16:53:00 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) 16:53:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x7a, &(0x7f0000000080)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r2}]}, @IFLA_GROUP={0x8}]}, 0x34}, 0x1, 0xfcffffff00000000}, 0xf0) fstat(0xffffffffffffffff, 0x0) [ 452.156905][T15423] bridge0: port 1(bridge_slave_0) entered disabled state [ 452.172377][T15423] bridge0: port 2(bridge_slave_1) entered disabled state 16:53:01 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) getresuid(&(0x7f00000001c0), &(0x7f0000000240)=0x0, &(0x7f0000000280)) r1 = getgid() lchown(&(0x7f0000000140)='./file0\x00', r0, r1) r2 = getpid() tkill(r2, 0x9) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=@newlink={0x48, 0x10, 0xe3b, 0x1b7e0400, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @ip6gretap={{0xe, 0x1, 'ip6gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r5}]}}}]}, 0x48}}, 0x0) unshare(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0), 0xc) syz_open_dev$tty20(0xc, 0x4, 0x1) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) [ 452.363958][T15427] Unknown ioctl 21508 16:53:01 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x50, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x50}}, 0x0) 16:53:01 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) 16:53:01 executing program 2: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x616, 0x0) remap_file_pages(&(0x7f000001f000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00618, 0x0, 0x0, 0x0, 0x10000000002) 16:53:02 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) socket(0x0, 0x0, 0x0) 16:53:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 16:53:02 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$poke(0x4200, r1, &(0x7f0000000080), 0x0) [ 453.283278][T15455] mmap: syz-executor.2 (15455) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 453.393730][T15457] ptrace attach of "/root/syz-executor.3"[12541] was attempted by "/root/syz-executor.3"[15457] [ 453.516505][T15457] ptrace attach of "/root/syz-executor.3"[12541] was attempted by "/root/syz-executor.3"[15457] 16:53:02 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) 16:53:02 executing program 4: r0 = memfd_create(&(0x7f0000000040)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00W\x1cX\xf0\xaaL\xb6s\xb8\xc5h\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x16\xe4\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r2 = dup2(r1, r0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) setresgid(0x0, 0x0, 0x0) setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000002c0), 0xc) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r2, 0xc08c5336, &(0x7f00000000c0)={0x2e4, 0x7, 0x0, 'queue1\x00', 0x5}) 16:53:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) [ 453.783530][T15464] Unknown ioctl 21508 16:53:02 executing program 3: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="1c0000005e001f0814584707f9f4ffffff000000000000001f000000", 0x1c) 16:53:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 16:53:03 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x58) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000000200)={0x8, {"615d2c5ca286d90b1e77b08ee21d2b27f495cf807797a08258a7e5b283ee250ca85785abf0c22823750d4bf8dda76e419dc1adea04bcea78da18fb35dc8fca391bd5ba30b5acb4a12819a071e36fe1078d4727d2e2e4ff251e3f6bfc8bd04a70e8cb8ce7d965953f60ed6fecbd5c93c84dd1ef4d28896087280262ccb27d01811b1abb17d9cd47d03101ff6c7b417bb237e9987b381dc6f470c2600a74065554f69371d5ff7b6ed0cab9f4ab872a229aef15d774489cf43d8f463cd8ad0e4a1afe65824c31520dab96c57644aa8cb8f41bc0aa875a1fd700992b14a22f6e9c3fb016e444e9652f6dad016472c48a9ff62178fa130a00008078023a012e5cd901452ed2d250f3b3259c39d7c2aeb019b4ab7870e6a8823a215217128ac3bfe418b5a9727946d9cbb4f31e393428a54b7a3d57b90bc00fbd9d5996f1c6c5be20256227e374e30d68343224344a2dd3fc1993d3dfaaa82139233c56708d48e0ac668c886240cc4e41344d53febb7cabdd9829f46d0441d978f6d97ce3a4a22ba3ed637afd1865cf78b27d6ae76dd2bda3714e812cb709a1863cd9d0bac0c27c44ccf6f83011ec96bc5ea63eac4c1f70dd234cd835c6bf4828142b6d6c43d24ab0873f87db0cabcb7623f796dfa4932289e5a6be3c5365de848caefecfee8a99837100ecff0641a2485362b52c290faa21b76f02e027769c2133899d80f51c42fa28ab5f6973173df5d2e82091221de7c2e4e2fcf85fbf8014e40ec177a75312cf9b347aef61a88db7389c044411f136d40dbd44fa7e24356b94d644be24a85a5d85611e3a628374a3d73f421e2942cd334d435012a17ddddc4098c5f29f54076e5d76bf308231822c579bede453ab7307a1fc5b08d9d86dd099db330681aaa1b786f0afa05ec769fced032574c14b116c41af106402d54f4852ca789fc4fd9df6be4608b2e264be43af5579429d2fa483d1141eca12f6ebbcdb9e123b371d69e0c6eed9c00e2b558888029a5929a06612fd592ed503950b539f265963922294a3a4ff62d51520acafb58dae6b4a30054cba5a996738230896b916c3c0a12f65ff184be1d8e0a2e46decec7e4808203fdcea3d82d3b10f0c7a851825f93f316801c14965482ab1cd2caba9850621340b07eb5cdf024980808d5063b1a773808e758523a188e3e353a219953bb782af47507ffe5b32456283f41cd979444c861cce797b162362953002787a6f88a04f6dbb19d6e7a6d8046ca37f6fad77a7128f8cbd4b6ed54fb3a321c4b815672f27f61cf5dda9ba616d84065584f5eb3a7f6c36cf68928448103d837b77ffc2cd98f9b68a9226b35a049de28005c5078a7edc0b1059765e97603720092f9dceb7e3fa010abb5cde01e7a44b6105e63efc544454767857473bd30ebdd0090ec7354fc606f1262c1adfb7a7e88886476e2dc774d243b28bab54cfe0673df7c30fdf110d884cf080a79829caf9985958c21b52d1c61c71188e7f7d8630721cf7ca8d62ba4ea87f86b9ad093659daaa797390bbb77d08d85ce644ecc8d3f00690dab61ea145e58704c9fe8005872cb71531d3c4a96ffbde67cf4a825755dd3d6b9b62344800b1757475e2e3aa15113af117dbb31e09f094c5484f66bca44084b3bf69dee79d490145edfa841f38f809763a1089857b7d13180b3ed5105c4698a21f2e07b3b9791f7a340225ec7e1c40699e17d406572c49c2a8e4dd30f57d6dea19b2fd857e076c6250370531d1fc3d351e78589a81f1b95bbaa56be4924f8779a78a0dc0860386dc591c8b1b608849a9d2c5d346854dfad80e7f9efa563e02c8e59ed24b45e6617d9da1408bbb064f33fa2c48f2d37725b08fd3edb153fb32b381638164cf204b471c248ad02657cb7f89ed22065f4d0b559cd95ab8ebe78915c4a3950872d8a13f950a4c8382e9b3c731091b1db990c660e56be3edf173ab001d5213a193ad7eb219df56fddd6d0336aaccca36094a16bd9f27af1055bf9640124be7ba0a66cf970fc9cff30c08f12c263ff7546cc1eb8a29d14e2738cd34c0f8e957da0479d8455d6dc1ca2c36c0dcefa54ad62d358f42ddc9332865f88bc809ed8490202d14ef9bad5181b0642ae5922b428a43c97541b104db27f58912a564466e758f5e9b74bc272a7239164472b427f7438fef960b25695a0e96d7880b766abe89d01773ae33121c807b5c040a52637bdd5b9f5dc015fdd96095eaa31debde274afc8ed303b27777381359e271afd6a8d5da47779383f03248a12f6593b5d9b328f8857a263554814341722ff7438b18674b24634c9464eab4c07aacc2a64316a46aaa116ef80e36dc854bcb6e1b6f23d9be05c50d319666876ff964cec30c8718df89d0cf6ba85d09eaff3809d0cd0364c2e2c2b5dbfb92a3e31398cbe244e03d39f4c5b489a9d6d554efe36594bd93c7d6e2e1a88fdfc516a86aa15c3e24ee4b88a2a90524c17349399fe9a2a4bc0c8e80b4f25c3e0169f6c13517e94e7012e0d3440e633c36231320feff4cb5edcbeaf2a376a6b2923887b9d2b963a0bbdab1bdaf6aca0e4a55d92ad74126224a7016b61ad91c93114312fde8471dbd50e9f9e4c702aef71a2fab5dd320c2964478a83cb6ea8da91d5b0a889ad389fcbc972ed96124d0b00e0c93d1ead8375888203875f35e89a5d34ed882443a149615d65e4dada200eed5f0a6ba10ada7efef36ea1b8f5ba142e5bf8ad8b8ff4dd29dd4f2fa0a4de232bc678cdf3b78eebce513e666eadf6ca9c66149f07415fcad65d5753c632257bf287e148d97dacad5fe629acd0054ab206c96c848ffef00b7a75e26745495fa87e6dda283aca04b29095af8959e60482cd4d1c908cfe0fcee8b7716f4504c01250ef576feb3613e2845c57fa1bfce38348a5d5be054bff7360dc7cf64cbe9d313735d65bd79aea809eb9207e64df148944173bbd1b6a04a14a7da9044ca0975c9e492f47628ced948ffda2dc25a09b4b2d24125346f78840805b90807d72aa6b4d4909520cc0d87b0f400261e6f6d493a0a1ca36b59f64fa21711f04fe9a1929bc254ca35864e8d7811f232feab6db7fec73685915d2e988516393279ef930d18ba1ed3e3ba2aae237a72af39719dd0d2650408bc44cf2dc76f0e0b6ce11114c02b0aa2bb1f6b5888c6cd219aa0b0b6bcaadc3f8e3959810eeca3cc45df6f4db957491c14146e0b70db811d2b3a62c691ed6e4c9be87b6458b0223981666eccf18addbcc941d9b0caf1ef39f8b70628fdb7b1d88a967e44820982fe74677457e10b5fb14bc3ba53b4c9d49eb2467378b3d98a06cf5ed5edcdf7361aaa9052160a088aad5abb59440720355b453726487633da54298e121c4a5be0ae71d1bd45ead5e5612334bc2e71d4f0abac7d7ddd39ec5b4967da30ad438ba5bdd6883a7c9490e4477aac801899132ec80b290535a3dfd452b27ca30bdd620bd7f9005965d22d739359b11fc4dcfebf75e8637c3c2b73c4a66db744276bbaa94c115e424ddedef8d6f2947c28b5e7a783fecb6ab6e80f038ce6f634026d5e241bce3ca09e8cac50974f3be1497044d6bf5ca080b23279e121d5136240a845cd7b27781d9482f87a4d8814d637496b97892460d2189252d3cd30de3e8716a0662c9d1a0fc5507bcc3e7064605443e5a450ffc91294c478d4a8b13ac471fb13f049f24740fb5f917b0eb26faafef627efccb90ad97feadbd1937d3ab847cf7f362aab91394c576ba9d8078bcd3b620fdb816d4009f2cf4731c6b6e32cf33b39a4547695519151965118c216833999d5938c0bc7d0cfbe074bb6fe1af794c074a37292149ece1936d44b7a8055ec0bb88fcd3203b40c381452a803d13528ca9507c64c130a3110bb09e5737b3ef41c6be1c7bc7ea77c58fb81632fe8e41e40c7d8f76ca05d05783cd938123583ad14609022c63cf49e66c232e2f57dd46760a9764faeefae986c514cc5dcffc285ba1af407edc448eff98700369157419ea75877036a357593439df58fed9c36c64de3c100cc4dd1cb702dba5a78cae56e40e6b1e9306f16cbeb0d95e8bc1f45354c7c311c84540ed1e9cdde17f62ed302ae1961713227d6cb0ac7989ad456eb8239beb82fe1b2ba36040844336f86cf5045e40e4fe8e198ebfd2ff97c8a7037e1bd10d7579aea0e056adb9c207797045031d0ef3d1d5edddad749b5a571575efeb4f6d0e9aab95d1501f48bfed98d9d9f47eb66019ff0489ee11e7576dcc0ffa7fdbb41b344caf0431d6c0571bfa4288180c129b750f6fb3c0c3c42fc10af017d316e8fe32172d501e54c8e8cb5b54161101f388a2320a1c6ccd9558b931542b1661f1f5fb32a2bda0c30f8ba7c20272d40646705652f1127cef25df3cb0e7ff7864edc76ced4eb5ea34729dc86229fa32472fe903d6cec5d77c1c409965a1356b217a50e8ab0214945cd2f6afc1f5fed7a1af85895a1e991ca631b662bcd651d6e46a285d2053f691dde95c97812de01229feb564af0780ab1d046b498cfda1235e9350d18fb755c64d1d7aab74fe232f4ad5aca9fdbe66d96e6e94f902196fa77209ca848f7dec8b6a9dc32e02a9f2e7eeb207b7be305b480abcd9289a7c8ffaf236dd342a9e218e613e42c5a08b33be1a10fb749965b41da6f85c78742ddc256134e347f20c6b94357f241160743c1f2d5e121f8bf40ef37ba97090d0ba14c199fed6a8dd72cd9da1f81595dc93d0d476de66c72bd5b3c9616166c35ba154399222c23840dac6a224f568ddcaf2cbfbf5e4648162cda649a7d803b1109cfb304b595c5cc310b531faaa3b9876ac17300296754fd39498d9a91920b6abea51a086e22e51dde91e219ca9aadbd6d6c0c75e5490cbb48998306126e8366aed82ce5e4a0b7a41bbbe8386c2bbf7e7e3e1bf9e7d3667d2fc7616af9ba94cafd842faf26c9de1fadadcf3b74fde07d64234514d892ced01fc2e8904f44b189ccacd8ed361b022e35190abdc4df3c1959f70de4bd7255b4da95df48e08f6f9c91ea704bb9f8aaa2579bc61d7690fc5f8b920f9246516c925dfb9e02f9fd64997506f8b8c2bf8bdb55d542e3c3b87196aaaae9387fa18c5ad6760ef750965e195d713bc888212b37630079a99b87d5105e3c9505c2da7c198049b9a6654b663dde2d5e2e4e4167baec2dc0b0290a35f1526bdfd33c40b8e56ef8d82d753537ceca1c27931f881a7e291356be934c0f2c91ece57e6f7488152f055fd577be65bb3d64f25b515b18e0a6a63dca30eff4a50652fd9ee475dd24917933a9fc76c11991d4f0329ff55e169e780c2e9963b7b329ebfe49a77e5e80083f773357db28aee381928bb65e64d41088e0c62619bcc367cecf78d88d65f2a640cbdb0379770bf36b2cf71acb8b512a37f9b11f8b47be7ec3df1da683988688c532ac06c6201df6860a302eee99637025b147df2bde8e39a384e4d83e3a6fe10a55edb05542185faa5a0ca552e3363def5c22dc7cf067cc9852dcd8406ac192a5dbe92e630f17ee2092a953f6599de0398d1098a6626d80a01f330f703a27fbdb657a48331840929f847fc0a6ce8f1248d3f7afcf93000cd763957a8cfbd8da66a96dd4ff82ca41d58507aa93f995c19927af2b059a14e7fc2450a29a7244ba0b41ba4b6b00fe75b956b333a9420f30e499dd4db6fd2cda05d41a9af3f397602c139ec1a4cd765843f36d6c8d9b3c11eb5942cd0498961af0f777d5c319ac6d938ff335a97f6b9c93b3b4198f3181ae8e783706c2f7f5490f6414ca8048bb188ca1f36cb3554442ad7305e784a24534", 0x1000}}, 0x1006) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 16:53:03 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) 16:53:03 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) writev(r3, &(0x7f0000000080)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0xa) close(r4) socket(0x10, 0x3, 0x6) writev(r3, &(0x7f0000000600)=[{&(0x7f0000000040)="f98ac693ce6908", 0x7}], 0x1) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@local, @in6=@mcast1}, {@in6=@ipv4={[0xfffffff0], [], @local}, 0x0, 0x32}, @in6=@mcast2, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) [ 455.050356][T15493] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=15493 comm=syz-executor.4 [ 455.080518][T15493] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=15493 comm=syz-executor.4 [ 455.111565][T15493] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=15493 comm=syz-executor.4 [ 455.136952][T15493] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=15493 comm=syz-executor.4 [ 455.169455][T15493] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=15493 comm=syz-executor.4 [ 455.208723][T15493] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=15493 comm=syz-executor.4 [ 455.236787][T15493] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=15493 comm=syz-executor.4 [ 455.266980][T15493] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=15493 comm=syz-executor.4 [ 455.293553][T15493] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=15493 comm=syz-executor.4 [ 455.392897][T15493] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=15493 comm=syz-executor.4 16:53:05 executing program 2: 16:53:05 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) socket(0x0, 0x0, 0x0) 16:53:05 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 16:53:05 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(0x0) 16:53:05 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) 16:53:05 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f00000017c0)) 16:53:05 executing program 3: 16:53:05 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) [ 456.465351][T15516] Unknown ioctl 21508 16:53:05 executing program 2: 16:53:06 executing program 3: 16:53:06 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:06 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 16:53:06 executing program 4: 16:53:06 executing program 2: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NFQNL_MSG_VERDICT_BATCH(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040), 0xc, &(0x7f0000000400)={&(0x7f00000001c0)=ANY=[]}}, 0x2004c040) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) creat(0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x1) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000180)="77690000cfbe1fbb67", 0x9}], 0x1, 0xb) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x1) pipe(&(0x7f0000000080)) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x30000739, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) pipe(&(0x7f0000000080)={0xffffffffffffffff}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000071, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTLCK(r3, 0x540f, &(0x7f0000001c40)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x100000004, 0x0) socket$inet(0x2, 0x0, 0x0) unlink(&(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') 16:53:06 executing program 3: 16:53:06 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) 16:53:06 executing program 4: [ 457.706079][T15545] Unknown ioctl 21508 16:53:06 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 16:53:06 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) 16:53:07 executing program 3: 16:53:07 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) 16:53:07 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 16:53:07 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="03000000000000009d6c10119e06d85f02635d2c7a4299e22153d32132f88a181ee9589df63eaf3050b9568e6bb20639e2d01f2dfdc87c8ea92815b757dc7d65fd046d533368df3fef8c000000002e880e95e3d4b3bee88664e8fdafbfab3e18d3e924d36671e0d9625cc57a50caddc2cc0ca4f70f842cd6e1aa504f02782c3c35a79d9c3971b4b086b07641d9a7b29452505efb1fe4a04b7bb29e068a0000000000000000000000000000000000000000000000000000a4c73cdb32823b297c5dbcb8672b40ad16e36163fbea462dd5527db8eee997b5ef860abd3d4a0638322b2e3cd8f213e3115b020400000326eb88f1d55f9c2d3b9e8bc67bbd3f9797bcd87925312f33d960c672df7178a5f619bffe7100d62973c91d91d4e7adc729d5bd3262c0325a81f3d8487b21b90da25eabe755173329b53c11cb32952dfd17ed87020f79d750d8f936a965d497c6dad922e6618172c21ae6c52637d8628020662f7049248fe016715b46937c444eeecfa0"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:07 executing program 4: 16:53:07 executing program 3: 16:53:08 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) 16:53:08 executing program 4: 16:53:08 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 16:53:08 executing program 2: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NFQNL_MSG_VERDICT_BATCH(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040), 0xc, &(0x7f0000000400)={&(0x7f00000001c0)=ANY=[]}}, 0x2004c040) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) creat(0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x1) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000180)="77690000cfbe1fbb67", 0x9}], 0x1, 0xb) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x1) pipe(&(0x7f0000000080)) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x30000739, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) pipe(&(0x7f0000000080)={0xffffffffffffffff}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000071, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTLCK(r3, 0x540f, &(0x7f0000001c40)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x100000004, 0x0) socket$inet(0x2, 0x0, 0x0) unlink(&(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') 16:53:08 executing program 3: [ 459.122504][T15586] Unknown ioctl 21508 16:53:08 executing program 4: [ 459.440102][T15595] fuse: Bad value for 'fd' 16:53:08 executing program 3: 16:53:08 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:08 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x50, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x50}}, 0x0) 16:53:08 executing program 4: 16:53:08 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) 16:53:09 executing program 3: [ 460.108414][T15615] Unknown ioctl 21508 16:53:09 executing program 2: 16:53:09 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) [ 460.214288][T15619] fuse: Bad value for 'fd' 16:53:09 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x50, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x50}}, 0x0) 16:53:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, &(0x7f0000000140)) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) listen(r1, 0x400000001ffffffd) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1a1100, 0x0) r3 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x2, 0x5}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) mq_timedsend(r3, 0x0, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents(r4, &(0x7f0000000000)=""/62, 0xd6147cbb6f273a13) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r4, 0x0, 0x0}, 0x10) mq_timedsend(r3, 0x0, 0x0, 0x0, 0x0) mq_timedreceive(r3, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f00000013c0)=ANY=[@ANYBLOB="58020000050b010e25bd7000fbdbdf250c0000043cf511efc6d5eda75b3728b47f540d6449aa379c83c68a18891d16c3728521afea89fad3c724aa36bc8b85889761116def8caa0a81195e261ddc022d376f623543e6478ac185eb39549a05f47e8f1f0cd0a2fc23a7be2b0e2ca97bb24d730ab5d6500c416222124b3e36bcbde0e2fd6889a4", @ANYBLOB], 0x2}}, 0x44) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VIDIOC_S_STD(0xffffffffffffffff, 0x40085618, &(0x7f0000001380)=0x80000) sendmmsg(r6, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x7000000}}], 0x4000000000000d0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v3={0x3000000, [{0xd0}, {0x0, 0x80}], r7}, 0x18, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000001640)=[&(0x7f0000001480)=',vboxnet1em0self,\x00', &(0x7f00000014c0)='security.capability\x00', &(0x7f0000001500)='\x00', &(0x7f0000001540)='/em0em0\x00', &(0x7f0000001580)='GPLproc^\xaa^vmnet0-system\x00', &(0x7f00000015c0)='{\x00', &(0x7f0000001600)='*user[selinux!%lo\x00'], &(0x7f0000001780)=[&(0x7f0000001680)='NLBL_\x86\x8a\xc8\x9eMB\x80V', &(0x7f00000016c0)='lo\x00', &(0x7f0000001700)=']\x00', &(0x7f0000001740)='/dev/vcs\x00']) 16:53:09 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) vmsplice(r3, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r3) socket$nl_route(0x10, 0x3, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000006800)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001d00070f000000000000000007000001", @ANYRES32=r6, @ANYBLOB="dd3900240a0002"], 0x3}}, 0x0) splice(r2, 0x0, r3, 0x0, 0x100000000, 0x0) 16:53:09 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="000000009f84bb57964bbbbbbbbbbbbb86dd604279eb029c2f00fe8000000000000000001800000000000000000000000000000000000000000080006558009c9078010000000000000009039eb68aac4ef9ae7b1ecdcee9ecf3caa0be0f40abe8f3e7ed0d21c0dd7ca16f5adea9ee668ddd949dd79a06e81f4d3345f1d58048580e000000000000e4dcc465f460b16e378a543bdc5fa14fc004dc6d7e2d1718ac01a4e165a21de0e02662e3b002ffff6be16766aa09aa83ce4b78a613f0247f9f5aa39e6fcc79f1482a87d781d13ac0af1800000000"], 0xd6) 16:53:09 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x50, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x50}}, 0x0) 16:53:09 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) [ 460.899506][ T32] audit: type=1400 audit(1584031989.940:89): avc: denied { name_bind } for pid=15628 comm="syz-executor.4" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 460.924607][ T32] audit: type=1400 audit(1584031989.940:90): avc: denied { node_bind } for pid=15628 comm="syz-executor.4" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 16:53:10 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) [ 461.224903][ T32] audit: type=1400 audit(1584031990.230:91): avc: denied { name_connect } for pid=15628 comm="syz-executor.4" dest=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 461.356594][T15651] Unknown ioctl 21508 16:53:10 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x44, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}]}, 0x44}}, 0x0) 16:53:10 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) 16:53:10 executing program 3: ioctl$VIDIOC_SUBDEV_S_SELECTION(0xffffffffffffffff, 0xc040563e, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x2, 0x3, 0x310, 0x150, 0x0, 0x0, 0x0, 0x0, 0x278, 0x278, 0x278, 0x278, 0x278, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0xe8, 0x150, 0x0, {}, [@common=@unspec=@connmark={{0x30, 'connmark\x00'}}, @common=@unspec=@nfacct={{0x48, 'nfacct\x00'}, {'syz0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@unspec=@connlabel={{0x28, 'connlabel\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x370) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') 16:53:10 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x44, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}]}, 0x44}}, 0x0) 16:53:11 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) 16:53:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$NLBL_CALIPSO_C_ADD(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x14}, 0x200000d4}}, 0x0) 16:53:11 executing program 2: mkdir(0x0, 0x0) open(0x0, 0x0, 0xf31272d352884f19) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/adsp1\x00', 0x44401, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000780)=ANY=[@ANYBLOB="9feb01001800000000000000980000009800000003000000000000000400000d000000000700000000000000050000000000000008000000050000000b00000002000000000000000100000d000000000900000005000000000000000600000d0000000002000000010000000b0000000400000000000000000000000a00000005000000040000000300000004000000030000000200000002000006040000000f00000000100000060000000180000000300001d27afd242281294ef087af27dc84628ac308d8bfb66f078fb687f5"], &(0x7f00000006c0)=""/167, 0xb3, 0xa7}, 0x20) poll(&(0x7f0000000540)=[{0xffffffffffffffff, 0x8420}, {r0}, {0xffffffffffffffff, 0x8080}, {}, {0xffffffffffffffff, 0x200}, {}], 0x6, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 16:53:11 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) statfs(&(0x7f00000000c0)='./file0\x00', 0x0) 16:53:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x44, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}]}, 0x44}}, 0x0) 16:53:11 executing program 0: creat(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) [ 462.573877][T15687] Unknown ioctl 21508 16:53:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x44, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x44}}, 0x0) 16:53:11 executing program 0: creat(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) 16:53:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x44, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x44}}, 0x0) 16:53:12 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000b00)=ANY=[@ANYBLOB="00000000000007004100696200000410028014000280080004000000000008000200a4"], 0x1}}, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/82, &(0x7f0000000380)=0x52) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x4, 0x8, 0xfb, 0x0, 0x0, 0x1, 0x8, 0x0, 0x0, 0x0, 0x8, 0x1]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000640)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:53:12 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="03000000000000009d6c10119e06d85f02635d2c7a4299e22153d32132f88a181ee9589df63eaf3050b9568e6bb20639e2d01f2dfdc87c8ea92815b757dc7d65fd046d533368df3fef8c000000002e880e95e3d4b3bee88664e8fdafbfab3e18d3e924d36671e0d9625cc57a50caddc2cc0ca4f70f842cd6e1aa504f02782c3c35a79d9c3971b4b086b07641d9a7b29452505efb1fe4a04b7bb29e068a0000000000000000000000000000000000000000000000000000a4c73cdb32823b297c5dbcb8672b40ad16e36163fbea462dd5527db8eee997b5ef860abd3d4a0638322b2e3cd8f213e3115b020400000326eb88f1d55f9c2d3b9e8bc67bbd3f9797bcd87925312f33d960c672df7178a5f619bffe7100d62973c91d91d4e7adc729d5bd3262c0325a81f3d8487b21b90da25eabe755173329b53c11cb32952dfd17ed87020f79d750d8f936a965d497c6dad922e6618172c21ae6c52637d8628020662f7049248fe016715b46937c444eeecfa0"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:12 executing program 0: creat(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) 16:53:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x44, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x44}}, 0x0) [ 463.651412][ T32] audit: type=1400 audit(1584031992.690:92): avc: denied { ioctl } for pid=15712 comm="syz-executor.2" path="socket:[44042]" dev="sockfs" ino=44042 ioctlcmd=0xae82 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 16:53:12 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x1cd4000a, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1400000010efa8c68d000000000000000000000a2000000002030100000000f7870600000000000009000100018000000000000084000000000b8381933a000000000000034000002900010073797a30000000000c00024000000000000000050e0003800c00014000000000000000032e000240ffffff0a32b915ffa6ffef7886f18f89cd8c0602f501ba25e34c81fffffd0c0002400000000000002c30000480080001400000000008000148000000010800014000001f00000003007465616d5f736c6176885f30000000001400100011000000006f0000000000c4adc99466d586df5a96ba1ba766a031b7adb3515ee4dc599c78fe3a6002abc0bb0cc49aadbd503cda08a8fd9c7ae882fe1a0d72351aa6b4d18322f9e4b35a70336b8fa17615896e0abe4266450c849aba8e663c6164d16c5ccbdaa947605287f1e6350d16124377ef6456c278af7015cc1f0d456be65bcd26d5aa17cfb8d4834ad442d69caa0b6bd77de1cc39361d58d309ed6d64a7e2a799b66a209b79afa906e8e6184891f6823a5a59d29a5b5b9ccd223c52addeea66a94253312634860c41a95606ae7bb56d8303049fd1c88ba6999063878016e63e897c8f23abe879e7ee435f76197439976c804bc8e1c6c3ba96c9042c54ed10509ff5a76b2ce8da97248c8ff825ac8391feb380e9960b096f5571903afa74ce453ecb8888e38a754d2aba6ac1dfb13cf3501c0fe23abb747c83af5864f85aa958ff2f45e1dadf4961c6c90fc6606373d5efb7cb7f91ff3fd8c84a1d8cb1251cf53e5e7c3d2e8d9821c37433b58a4d7739e457da6100d921dd6b527694220f33fe859248000000000000000000000076b935b55cb7edd99577c34089f693969c147a0a1a57af5144705cff1a9cf03f8b30c7e3a879e7f23046c96468c0d0f459468b048bdfe6a0c165ff5367a6732b7bd5210b2798b6947b5f728544f85c0a30748024e5980a76aaa3ab1546a6993e8110143c255ee558a51444824e954b4c32324d0c8d055a8a7d67d3905c00"/748], 0xcc}}, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NFQNL_MSG_VERDICT(r0, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000b00)=ANY=[@ANYBLOB="20000000010301020000000000000000000000000c000200daffff01000000"], 0x20}}, 0x0) 16:53:12 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0xc000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 16:53:12 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000b00)=ANY=[@ANYBLOB="0000000000000700410069620000041002801400028008000400"], 0x1}}, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/82, &(0x7f0000000380)=0x52) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x4, 0x8, 0xfb, 0x0, 0x0, 0x1, 0x8, 0x0, 0x0, 0x0, 0x8, 0x1]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000640)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:53:12 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) [ 464.011194][T15729] Unknown ioctl 21508 16:53:13 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x48, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x48}}, 0x0) 16:53:13 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) [ 464.348469][T15746] fuse: Bad value for 'fd' 16:53:13 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) 16:53:13 executing program 3: syz_init_net_socket$nl_rdma(0xffffffffffffffff, 0x3, 0x14) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x278, 0x4c000000, 0x0, 0x108, 0x0, 0x108, 0x1e0, 0x1e0, 0x1e0, 0x1e0, 0x1e0, 0x3, 0x0, {[{{@uncond, 0x0, 0xd8, 0x108, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@ip={@multicast1, @local, 0x0, 0x0, 'vcan0\x00', 'veth0_to_bridge\x00', {}, {}, 0x5}, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d8) 16:53:13 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x48, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x48}}, 0x0) 16:53:13 executing program 4: syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0x2, &(0x7f0000000000)=[{&(0x7f0000010000)='XFSB', 0x4}, {&(0x7f0000000180)="f985db4c294417ecdb4610953ecf5e643ab616e34e58499779390b3862d2ad306e827c7c7d68184201db66bedd3a6b87425f38091e7c88d7081e8e21a30d86924a21d45c3462d3fd9d6a6e77ea66836e8d03f542b7f55213c0652d05f5eb", 0x5e, 0x9}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 16:53:13 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x48, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x48}}, 0x0) [ 464.837718][T15756] Unknown ioctl 21508 [ 464.908780][T15765] fuse: Bad value for 'fd' 16:53:14 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) 16:53:14 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x0, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0), 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) getxattr(0x0, 0x0, 0x0, 0x0) gettid() r3 = creat(0x0, 0x1) write$binfmt_script(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x1aa) getpid() r4 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r4) bind$inet6(r4, &(0x7f0000000600)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000000240)='./bus\x00', 0x100000141042, 0x0) ftruncate(r5, 0x10099b7) sendfile(r4, r5, 0x0, 0x8000fffffffe) r6 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x87fff) ioctl$FS_IOC_GETFLAGS(r6, 0x40046629, &(0x7f0000000840)) r7 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r7, 0x87fff) ioctl$FS_IOC_GETFLAGS(r7, 0x40046629, &(0x7f0000000840)) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x9}, 0x12100, 0x0, 0x0, 0x0, 0x0, 0x6, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 465.238210][T12514] XFS (loop4): Metadata CRC error detected at xfs_sb_read_verify+0x6cf/0x7e0, xfs_sb block 0xffffffffffffffff [ 465.251245][T12514] XFS (loop4): Unmount and run xfs_repair [ 465.257946][T12514] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 465.265821][T12514] 00000000: 58 46 53 42 00 00 00 00 00 f9 85 db 4c 29 44 17 XFSB........L)D. [ 465.275075][T12514] 00000010: ec db 46 10 95 3e cf 5e 64 3a b6 16 e3 4e 58 49 ..F..>.^d:...NXI [ 465.284686][T12514] 00000020: 97 79 39 0b 38 62 d2 ad 30 6e 82 7c 7c 7d 68 18 .y9.8b..0n.||}h. [ 465.294414][T12514] 00000030: 42 01 db 66 be dd 3a 6b 87 42 5f 38 09 1e 7c 88 B..f..:k.B_8..|. [ 465.303784][T12514] 00000040: d7 08 1e 8e 21 a3 0d 86 92 4a 21 d4 5c 34 62 d3 ....!....J!.\4b. [ 465.314311][T12514] 00000050: fd 9d 6a 6e 77 ea 66 83 6e 8d 03 f5 42 b7 f5 52 ..jnw.f.n...B..R [ 465.323404][T12514] 00000060: 13 c0 65 2d 05 f5 eb 00 00 00 00 00 00 00 00 00 ..e-............ 16:53:14 executing program 3: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) getpid() socket$inet6(0xa, 0x3, 0x7) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net\x00') openat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000340)={0xfffffdfe, 0x0, [], {0x0, @bt={0x0, 0x40, 0x0, 0x0, 0x5, 0x2, 0x3, 0x6f, 0x6, 0x400, 0x9, 0x0, 0x0, 0xffffffff, 0x19, 0x20}}}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net\x00') openat(r3, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net\x00') openat(r4, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r2) 16:53:14 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x50, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x50}}, 0x0) [ 465.332837][T12514] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 465.349942][T15774] XFS (loop4): SB validate failed with error -74. [ 465.410916][T15787] fuse: Bad value for 'fd' 16:53:14 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) [ 465.541668][T12514] XFS (loop4): Metadata CRC error detected at xfs_sb_read_verify+0x6cf/0x7e0, xfs_sb block 0xffffffffffffffff [ 465.554186][T12514] XFS (loop4): Unmount and run xfs_repair [ 465.560417][T12514] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 465.568168][T12514] 00000000: 58 46 53 42 00 00 00 00 00 f9 85 db 4c 29 44 17 XFSB........L)D. [ 465.587385][T12514] 00000010: ec db 46 10 95 3e cf 5e 64 3a b6 16 e3 4e 58 49 ..F..>.^d:...NXI [ 465.596666][T12514] 00000020: 97 79 39 0b 38 62 d2 ad 30 6e 82 7c 7c 7d 68 18 .y9.8b..0n.||}h. [ 465.605959][T12514] 00000030: 42 01 db 66 be dd 3a 6b 87 42 5f 38 09 1e 7c 88 B..f..:k.B_8..|. [ 465.615070][T12514] 00000040: d7 08 1e 8e 21 a3 0d 86 92 4a 21 d4 5c 34 62 d3 ....!....J!.\4b. [ 465.624264][T12514] 00000050: fd 9d 6a 6e 77 ea 66 83 6e 8d 03 f5 42 b7 f5 52 ..jnw.f.n...B..R [ 465.633480][T12514] 00000060: 13 c0 65 2d 05 f5 eb 00 00 00 00 00 00 00 00 00 ..e-............ [ 465.642508][T12514] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 465.653850][T15774] XFS (loop4): SB validate failed with error -74. 16:53:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x50, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x50}}, 0x0) [ 465.953901][T15809] Unknown ioctl 21508 16:53:15 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NFNL_MSG_CTHELPER_DEL(0xffffffffffffffff, 0x0, 0x4000050) request_key(0x0, 0x0, 0x0, 0xfffffffffffffff8) write$FUSE_POLL(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x8200) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000100)=ANY=[@ANYPTR64], 0x8) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r2, 0x0) 16:53:15 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) 16:53:15 executing program 4: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x0, 0x40000000ad}, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) recvmmsg(r0, &(0x7f0000001c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=""/67, 0x43}, 0x4}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000006c0)='attr/exec\x00') preadv(r2, &(0x7f00000017c0), 0x315, 0x800000) 16:53:15 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x50, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x50}}, 0x0) 16:53:15 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) 16:53:15 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) [ 466.577212][ T32] audit: type=1804 audit(1584031995.620:93): pid=15823 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir398352068/syzkaller.USYqtj/172/bus" dev="sda1" ino=17200 res=1 16:53:15 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NFNL_MSG_CTHELPER_DEL(0xffffffffffffffff, 0x0, 0x4000050) request_key(0x0, 0x0, 0x0, 0xfffffffffffffff8) write$FUSE_POLL(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x8200) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000100)=ANY=[@ANYPTR64], 0x8) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r2, 0x0) 16:53:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) r3 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r3, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) 16:53:15 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x44, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x44}}, 0x0) [ 467.121753][T15843] Unknown ioctl 21508 16:53:16 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x44, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x44}}, 0x0) 16:53:16 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) [ 467.340849][ T32] audit: type=1804 audit(1584031996.380:94): pid=15844 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir398352068/syzkaller.USYqtj/173/bus" dev="sda1" ino=17229 res=1 16:53:16 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) 16:53:16 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="03000000000000009d6c10119e06d85f02635d2c7a4299e22153d32132f88a181ee9589df63eaf3050b9568e6bb20639e2d01f2dfdc87c8ea92815b757dc7d65fd046d533368df3fef8c000000002e880e95e3d4b3bee88664e8fdafbfab3e18d3e924d36671e0d9625cc57a50caddc2cc0ca4f70f842cd6e1aa504f02782c3c35a79d9c3971b4b086b07641d9a7b29452505efb1fe4a04b7bb29e068a0000000000000000000000000000000000000000000000000000a4c73cdb32823b297c5dbcb8672b40ad16e36163fbea462dd5527db8eee997b5ef860abd3d4a0638322b2e3cd8f213e3115b020400000326eb88f1d55f9c2d3b9e8bc67bbd3f9797bcd87925312f33d960c672df7178a5f619bffe7100d62973c91d91d4e7adc729d5bd3262c0325a81f3d8487b21b90da25eabe755173329b53c11cb32952dfd17ed87020f79d750d8f936a965d497c6dad922e6618172c21ae6c52637d8628020662f7049248fe016715b46937c444eeecfa0"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:16 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NFNL_MSG_CTHELPER_DEL(0xffffffffffffffff, 0x0, 0x4000050) request_key(0x0, 0x0, 0x0, 0xfffffffffffffff8) write$FUSE_POLL(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x8200) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000100)=ANY=[@ANYPTR64], 0x8) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r2, 0x0) 16:53:16 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x3, 0x7) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net\x00') openat(r3, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r3, 0xc0945662, &(0x7f0000000340)={0xfffffdfe, 0x0, [], {0x0, @bt={0x0, 0x40, 0x0, 0x0, 0x5, 0x2, 0x3, 0x6f, 0x6, 0x400, 0x9, 0x1, 0x0, 0xffffffff, 0x19, 0x20, {0x8, 0x7}, 0x9, 0xfe}}}) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x0, &(0x7f00000008c0)=[{0x0}, {0x0}, {&(0x7f0000000b00)=""/126, 0x7e}, {0x0}], 0x4}}], 0x1, 0x20, 0x0) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x30, 0x0, 0x400, 0x70bd2a, 0x0, {}, [@NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x859989707d374285}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @rand_addr="12b88de9647971c68a1286f8368b8cb1"}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000800}, 0x4080) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) sched_yield() socket$key(0xf, 0x3, 0x2) add_key(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) socketpair(0x8000000000001e, 0x0, 0x0, 0x0) ioctl$SNDCTL_DSP_SETFMT(r6, 0xc0045005, &(0x7f0000000000)=0x10) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net\x00') r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net\x00') openat(r7, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net\x00') openat(r8, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r7, 0x2405, r5) 16:53:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) r3 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r3, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) 16:53:16 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x44, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x44}}, 0x0) [ 467.986817][T15869] Unknown ioctl 21508 16:53:17 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) 16:53:17 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NFNL_MSG_CTHELPER_DEL(0xffffffffffffffff, 0x0, 0x4000050) request_key(0x0, 0x0, 0x0, 0xfffffffffffffff8) write$FUSE_POLL(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x8200) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000100)=ANY=[@ANYPTR64], 0x8) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r2, 0x0) 16:53:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x48, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x48}}, 0x0) 16:53:17 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:17 executing program 4: socket$alg(0x26, 0x5, 0x0) open(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) dup(0xffffffffffffffff) open(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r3}) 16:53:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) r3 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r3, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) 16:53:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x48, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x48}}, 0x0) [ 468.957501][ T32] audit: type=1804 audit(1584031998.000:95): pid=15897 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir398352068/syzkaller.USYqtj/175/bus" dev="sda1" ino=16530 res=1 16:53:18 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) [ 469.270768][T15910] Unknown ioctl 21508 16:53:18 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NFNL_MSG_CTHELPER_DEL(0xffffffffffffffff, 0x0, 0x4000050) add_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000100)='f', 0x1, 0xfffffffffffffffd) creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000240)=ANY=[@ANYBLOB="0002000000000000040100c910ff014000000000000200000100001001000000d500f4237db638bcae350d671c9bbdfd93e1fd9b28362686ee2d0a28a43df487335e10dfdc2ad2f97b96fb4a1ab87d76903669ca94b037981373ab3eb2638f2bd1031f793c395585e3015713a895ab3c5f1729aa648c235f50fbd6a7232d117a9eed45101babc2cc93df85f459be8865da946b25c45db8f45e81ec82848cb293ca1cd8185b0702889ab581ee4b6dc35bf1c912523b3b2fdd1e2c051abb85c4616fc100d67e1dc8fa72f650951b3c9526df4afbbcb290f4e64ed4985f4f4898c87f22f4ff2c6a8a536e377fa0153759b6d3535df91bc44751ef0a27f115ab06312aa8d128828b4f2836e92ff81ae9faa40000c80433fbf92e79c1e6c270573401ff0cc0faee1d00325b5d55339cf2dadb44241065fd73bf63043a30781ff0ed0d00c580e7bcb0671a4cc0251f619ff6094022a216ff588dc114683a8dc827111bb8b80af3ad2dcc44c69863014766ecda806058efe07fe8b64f9ee3e53638cecffe4a792ed604f9bb97c5b89ae39b159d8d93bef36f8c59b36f9f57a286f02d3e5b68eebded9ac694eebe4df4361d72d41c8060edb6a6e2d2fa71"], 0x20) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, 0x0, 0x0) open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) 16:53:18 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) 16:53:18 executing program 4: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x40000000ad}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x7) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=""/67, 0x43}, 0x4}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000006c0)='attr/exec\x00') preadv(r3, &(0x7f00000017c0), 0x315, 0x800000) 16:53:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x48, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x48}}, 0x0) 16:53:18 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) r3 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r3, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) 16:53:19 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) 16:53:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x50, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x50}}, 0x0) [ 470.165194][T15940] Unknown ioctl 21508 16:53:19 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) 16:53:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x50, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x50}}, 0x0) 16:53:19 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:19 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=""/67, 0x43}, 0x4}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) close(0xffffffffffffffff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000006c0)='attr/exec\x00') preadv(r2, &(0x7f00000017c0), 0x315, 0x0) [ 471.059783][T15962] fuse: Bad value for 'fd' [ 471.112792][T15964] Unknown ioctl 21508 16:53:21 executing program 2: 16:53:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) 16:53:21 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) 16:53:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x50, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x50}}, 0x0) 16:53:21 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:21 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {}, {}, 0x0, 0x0, 0x0, 0x852bc6fe551b57ff}, {{@in6=@mcast2}, 0x0, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}, 0xe8) [ 472.364043][T15981] fuse: Bad value for 'fd' 16:53:21 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) 16:53:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) 16:53:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x48, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x48}}, 0x0) 16:53:21 executing program 4: 16:53:21 executing program 2: 16:53:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) 16:53:22 executing program 2: 16:53:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x48, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x48}}, 0x0) 16:53:22 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) 16:53:22 executing program 4: 16:53:22 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) r3 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r3, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) 16:53:22 executing program 2: [ 473.614696][T16017] fuse: Invalid rootmode 16:53:22 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) 16:53:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x48, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x48}}, 0x0) 16:53:22 executing program 4: 16:53:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) r3 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r3, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) 16:53:23 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:23 executing program 2: 16:53:23 executing program 4: 16:53:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x48, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x48}}, 0x0) [ 474.257893][T16034] fuse: Invalid rootmode 16:53:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) r3 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r3, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) 16:53:23 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) 16:53:23 executing program 4: 16:53:23 executing program 2: 16:53:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x48, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x48}}, 0x0) 16:53:24 executing program 4: 16:53:24 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) r3 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r3, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) 16:53:24 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) 16:53:24 executing program 2: ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x8, 'syzkaller0\x00', {'vlan1\x00'}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) waitid(0x1, 0x0, 0x0, 0x40000000, &(0x7f00000000c0)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="0300050000000100001400000000000000000f0000000000000000000500000000004200000000000000000007000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 16:53:24 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x48, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffffffff}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x48}}, 0x0) 16:53:24 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) 16:53:24 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x29, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f0100000019010cc913000100018000005000000058670009000000", 0x2f}], 0x1}, 0x0) [ 475.711335][T16073] ldm_validate_privheads(): Disk read failed. [ 475.718698][T16073] loop2: p2 < > p3 [ 475.722762][T16073] loop2: partition table partially beyond EOD, truncated [ 475.730692][T16073] loop2: p2 size 2 extends beyond EOD, truncated 16:53:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) r3 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r3, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) [ 475.865941][T16073] loop2: p3 size 458752 extends beyond EOD, truncated 16:53:25 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) 16:53:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x98}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xac, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 16:53:25 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x88}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xac, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 16:53:25 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x30}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xac, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 16:53:25 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) r3 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r3, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) 16:53:25 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) 16:53:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) r2 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r2, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) 16:53:26 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000b00)=ANY=[@ANYBLOB="0000000000000700410069620000041002801400029f080004000000000008000200a4"], 0x1}}, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/82, &(0x7f0000000380)=0x52) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x4, 0x8, 0xfb, 0x0, 0x0, 0x1, 0x8, 0x0, 0x0, 0x0, 0x8, 0x1]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000640)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:53:26 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x30}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xac, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 16:53:26 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'lo\x00'}, 0x18) 16:53:27 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x30}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xac, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 16:53:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) 16:53:27 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) [ 478.033853][T16145] IPVS: sync thread started: state = BACKUP, mcast_ifn = lo, syncid = 0, id = 0 16:53:27 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) 16:53:27 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x4001) 16:53:27 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'lo\x00'}, 0x18) 16:53:27 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x30}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xac, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 16:53:27 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'lo\x00'}, 0x18) 16:53:27 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000180)='./file0\x00', 0x0) 16:53:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) 16:53:27 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="03000000000000009d6c10119e06d85f02635d2c7a4299e22153d32132f88a181ee9589df63eaf3050b9568e6bb20639e2d01f2dfdc87c8ea92815b757dc7d65fd046d533368df3fef8c000000002e880e95e3d4b3bee88664e8fdafbfab3e18d3e924d36671e0d9625cc57a50caddc2cc0ca4f70f842cd6e1aa504f02782c3c35a79d9c3971b4b086b07641d9a7b29452505efb1fe4a04b7bb29e068a0000000000000000000000000000000000000000000000000000a4c73cdb32823b297c5dbcb8672b40ad16e36163fbea462dd5527db8eee997b5ef860abd3d4a0638322b2e3cd8f213e3115b020400000326eb88f1d55f9c2d3b9e8bc67bbd3f9797bcd87925312f33d960c672df7178a5f619bffe7100d62973c91d91d4e7adc729d5bd3262c0325a81f3d8487b21b90da25eabe755173329b53c11cb32952dfd17ed87020f79d750d8f936a965d497c6dad922e6618172c21ae6c52637d8628020662f7049248fe016715b46937c444eeecfa0"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:28 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x30}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xac, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 16:53:28 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x300cce, &(0x7f0000000180)=ANY=[@ANYBLOB="eaaaaaaaaaaa00000000000088a8ffff8100000086dd600000000029000002000000004a86251a699b000000000000000000000100000000000000000000000000000000945426470a8a05b4cae85848216075d20f2615166b49ccd67cdeb01c01155459031396bb83fc41f1f0afb1dfccc1925bd66f410f86bc6894fcb8923675c25025fa1e7f420bb05c8fb949887a8e579e8bdadb4a708135ce8fdb7bd84d3a1c6f85c8298a15200219331a7ef9c9e39632969ab29270a22a1320b92187ba7b00"/206], 0x0) [ 479.432358][T16185] Unknown ioctl 21508 16:53:28 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'lo\x00'}, 0x18) 16:53:28 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) 16:53:28 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) 16:53:28 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x30}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xac, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 16:53:28 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x12081ff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$setstatus(r0, 0x4, 0x6100) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000340)='./file0\x00', 0x0) r6 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x14001, 0x4) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000080)={0x0, r5}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) close(r7) r8 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) sendfile(r7, r8, 0x0, 0x200019) 16:53:29 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:29 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) timer_create(0x0, 0x0, &(0x7f0000000040)) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='timers\x00') preadv(r2, &(0x7f00000017c0), 0x3da, 0x0) 16:53:29 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) [ 480.475502][T16219] Unknown ioctl 21508 16:53:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x30}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xac, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 16:53:29 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) 16:53:30 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) timer_create(0x0, 0x0, &(0x7f0000000040)) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='timers\x00') preadv(r2, &(0x7f00000017c0), 0x3da, 0x0) 16:53:30 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:30 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(0x0, &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) 16:53:30 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) 16:53:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) [ 481.586277][T16248] Unknown ioctl 21508 16:53:30 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) 16:53:32 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x4e33, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @remote, 0x7}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[@rthdr={{0x28, 0x29, 0x2, {0x0, 0x2, 0x0, 0x0, 0x0, [@ipv4={[], [], @remote}]}}}], 0x28}}], 0x4000000000000db, 0x0) 16:53:32 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(0x0, &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) 16:53:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) 16:53:32 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) timer_create(0x0, 0x0, &(0x7f0000000040)) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='timers\x00') preadv(r2, &(0x7f00000017c0), 0x3da, 0x0) 16:53:32 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) 16:53:32 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) [ 483.177896][ T32] audit: type=1800 audit(1584032012.220:96): pid=16225 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=17286 res=0 [ 483.200933][ T32] audit: type=1800 audit(1584032012.220:97): pid=16229 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=17286 res=0 16:53:32 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(0x0, &(0x7f0000000080)=@random={'os2.', '\'!wlan1\x00'}) [ 483.500363][T16275] Unknown ioctl 21508 16:53:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x30}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xac, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 16:53:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) 16:53:32 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x4e33, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @remote, 0x7}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[@rthdr={{0x28, 0x29, 0x2, {0x0, 0x2, 0x0, 0x0, 0x0, [@ipv4={[], [], @remote}]}}}], 0x28}}], 0x4000000000000db, 0x0) 16:53:32 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', 0x0) 16:53:32 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:32 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = eventfd2(0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/20, 0x14}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[@ANYRESHEX], 0x12) 16:53:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x30}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xac, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 16:53:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) 16:53:33 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x4e33, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @remote, 0x7}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[@rthdr={{0x28, 0x29, 0x2, {0x0, 0x2, 0x0, 0x0, 0x0, [@ipv4={[], [], @remote}]}}}], 0x28}}], 0x4000000000000db, 0x0) [ 484.525257][T16305] Unknown ioctl 21508 16:53:33 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', 0x0) 16:53:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x30}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xac, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 16:53:33 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000003040)='./file0\x00', 0x0) 16:53:33 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x4e33, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @remote, 0x7}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[@rthdr={{0x28, 0x29, 0x2, {0x0, 0x2, 0x0, 0x0, 0x0, [@ipv4={[], [], @remote}]}}}], 0x28}}], 0x4000000000000db, 0x0) 16:53:34 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', 0x0) 16:53:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) 16:53:34 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000100)='./file0\x00', 0x0) fdatasync(r0) 16:53:34 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 16:53:34 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x13, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="8500000018000000350000000000000085000000050000009500009c00000000604cbcf961b54f0ef1690e1af67895effca4a637cca0c16077f17cd67c3b6df74b91d67eef9cdd76b0ea4d455d800f88ddfcc692bbee3c53f94ee77a651402e17ab3b5f0b04d37f2fc94e31bc76d42c393e3a09fca63c5a9f905527e65dc3a0298f03afbabce629d3abaf4a2baa49ca30e22a9040cf30508621fdc30122624b6a34ba1bf3b02bcfcda6673cc9a3e7713227435000000d5e6e05a840bfdf1fee94d50c161a1b5382dae39f733335ac096e1c7879ecdbd4a02dfc45e69ac500d8db51ec650a3f794deb6675bbcb72884cf88095cc017684c41cb166a8b7ccd65b5a3938d02f999dd248cc63b34e874810d522818a7063093ada1df5ea608b4d10d4976b873a0e63c7aee41282a39dc24c08e37ee9ed395e24565cb217664ced5e0d812b2fc9e93281b29a49431e514db22f4306a63b850b857e594e23a0dbd767626013bbb9f82fa4ca99c224ed307d2bd19c9b4828e8c0ddb01040000a0c9ef0931daf31bbb709d5d82a93ee70ab13d4adef3782b1a30faaaab2ee94c07ed1f31ca7384f7afca85bf211433486b41f17344c6f0fc2a8d45339355721dbc503cae546f69959560169f25ec4f37ba60e8817e3a9aa08ead525f4b409b72874941f46ea845ac3ee56b2a85211c8142e9725d0bc34d1347d2e5cc2e238a8c0589ab01aefa5a2182467a6459ec11cf3ef94a7352ffab49e722d7abef1d85d4fbe5dd583813394157ae223eb027316dc7cba223e688dd890a82b5d1b1b52da907a79017cc58e8760081699edb0e5ad4bc971d24c3e68da2f5c9f7de44f18e"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r3, 0x0, 0xe, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000}, 0x28) 16:53:34 executing program 1: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x4e33, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @remote, 0x7}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[@rthdr={{0x28, 0x29, 0x2, {0x0, 0x2, 0x0, 0x0, 0x0, [@ipv4={[], [], @remote}]}}}], 0x28}}], 0x4000000000000db, 0x0) 16:53:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) [ 485.664705][T16344] Unknown ioctl 21508 16:53:34 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) [ 485.929112][ T32] audit: type=1804 audit(1584032014.970:98): pid=16341 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir398352068/syzkaller.USYqtj/194/file0/file0" dev="sda1" ino=17274 res=1 [ 486.177518][T16359] Unknown ioctl 21508 16:53:35 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280), 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0) prctl$PR_GET_NAME(0x10, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_tcp(0xa, 0x1, 0x0) ppoll(&(0x7f0000000100), 0x0, 0x0, &(0x7f00000001c0), 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x3, 0x3, 0xfffffffeffffffff}, 0x0) socket(0x400000000000010, 0x0, 0x0) r3 = socket(0x200000000000011, 0x4000000000080002, 0xdd86) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'ip_vti0\x00', 0x0}) bind$packet(r3, &(0x7f0000000040)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) sendmmsg$inet(r3, &(0x7f0000002b00)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="96c6322ea684879088175969ec15e10d40e4719016cbc15a36a88c6c843e12b1f5cb6a73613ceec274", 0x33}], 0x1, 0x0, 0x0, 0x534}}], 0x40001c0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="346c75737465646e5d005ff311876f556dc02c07ef27762ac2caa2be232f45420b480a5149c19aeded33cb2e5406ede51a79bb2de2ff7d6d23032714c69c02f0dc09fbd0073d1cdd9dfcb2198d5383d821b823589b05bb12839a420ff9f51a"]) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 16:53:35 executing program 1: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x4e33, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @remote, 0x7}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[@rthdr={{0x28, 0x29, 0x2, {0x0, 0x2, 0x0, 0x0, 0x0, [@ipv4={[], [], @remote}]}}}], 0x28}}], 0x4000000000000db, 0x0) 16:53:35 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) 16:53:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) 16:53:35 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 16:53:35 executing program 1: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x4e33, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @remote, 0x7}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[@rthdr={{0x28, 0x29, 0x2, {0x0, 0x2, 0x0, 0x0, 0x0, [@ipv4={[], [], @remote}]}}}], 0x28}}], 0x4000000000000db, 0x0) 16:53:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) [ 486.769278][ T32] audit: type=1326 audit(1584032015.810:99): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=16374 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=265 compat=1 ip=0xf7f3ed99 code=0xffff0000 [ 486.886568][T16381] Unknown ioctl 21508 16:53:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 16:53:36 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(0xffffffffffffffff, &(0x7f000000ac80), 0x66, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:36 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x4e33, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @remote, 0x7}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[@rthdr={{0x28, 0x29, 0x2, {0x0, 0x2, 0x0, 0x0, 0x0, [@ipv4={[], [], @remote}]}}}], 0x28}}], 0x4000000000000db, 0x0) 16:53:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) [ 487.539872][T16406] Unknown ioctl 21508 [ 487.540923][ T32] audit: type=1326 audit(1584032016.580:100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=16374 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=265 compat=1 ip=0xf7f3ed99 code=0xffff0000 16:53:37 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x8086) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000280)='/dev/bsg\x00', 0x0, 0x0) write$P9_RLCREATE(r0, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x1) r1 = socket$inet6(0xa, 0x3, 0x3) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) r2 = socket$key(0xf, 0x3, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f00000000c0)={0x40000000}) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) close(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r3) ioctl$sock_TIOCOUTQ(r3, 0x5411, &(0x7f0000000000)) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r3, 0x8982, &(0x7f0000000040)={0x0, 'wg0\x00', {0x4}, 0xfffe}) r4 = syz_open_procfs(0x0, &(0x7f0000000300)='limits\x00') preadv(r4, &(0x7f0000000480), 0x1000000000000181, 0x0) 16:53:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 16:53:37 executing program 0: r0 = socket(0x100000000011, 0x2, 0x0) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f0000000080)=0x14) sendmsg$NL80211_CMD_LEAVE_MESH(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000f3", @ANYRES16=0x0, @ANYBLOB="000000000000000000fa0000000008000300", @ANYBLOB="8c009900000000000400000008000300", @ANYRES32=r1, @ANYBLOB="0800010003"], 0x6}}, 0x0) r2 = socket(0x10, 0x400000000080803, 0x0) write(r2, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff70880000800328000802020001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) 16:53:37 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(0xffffffffffffffff, &(0x7f000000ac80), 0x66, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:37 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x4e33, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @remote, 0x7}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[@rthdr={{0x28, 0x29, 0x2, {0x0, 0x2, 0x0, 0x0, 0x0, [@ipv4={[], [], @remote}]}}}], 0x28}}], 0x4000000000000db, 0x0) 16:53:37 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) [ 488.108823][T16418] Unknown ioctl 21508 16:53:37 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) 16:53:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) [ 488.330276][T16430] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 488.338591][T16430] netlink: 4592 bytes leftover after parsing attributes in process `syz-executor.0'. 16:53:37 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(0xffffffffffffffff, &(0x7f000000ac80), 0x66, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) [ 488.582430][T16430] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 488.590680][T16430] netlink: 4592 bytes leftover after parsing attributes in process `syz-executor.0'. 16:53:37 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x4e33, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @remote, 0x7}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[@rthdr={{0x28, 0x29, 0x2, {0x0, 0x2, 0x0, 0x0, 0x0, [@ipv4={[], [], @remote}]}}}], 0x28}}], 0x4000000000000db, 0x0) 16:53:37 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000400)=""/222) [ 488.919306][T16450] Unknown ioctl 21508 16:53:38 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) [ 489.603883][ T32] audit: type=1326 audit(1584032018.640:101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=16464 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=265 compat=1 ip=0xf7f3ed99 code=0xffff0000 16:53:39 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x8086) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000280)='/dev/bsg\x00', 0x0, 0x0) write$P9_RLCREATE(r0, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x1) r1 = socket$inet6(0xa, 0x3, 0x3) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) r2 = socket$key(0xf, 0x3, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f00000000c0)={0x40000000}) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) close(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r3) ioctl$sock_TIOCOUTQ(r3, 0x5411, &(0x7f0000000000)) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r3, 0x8982, &(0x7f0000000040)={0x0, 'wg0\x00', {0x4}, 0xfffe}) r4 = syz_open_procfs(0x0, &(0x7f0000000300)='limits\x00') preadv(r4, &(0x7f0000000480), 0x1000000000000181, 0x0) 16:53:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x30}]}, 0x0, 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 16:53:39 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:39 executing program 1: socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x4e33, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @remote, 0x7}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[@rthdr={{0x28, 0x29, 0x2, {0x0, 0x2, 0x0, 0x0, 0x0, [@ipv4={[], [], @remote}]}}}], 0x28}}], 0x4000000000000db, 0x0) 16:53:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) [ 490.236832][ T32] audit: type=1326 audit(1584032019.280:102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=16464 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=265 compat=1 ip=0xf7f3ed99 code=0xffff0000 [ 490.368552][T16482] Unknown ioctl 21508 16:53:39 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) utimes(&(0x7f00000004c0)='./file0\x00', 0x0) 16:53:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) 16:53:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x30}]}, 0x0, 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 16:53:39 executing program 1: socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x4e33, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @remote, 0x7}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[@rthdr={{0x28, 0x29, 0x2, {0x0, 0x2, 0x0, 0x0, 0x0, [@ipv4={[], [], @remote}]}}}], 0x28}}], 0x4000000000000db, 0x0) 16:53:39 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:40 executing program 1: socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x4e33, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @remote, 0x7}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[@rthdr={{0x28, 0x29, 0x2, {0x0, 0x2, 0x0, 0x0, 0x0, [@ipv4={[], [], @remote}]}}}], 0x28}}], 0x4000000000000db, 0x0) 16:53:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) [ 491.481182][T16525] Unknown ioctl 21508 16:53:41 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000702000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000000000811e6403000000000045040400010000001704000001000a00b7040000000100006a0af2fe00000000850000001a000000b70000000000000095000000000000009e17890efaee5eab7ff8a8cdc21ce784909b849d55500400000054d8877a6db61d69f2ffcaa10350e11cb97c8adf1bc9a0c4ee6d9674c77404ceb9971e43405d621ffbc9a4fd39b0b56bfe6508ebb3c44eb84049761451ce540c772e2d9f8004e26f7fcc059c062234d5595f6fba87b81d1106fb0289ce67a66afd9ac3d09e29a9d542ca9d85a5c9679838def0a83a733dc6a39b63a5ed69d32394c53361d7480884bd8048a967d9b912ef9f1d6fee41f5b29d37acb91c61ccd1df673896453535d1fd990f859ce8122a79c3e400000000008475d5813b04b92ed18696ff73e9d9fbc1dc1174c74822"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340), 0x19e}, 0x42) 16:53:41 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) utimes(&(0x7f00000004c0)='./file0\x00', 0x0) 16:53:41 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x30}]}, 0x0, 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 16:53:41 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) 16:53:41 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00', 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) 16:53:41 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="03000000000000009d6c10119e06d85f02635d2c7a4299e22153d32132f88a181ee9589df63eaf3050b9568e6bb20639e2d01f2dfdc87c8ea92815b757dc7d65fd046d533368df3fef8c000000002e880e95e3d4b3bee88664e8fdafbfab3e18d3e924d36671e0d9625cc57a50caddc2cc0ca4f70f842cd6e1aa504f02782c3c35a79d9c3971b4b086b07641d9a7b29452505efb1fe4a04b7bb29e068a0000000000000000000000000000000000000000000000000000a4c73cdb32823b297c5dbcb8672b40ad16e36163fbea462dd5527db8eee997b5ef860abd3d4a0638322b2e3cd8f213e3115b020400000326eb88f1d55f9c2d3b9e8bc67bbd3f9797bcd87925312f33d960c672df7178a5f619bffe7100d62973c91d91d4e7adc729d5bd3262c0325a81f3d8487b21b90da25eabe755173329b53c11cb32952dfd17ed87020f79d750d8f936a965d497c6dad922e6618172c21ae6c52637d8628020662f7049248fe016715b46937c444eeecfa0"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:41 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$peeksig(0x4201, r3, 0x0, &(0x7f0000000080)) socket$inet6(0xa, 0x0, 0x0) 16:53:41 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x30}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0xac, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 492.254143][T16542] Unknown ioctl 21508 16:53:41 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00', 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) 16:53:41 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) 16:53:41 executing program 2: shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x4000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) statx(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fsync(0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='oom_score_adj\x00') ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x7a00, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000100), 0x4) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x220020, 0x0) r1 = syz_open_procfs(0x0, 0x0) lseek(r1, 0xfffffffffffffffa, 0x0) sendmsg$NFNL_MSG_ACCT_DEL(0xffffffffffffffff, 0x0, 0x8000) shmdt(0x0) 16:53:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) [ 492.712596][T16556] ptrace attach of "/root/syz-executor.0"[11968] was attempted by "/root/syz-executor.0"[16556] 16:53:41 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00', 0x4) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) 16:53:41 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x30}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0xac, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 16:53:42 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) [ 493.048055][T16556] ptrace attach of "/root/syz-executor.0"[11968] was attempted by "/root/syz-executor.0"[16556] 16:53:42 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00', 0x6) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) [ 493.274809][T16575] Unknown ioctl 21508 16:53:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340), 0x19e}, 0x42) socket$inet6_udp(0xa, 0x2, 0x0) [ 493.412627][T16570] option changes via remount are deprecated (pid=16564 comm=syz-executor.2) 16:53:42 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x4e33, 0x0, @dev}, 0x1c, 0x0}}], 0x1, 0x0) 16:53:42 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x30}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0xac, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 493.558215][T16576] option changes via remount are deprecated (pid=16564 comm=syz-executor.2) 16:53:42 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$peeksig(0x15, r3, 0x0, &(0x7f0000000080)) 16:53:43 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00', 0x6) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) 16:53:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="03000000000000009d6c10119e06d85f02635d2c7a4299e22153d32132f88a181ee9589df63eaf3050b9568e6bb20639e2d01f2dfdc87c8ea92815b757dc7d65fd046d533368df3fef8c000000002e880e95e3d4b3bee88664e8fdafbfab3e18d3e924d36671e0d9625cc57a50caddc2cc0ca4f70f842cd6e1aa504f02782c3c35a79d9c3971b4b086b07641d9a7b29452505efb1fe4a04b7bb29e068a0000000000000000000000000000000000000000000000000000a4c73cdb32823b297c5dbcb8672b40ad16e36163fbea462dd5527db8eee997b5ef860abd3d4a0638322b2e3cd8f213e3115b020400000326eb88f1d55f9c2d3b9e8bc67bbd3f9797bcd87925312f33d960c672df7178a5f619bffe7100d62973c91d91d4e7adc729d5bd3262c0325a81f3d8487b21b90da25eabe755173329b53c11cb32952dfd17ed87020f79d750d8f936a965d497c6dad922e6618172c21ae6c52637d8628020662f7049248fe016715b46937c444eeecfa0"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:43 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x4e33, 0x0, @dev}, 0x1c, 0x0}}], 0x1, 0x0) 16:53:43 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x30}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) [ 494.354110][T16603] ptrace attach of "/root/syz-executor.2"[12227] was attempted by "/root/syz-executor.2"[16603] [ 494.427551][T16603] ptrace attach of "/root/syz-executor.2"[12227] was attempted by "/root/syz-executor.2"[16603] 16:53:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340), 0x19e}, 0x42) 16:53:43 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00', 0x6) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) [ 494.624099][T16612] Unknown ioctl 21508 16:53:43 executing program 2: 16:53:43 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x30}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 16:53:43 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x4e33, 0x0, @dev}, 0x1c, 0x0}}], 0x1, 0x0) 16:53:44 executing program 2: 16:53:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00', 0x7) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) 16:53:44 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x30}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 16:53:44 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x4e33, 0x0, @dev}, 0x1c, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[@rthdr={{0x24, 0x29, 0x2, {0x0, 0x2, 0x0, 0x0, 0x0, [@ipv4={[], [], @remote}]}}}], 0x24}}], 0x2, 0x0) 16:53:44 executing program 0: [ 495.803921][T16639] Unknown ioctl 21508 16:53:44 executing program 2: 16:53:45 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x4e33, 0x0, @dev}, 0x1c, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[@rthdr={{0x24, 0x29, 0x2, {0x0, 0x2, 0x0, 0x0, 0x0, [@ipv4={[], [], @remote}]}}}], 0x24}}], 0x2, 0x0) 16:53:45 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00', 0x7) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) 16:53:45 executing program 4: 16:53:45 executing program 0: 16:53:45 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x3, 0xaa) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f00000002c0)=@nat={'nat\x00', 0x1b, 0x5, 0x578, 0x388, 0x388, 0x0, 0x140, 0x0, 0x4a8, 0x4a8, 0x4a8, 0x4a8, 0x4a8, 0x5, 0x0, {[{{@uncond, 0x0, 0x118, 0x140, 0x0, {}, [@common=@unspec=@connlabel={{0x28, 'connlabel\x00'}}, @common=@hbh={{0x48, 'hbh\x00'}}]}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@rand_addr="99a55b80094963ce6cc0acf5d6ef8442", @ipv4=@dev}}}, {{@ipv6={@empty, @local, [], [], 'geneve1\x00', 'xfrm0\x00'}, 0x0, 0x118, 0x158, 0x0, {}, [@common=@dst={{0x48, 'dst\x00'}}, @common=@eui64={{0x28, 'eui64\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@local, @dev, [], [], 'veth1_to_bridge\x00', 'macvtap0\x00'}, 0x0, 0xd8, 0x120, 0x0, {}, [@common=@frag={{0x30, 'frag\x00'}}]}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv4=@multicast1, @ipv4=@local, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5d8) 16:53:45 executing program 4: capset(&(0x7f00001b4ff8)={0x19980330}, &(0x7f000077ffe8)) r0 = socket$inet6(0xa, 0x80002, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000080)) 16:53:45 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00', 0x7) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) 16:53:45 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:45 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x4e33, 0x0, @dev}, 0x1c, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[@rthdr={{0x24, 0x29, 0x2, {0x0, 0x2, 0x0, 0x0, 0x0, [@ipv4={[], [], @remote}]}}}], 0x24}}], 0x2, 0x0) 16:53:45 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}]}, 0x40}}, 0x0) 16:53:46 executing program 2: madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xe) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) vmsplice(r1, &(0x7f0000000580)=[{&(0x7f0000001a00)="d8", 0xfffffdbb}], 0x1, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 497.045532][T16671] capability: warning: `syz-executor.4' uses 32-bit capabilities (legacy support in use) 16:53:46 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) [ 497.217613][T16678] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 497.230794][T16679] Unknown ioctl 21508 16:53:46 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x4e33, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x7}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[@rthdr={{0x28, 0x29, 0x2, {0x0, 0x2, 0x0, 0x0, 0x0, [@ipv4={[], [], @remote}]}}}], 0x28}}], 0x4000000000000db, 0x0) 16:53:46 executing program 4: capset(&(0x7f00001b4ff8)={0x19980330}, &(0x7f000077ffe8)) r0 = socket$inet6(0xa, 0x80002, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000080)) [ 497.298681][T16683] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 16:53:46 executing program 0: ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000140)="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") socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r4}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_IIF={0x8, 0x3, r4}]}, 0x24}}, 0x0) 16:53:46 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) 16:53:46 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:46 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x4e33, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x7}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[@rthdr={{0x28, 0x29, 0x2, {0x0, 0x2, 0x0, 0x0, 0x0, [@ipv4={[], [], @remote}]}}}], 0x28}}], 0x4000000000000db, 0x0) 16:53:46 executing program 4: capset(&(0x7f00001b4ff8)={0x19980330}, &(0x7f000077ffe8)) r0 = socket$inet6(0xa, 0x80002, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000080)) 16:53:47 executing program 0: socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @rand_addr="9a19c5170f759b6b23322eae882c00fc", 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r3}) 16:53:47 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) [ 498.208583][T16707] Unknown ioctl 21508 16:53:47 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x4e33, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x7}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[@rthdr={{0x28, 0x29, 0x2, {0x0, 0x2, 0x0, 0x0, 0x0, [@ipv4={[], [], @remote}]}}}], 0x28}}], 0x4000000000000db, 0x0) 16:53:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x7a, &(0x7f0000000080)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r2}]}, @IFLA_GROUP={0x8}]}, 0x34}, 0x1, 0xfcffffff00000000, 0x0, 0xffffff9e}, 0x0) 16:53:47 executing program 4: capset(&(0x7f00001b4ff8)={0x19980330}, &(0x7f000077ffe8)) r0 = socket$inet6(0xa, 0x80002, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000080)) 16:53:47 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:47 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) 16:53:47 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) setreuid(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$tun(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) open$dir(0x0, 0x0, 0x0) r0 = getpid() tkill(r0, 0x9) mount$overlay(0x400019, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0xa00, &(0x7f00000002c0)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}]}) 16:53:48 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x4e33, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[@rthdr={{0x28, 0x29, 0x2, {0x0, 0x2, 0x0, 0x0, 0x0, [@ipv4={[], [], @remote}]}}}], 0x28}}], 0x4000000000000db, 0x0) 16:53:48 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x6d) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0x6202, 0x4) sendto$packet(r0, &(0x7f0000000180)="65280d9915144374ea50b114ac16", 0xe, 0x0, &(0x7f0000000280)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="e4b4edbc90dd"}, 0x14) socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000140)) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 16:53:48 executing program 4: capset(&(0x7f00001b4ff8)={0x19980330}, &(0x7f000077ffe8)) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, &(0x7f0000000080)) 16:53:48 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) [ 499.315326][T16742] Unknown ioctl 21508 16:53:48 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x4e33, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[@rthdr={{0x28, 0x29, 0x2, {0x0, 0x2, 0x0, 0x0, 0x0, [@ipv4={[], [], @remote}]}}}], 0x28}}], 0x4000000000000db, 0x0) 16:53:48 executing program 4: capset(&(0x7f00001b4ff8)={0x19980330}, &(0x7f000077ffe8)) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, &(0x7f0000000080)) 16:53:48 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfdef) 16:53:49 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r1 = socket$inet(0xa, 0x801, 0x0) listen(r1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='net/tcp\x00') sendfile(r0, r2, 0x0, 0xedc0) 16:53:49 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:49 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:53:49 executing program 4: capset(&(0x7f00001b4ff8)={0x19980330}, &(0x7f000077ffe8)) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, &(0x7f0000000080)) 16:53:49 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x4e33, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[@rthdr={{0x28, 0x29, 0x2, {0x0, 0x2, 0x0, 0x0, 0x0, [@ipv4={[], [], @remote}]}}}], 0x28}}], 0x4000000000000db, 0x0) 16:53:49 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, 0x0, 0x0) 16:53:49 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000080)) 16:53:49 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg$sock(r0, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 16:53:49 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x4e33, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @remote, 0x7}, 0x1c, 0x0}}], 0x2, 0x0) 16:53:49 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, 0x0, 0x0) 16:53:50 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="03000000000000009d6c10119e06d85f02635d2c7a4299e22153d32132f88a181ee9589df63eaf3050b9568e6bb20639e2d01f2dfdc87c8ea92815b757dc7d65fd046d533368df3fef8c000000002e880e95e3d4b3bee88664e8fdafbfab3e18d3e924d36671e0d9625cc57a50caddc2cc0ca4f70f842cd6e1aa504f02782c3c35a79d9c3971b4b086b07641d9a7b29452505efb1fe4a04b7bb29e068a0000000000000000000000000000000000000000000000000000a4c73cdb32823b297c5dbcb8672b40ad16e36163fbea462dd5527db8eee997b5ef860abd3d4a0638322b2e3cd8f213e3115b020400000326eb88f1d55f9c2d3b9e8bc67bbd3f9797bcd87925312f33d960c672df7178a5f619bffe7100d62973c91d91d4e7adc729d5bd3262c0325a81f3d8487b21b90da25eabe755173329b53c11cb32952dfd17ed87020f79d750d8f936a965d497c6dad922e6618172c21ae6c52637d8628020662f7049248fe016715b46937c444eeecfa0"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:50 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000080)) 16:53:50 executing program 0: [ 501.277541][T16802] Unknown ioctl 21508 16:53:50 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:53:50 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, 0x0, 0x0) 16:53:50 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x4e33, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @remote, 0x7}, 0x1c, 0x0}}], 0x2, 0x0) 16:53:50 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000080)) 16:53:50 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="03000000000000009d6c10119e06d85f02635d2c7a4299e22153d32132f88a181ee9589df63eaf3050b9568e6bb20639e2d01f2dfdc87c8ea92815b757dc7d65fd046d533368df3fef8c000000002e880e95e3d4b3bee88664e8fdafbfab3e18d3e924d36671e0d9625cc57a50caddc2cc0ca4f70f842cd6e1aa504f02782c3c35a79d9c3971b4b086b07641d9a7b29452505efb1fe4a04b7bb29e068a0000000000000000000000000000000000000000000000000000a4c73cdb32823b297c5dbcb8672b40ad16e36163fbea462dd5527db8eee997b5ef860abd3d4a0638322b2e3cd8f213e3115b020400000326eb88f1d55f9c2d3b9e8bc67bbd3f9797bcd87925312f33d960c672df7178a5f619bffe7100d62973c91d91d4e7adc729d5bd3262c0325a81f3d8487b21b90da25eabe755173329b53c11cb32952dfd17ed87020f79d750d8f936a965d497c6dad922e6618172c21ae6c52637d8628020662f7049248fe016715b46937c444eeecfa0"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:50 executing program 3: 16:53:50 executing program 0: 16:53:50 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x4e33, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @remote, 0x7}, 0x1c, 0x0}}], 0x2, 0x0) 16:53:51 executing program 4: capset(0x0, &(0x7f000077ffe8)) r0 = socket$inet6(0xa, 0x80002, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000080)) [ 502.193918][T16828] Unknown ioctl 21508 16:53:51 executing program 0: 16:53:51 executing program 3: 16:53:51 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x4e33, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @remote, 0x7}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)}}], 0x2, 0x0) 16:53:52 executing program 2: 16:53:52 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="03000000000000009d6c10119e06d85f02635d2c7a4299e22153d32132f88a181ee9589df63eaf3050b9568e6bb20639e2d01f2dfdc87c8ea92815b757dc7d65fd046d533368df3fef8c000000002e880e95e3d4b3bee88664e8fdafbfab3e18d3e924d36671e0d9625cc57a50caddc2cc0ca4f70f842cd6e1aa504f02782c3c35a79d9c3971b4b086b07641d9a7b29452505efb1fe4a04b7bb29e068a0000000000000000000000000000000000000000000000000000a4c73cdb32823b297c5dbcb8672b40ad16e36163fbea462dd5527db8eee997b5ef860abd3d4a0638322b2e3cd8f213e3115b020400000326eb88f1d55f9c2d3b9e8bc67bbd3f9797bcd87925312f33d960c672df7178a5f619bffe7100d62973c91d91d4e7adc729d5bd3262c0325a81f3d8487b21b90da25eabe755173329b53c11cb32952dfd17ed87020f79d750d8f936a965d497c6dad922e6618172c21ae6c52637d8628020662f7049248fe016715b46937c444eeecfa0"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:52 executing program 3: 16:53:52 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x4e33, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @remote, 0x7}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)}}], 0x2, 0x0) 16:53:52 executing program 4: capset(0x0, &(0x7f000077ffe8)) r0 = socket$inet6(0xa, 0x80002, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000080)) 16:53:52 executing program 0: [ 503.211667][T16857] Unknown ioctl 21508 16:53:52 executing program 4: capset(0x0, &(0x7f000077ffe8)) r0 = socket$inet6(0xa, 0x80002, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000080)) 16:53:52 executing program 3: 16:53:52 executing program 0: 16:53:52 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x4e33, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @remote, 0x7}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)}}], 0x2, 0x0) 16:53:52 executing program 2: 16:53:52 executing program 4: capset(&(0x7f00001b4ff8), &(0x7f000077ffe8)) r0 = socket$inet6(0xa, 0x80002, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000080)) 16:53:52 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x4e33, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @remote, 0x7}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[@rthdr={{0x14, 0x29, 0x2}}], 0x14}}], 0x2, 0x0) 16:53:53 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="03000000000000009d6c10119e06d85f02635d2c7a4299e22153d32132f88a181ee9589df63eaf3050b9568e6bb20639e2d01f2dfdc87c8ea92815b757dc7d65fd046d533368df3fef8c000000002e880e95e3d4b3bee88664e8fdafbfab3e18d3e924d36671e0d9625cc57a50caddc2cc0ca4f70f842cd6e1aa504f02782c3c35a79d9c3971b4b086b07641d9a7b29452505efb1fe4a04b7bb29e068a0000000000000000000000000000000000000000000000000000a4c73cdb32823b297c5dbcb8672b40ad16e36163fbea462dd5527db8eee997b5ef860abd3d4a0638322b2e3cd8f213e3115b020400000326eb88f1d55f9c2d3b9e8bc67bbd3f9797bcd87925312f33d960c672df7178a5f619bffe7100d62973c91d91d4e7adc729d5bd3262c0325a81f3d8487b21b90da25eabe755173329b53c11cb32952dfd17ed87020f79d750d8f936a965d497c6dad922e6618172c21ae6c52637d8628020662f7049248fe016715b46937c444eeecfa0"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:53 executing program 0: 16:53:53 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f00000005c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000100)='./file0\x00', 0x0) unlink(&(0x7f00000001c0)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0x3fd, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x2c}}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f00000006c0)="c758eaccd215f1b08e23e85eca43e764033a652fa604bf3a76e9e4b85744bbf214f39c700c5350bec3d9bed9268f6a162b139917cefb6592b2d1b4243addc3d2415ad3cdbe835e69d8edf3d18d069384215e6ceb6ca98ee5fc9a01867c543aa29ba3acfd31326c5fc2d92cf4bfd47fca125d4b886fe795c0b9404fdb51801f4936b76ea29ce1c4e73502b53ae3892e95646e39a3f8d4e86bd1fea08c6c7f31ac6bcaf212e4df80aeb2a75c3c", 0xac, 0xc001, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="c5", 0x1, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x4008066, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) sendto$inet6(r4, &(0x7f0000001440)="c7", 0x1, 0xc001, 0x0, 0x0) sendto$inet6(r4, &(0x7f0000000000)="c5", 0x1, 0x0, 0x0, 0x0) r5 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x4008066, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) sendto$inet6(r5, &(0x7f0000001440)="c7", 0x1, 0xc001, 0x0, 0x0) sendto$inet6(r5, &(0x7f0000000000)="c5", 0x1, 0x0, 0x0, 0x0) fcntl$dupfd(r4, 0x406, r5) r6 = eventfd2(0x0, 0x0) dup(r6) r7 = eventfd2(0x0, 0x0) dup(r7) r8 = eventfd2(0x0, 0x0) r9 = dup(r8) read$FUSE(r9, &(0x7f0000001280), 0x1000) r10 = open(&(0x7f0000000140)='./file0\x00', 0x20141042, 0x0) write$selinux_attr(r10, &(0x7f0000000180)='system_u:object_r:hugetlbfs_t:s0\x00', 0x5571) r11 = eventfd2(0x0, 0x0) r12 = dup(r11) read$FUSE(r12, 0x0, 0x0) r13 = open(&(0x7f0000000140)='./file0\x00', 0x20141042, 0x0) write$selinux_attr(r13, &(0x7f0000000180)='system_u:object_r:hugetlbfs_t:s0\x00', 0x5571) sendfile(r12, r13, &(0x7f0000000080), 0x2008000fffffffe) eventfd2(0x0, 0x0) open(0x0, 0x20141042, 0x0) 16:53:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$random(0xffffffffffffff9c, &(0x7f0000000280)='/dev/urandom\x00', 0x2040, 0x0) sendmmsg(r0, &(0x7f0000005600)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002400)=ANY=[]}}, {{0x0, 0x0, &(0x7f0000005400)=[{0x0}, {&(0x7f0000003fc0)="904902949868422c0606c3b5b63654888c5e2af4cc5fd9a82285a4fce345292f1d34c37d4e40362928b4a269ccee01e73605a3a8832014175c4fb1675c37", 0x3e}, {0x0}, {&(0x7f0000005280)="e563635b45a19e98a0c8ffc60434cd87dcc910cba67b32198de65cc359bb7e1406cff34b37e86e8e83e28ed7fddbd68d68d3958ed9f43feba4d89d15f802d7cf4a28d7a3be10844e4c8d2d8d465c1506f0b83745e44b993b833a67e603be1cc73016bdc3bf69fcca34f81cd6aac94dd1efc0fc85da58254885c39cfe7d32bcbe44b6d71c53ce06e3f8938f4830b87b6b748d12c8dc721079a6952f35ef66cb16c83998fcb6b33bc4f0fe6bab46470b3fd84a09d81485d6e1712b70f414ccd572bd47e060d06994e7b5231ca668cd6eec7de2f7274ca6e8889bc35fbe", 0xdc}, {&(0x7f0000005380)="77aa7567ac346b1787edec90b6f26e410e21b1d333718f395693dc93d2002901850baba9eb844ae5ee6404a5501cc78435aa0c22f1408b99f19d9a4bce50258f2974e1376834cb34ac08dee034", 0x4d}], 0x5}}], 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) sendmsg$inet6(r1, &(0x7f0000001840)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c, 0x0}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_dev$sndtimer(0x0, 0x0, 0x0) r2 = memfd_create(0x0, 0x0) r3 = creat(0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000003940)={&(0x7f0000003a00)=@sco={0x1f, @none}, 0x80, &(0x7f0000006a40)=[{0x0}, {&(0x7f00000058c0)="1c4088cdfe7c9c0d4cac1d1628c97833b1af91b06b2a0366b4c280bfe482811769d5a848dd7f292a245642f98de7cb332490e17f1872eb06648f486a55a43be813e863d7b59158c5c8c13520868462827465fe745e49caeaff7871356b12a8def2612f2ade8ede5c53c06e5a35", 0x6d}], 0x2}, 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) read$eventfd(r3, 0x0, 0x0) setsockopt$sock_void(r1, 0x1, 0x24, 0x0, 0x0) fallocate(r2, 0x0, 0xfa9, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000080)) r4 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r5 = msgget$private(0x0, 0x204) msgctl$IPC_STAT(r5, 0x2, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000640)={@broadcast, @broadcast, r7}, 0xc) sendmsg$BATADV_CMD_GET_DAT_CACHE(r6, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x5c, 0x0, 0x4, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r7}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x800}, 0x8810) r8 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000000480)=""/4096) r9 = dup(r8) setsockopt$inet6_tcp_int(r9, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r8, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r8, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000100), 0x2}, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r10 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x800fe) sendfile(r9, r10, 0x0, 0x8000fffffffe) 16:53:53 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x4e33, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @remote, 0x7}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[@rthdr={{0x14, 0x29, 0x2}}], 0x14}}], 0x2, 0x0) 16:53:53 executing program 4: capset(&(0x7f00001b4ff8), &(0x7f000077ffe8)) r0 = socket$inet6(0xa, 0x80002, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000080)) 16:53:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1524}, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="0f01a3"], 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 504.558145][T16894] Unknown ioctl 21508 [ 504.667768][T16887] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 16:53:53 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x4e33, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @remote, 0x7}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[@rthdr={{0x14, 0x29, 0x2}}], 0x14}}], 0x2, 0x0) 16:53:54 executing program 4: capset(&(0x7f00001b4ff8), &(0x7f000077ffe8)) r0 = socket$inet6(0xa, 0x80002, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000080)) 16:53:54 executing program 2: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) creat(0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000001c0)=""/11) 16:53:54 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:54 executing program 0: syslog(0x3, &(0x7f0000000000)=""/32, 0x20) 16:53:54 executing program 3: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x6, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x20000000000, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xf) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) 16:53:54 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @remote, 0x7}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[@rthdr={{0x24, 0x29, 0x2, {0x0, 0x2, 0x0, 0x0, 0x0, [@ipv4={[], [], @remote}]}}}], 0x24}}], 0x1, 0x0) 16:53:55 executing program 4: capset(&(0x7f00001b4ff8)={0x19980330}, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000080)) [ 506.237941][T16930] Unknown ioctl 21508 16:53:55 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @remote, 0x7}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[@rthdr={{0x24, 0x29, 0x2, {0x0, 0x2, 0x0, 0x0, 0x0, [@ipv4={[], [], @remote}]}}}], 0x24}}], 0x1, 0x0) 16:53:55 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000140)) timer_create(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x0) 16:53:55 executing program 0: epoll_create1(0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 16:53:55 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000800)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c1030000030000002004000080020000800200008002000000000000800200005003000050030000500300005003000050030000030000000000000000000000fe8000000000000000000000000000bbff020000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000076657468315f746f5f626f6e640000006e6574706369300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500280020000000800000000000000000000000000000000000000005001686173686c696d697400000000000000000000000000000000000000000273797a6b616c6c65723100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000fe18b61a000800000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a6b616c6c657231000000000000000000000000000004000000000000000000001528000000a60000000000000000000000000000003000434f4e4ecd41524b00000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800434c4153534946590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) 16:53:55 executing program 4: capset(&(0x7f00001b4ff8)={0x19980330}, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000080)) 16:53:55 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:56 executing program 3: syz_open_dev$sndseq(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/nf_conntrack\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r4, r3, 0x0, 0x4002000004000) 16:53:56 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @remote, 0x7}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[@rthdr={{0x24, 0x29, 0x2, {0x0, 0x2, 0x0, 0x0, 0x0, [@ipv4={[], [], @remote}]}}}], 0x24}}], 0x1, 0x0) 16:53:56 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/bus/input/handlers\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) [ 507.115842][T16962] Unknown ioctl 21508 16:53:56 executing program 4: capset(&(0x7f00001b4ff8)={0x19980330}, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000080)) 16:53:56 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, &(0x7f0000000100)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002a40)=[{{&(0x7f00000002c0)=@l2tp, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000440)=""/138, 0x8a}, {&(0x7f0000000500)=""/246, 0xf6}, {&(0x7f0000000600)=""/153, 0x99}, {&(0x7f00000006c0)=""/108, 0x6c}, {&(0x7f0000000740)=""/171, 0xab}, {&(0x7f0000000800)=""/198, 0xc6}, {&(0x7f0000000900)=""/153, 0x99}], 0x7, &(0x7f0000000a40)=""/31, 0x1f}, 0x9}, {{&(0x7f0000000a80)=@isdn, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b00)=""/148, 0x94}], 0x1, &(0x7f0000000c00)=""/145, 0x91}, 0x7f}, {{&(0x7f0000000cc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000000e40)=[{&(0x7f0000002b80)=""/223, 0xdf}], 0x1, &(0x7f0000001a40)=""/4096, 0x1000}, 0x7}, {{&(0x7f0000000e80)=@in={0x2, 0x0, @empty}, 0x80, &(0x7f0000001340)=[{0x0}, {&(0x7f0000000f80)=""/85, 0x55}, {&(0x7f0000001000)=""/111, 0x6f}, {&(0x7f0000001080)=""/95, 0x5f}, {&(0x7f0000001100)=""/240, 0xf0}, {&(0x7f0000001200)=""/139, 0x8b}, {&(0x7f00000012c0)}, {&(0x7f0000001300)=""/51, 0x33}], 0x8, &(0x7f00000013c0)=""/203, 0xcb}, 0x401}, {{&(0x7f00000014c0)=@nfc_llcp, 0x80, &(0x7f0000001580)=[{&(0x7f0000001540)=""/62, 0x3e}], 0x1}, 0xfffffff8}], 0x5, 0x10100, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="4c0000001200ef09fffefd956fa283b7270fd917df226c24a6008000200000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f48d947f1e128a02500c57bb7", 0x58}], 0x1}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r4, &(0x7f0000001380), 0x4000056, 0x0, &(0x7f0000000200)={0x77359400}) sendto$inet(0xffffffffffffffff, &(0x7f0000001680)="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", 0x385, 0x805, &(0x7f0000000140)={0x2, 0x4e20, @multicast2}, 0x10) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000180)=""/246) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 16:53:56 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:56 executing program 4: capset(&(0x7f00001b4ff8)={0x19980330}, &(0x7f000077ffe8)) r0 = socket$inet6(0xa, 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000080)) 16:53:56 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @remote, 0x7}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[@rthdr={{0x24, 0x29, 0x2, {0x0, 0x2, 0x0, 0x0, 0x0, [@ipv4={[], [], @remote}]}}}], 0x24}}], 0x2, 0x0) 16:53:57 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/bus/input/handlers\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) 16:53:57 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a40)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff00000000080001007166710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a010c3"], 0x74}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB='H\x00\x00\x00(\x00\'\r\x00'/20, @ANYRES32=r5, @ANYBLOB="0000000000000000000000000a0001007273767036000000180002001400020000aa00"/48], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 508.284652][T16994] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 508.294388][T16994] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 508.326347][T16997] Unknown ioctl 21508 [ 508.466558][T16985] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. 16:53:57 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @remote, 0x7}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[@rthdr={{0x24, 0x29, 0x2, {0x0, 0x2, 0x0, 0x0, 0x0, [@ipv4={[], [], @remote}]}}}], 0x24}}], 0x2, 0x0) [ 508.539166][T16985] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 508.616890][T16985] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 508.638927][T16985] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. 16:53:57 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) [ 508.660244][T16985] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 508.685100][T16985] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 508.704119][T16985] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. 16:53:57 executing program 4: capset(&(0x7f00001b4ff8)={0x19980330}, &(0x7f000077ffe8)) r0 = socket$inet6(0xa, 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000080)) [ 508.817424][T16985] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 508.961978][T17008] netlink: 'syz-executor.3': attribute type 2 has an invalid length. 16:53:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) write(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) listen(r1, 0x400000001ffffffd) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1a1100, 0x0) r2 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x0, 0x0, &(0x7f0000000040)={0x0, 0x2, 0x5}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r3, 0x0, 0x0}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@empty, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f00000018c0)=0xe8) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) mq_timedreceive(r2, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f00000013c0)=ANY=[@ANYBLOB="58020000050b010e25bd7000fbdbdf250c0000043cf511efc6d5eda75b3728b47f540d6449aa379c83c68a18891d16c3728521afea89fad3c724aa36bc8b85889761116def8caa0a81195e261ddc022d376f623543e6478ac185eb39549a05f47e8f1f0cd0a2fc23a7be2b0e2ca97bb24d730ab5d6500c416222124b3e36bcbde0e2fd6889a45fbb0cc725cf", @ANYRES32=r2, @ANYBLOB], 0x3}}, 0x44) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VIDIOC_S_STD(0xffffffffffffffff, 0x40085618, &(0x7f0000001380)=0x80000) sendmmsg(r5, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x7000000}}], 0x4000000000000d0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) lsetxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v3={0x3000000, [{0xd0}, {0x0, 0x80}], r6}, 0x18, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000001640)=[0x0, &(0x7f00000014c0)='security.capability\x00', &(0x7f0000001500)='\x00', &(0x7f0000001540)='/em0em0\x00', &(0x7f0000001580)='GPLproc^\xaa^vmnet0-system\x00', &(0x7f0000001600)='*user[selinux!%lo\x00'], &(0x7f0000001780)=[&(0x7f0000001680)='NLBL_\x86\x8a\xc8\x9eMB\x80V', &(0x7f0000001700)=']\x00', &(0x7f0000001740)='/dev/vcs\x00']) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000040)=@buf={0xfb1, &(0x7f00000003c0)="d5121a1aa66abcf60906338d2e6fb9d83b597a1ee95651a8a4b1687544925af5e6a4af8a1b59171dc8ae88b3711d395e37d4cba5406b8a11ad50739b29d5b2aebcc742d3e282507f5878d7ad99739f228bf6567c257ccae04e28bc18851e02ad56b5dfe9128ae9b7c3c2a96b3d974d0b5b90a2ec91278610db1fd5b2118300db5931860ec6509d3b9cca57a157514c4045f141a5df2c7e918c36649c5a136c8e1984d0606f7f99c72d3f0d7c157938059f6530cbb3a3ce5f202987d8f6e610256b963e99a184000d9921d6ca92a424a36931610a3c32565362219b40c4d993c59c243c282eb47ca5a94fed497cba33f4d1a3d618a766fcaf2a0c8d8035d8bd39d315a9d9c8faddb38c31b7c3c715ffaf6bc9658b8e42aaf02f9ed96ce22bb8e90d56622e6b9190f994f2f09032f258c79a55324997aa668cffe3dfd843ae672562e156b6697e9fe3931fbfd57fb611eca6ac66f7631d0d7c1c9971440c4661999100aea8bfd0449c76bcfba719cf241d13220dc029f82d00f706f01cbfb6444716e280db9f107337e659775811b6d7aa0424701d50dca227120dec0f4227a56cf63d4ef2364bc027b8a8a50b3a30ffe2054e0946b7de0e9784ecf409786dd2b64673c85a5d0e5656d61c646735e9d4351846622b695f32b654a150b0180cddec0e367372b7ea07c423afcf18509558e36aac113db53eb5ad593bd8a72cbe0c609d18f723cc7ab4635ee32e22443632628247c241fee7cef2bfe4e5c21b358e05d412440bc128dcfd9ed0e89eeb463c6d145bda61e58b84b19dc8853145a2a9170571d3b8bf590c12756aaa815c225a22e187f778889c9aaf39a58675ad5f65e7fec0c60c61201316834f269fb4c61e9df30c1f98ff1079e84ddf313f3a74c40bc2c2ac281a4016f5ae7fba6139f9147c1ce287c1472a2220885af4a02ec364947146f8539fa15cfaa0eaba8683e14930634cb9736f012c0f4f75c12b2a3ddd5697e4381bd1a096d1592e5832a1c5782d47e9605a82e31e3175abcf76ea35c42d669e55297b069bce81ac43a801654d23dd4fdb529e357c93fa874c2a2cbd2372683b0c81bc4f05e3ec67b8ed2065c4acc6cde4aac69ad9d48de6bb2508545c9df9c1e064c5fef4671396af776640d9f836361d803d177b3f1e3910ac787f0bd8915083091562302e018a1101eb78977abadb8a7b1fbc08361e03ebe059195c2e378b61c073665026e0f1694e8aac0ed1b0634c544f0b1042b55dbb09cb6caf2cf3553a8a298f0a0dda3d6f6331923b5f60f40c44d280cc15d98e58fd10a11e775d7298f140e60eb540482f745740af0a41d73d5b70ac1e7893112ec7cce47bdb3111f57943b39da2cb4a1cdbfa4f5bf178a5a56113ffa08ed74a4a17e8e60d8f10c8c4006af61b058bec03e02cc2dfc951d7bca6061d2eaddc6dbb85cfa6d143602b42119e5f5c353ca093875a2b9f28c07181c360cbe689d0e171315af31c0b1f8e2841b91df1aff1f14df00edc8974e45cec49c3f8b549086346c784442ce72eaaa8d46b45db9eefed526141d0637584a38e3947cb0f8a6ad9323ec0f7d83493b2fe56f5d31f66194c252f168b7cde75facc60a741580f0ac5b4848419b2e2e4f56e0d7d2c08af139efca74f07dac387ceb62015ae40a7d65f6eb405dbaa41d134adcb9dde924280830fb5206bc3ffff55eb208eda96475ac6bddcd3bd27adcb07e49f7c84c3a1c7bab1e28eea826ee750aaf48abd9bea81fc8a574fbf5b1db425cdbfa22af44f0e92ac8410fd622971978a0b2a8c16a35f808d32a391575010492a5c476218ce9797f43e6719d734901a9fb113ca6facaafecbbec43882370df88d5364f79c3fb7281312f7d32163f480e9aa25d84f665bc0683726d20af013398568505ec636f54c0c472cd2680a370afc470ae7d9d6263b177e1e6542ccb091254b884caefcf123c653a485a49e01775dc5f1cfa8ac4cd5712e84722875a0555e925e9ca86ba6b93d1ac45d11e9190176ac25f86c27e9234b74275ae06c140ad8cc8246dd4132e8615a2c9c56641c5bb0cd88a515b0456c6368cf7c99fb8a60155e86de007639c4154889e28ed810175c33ab8dc779fe83c47c4f3d1675c422dbd38394ca7628f15fbcea8b1fbc12c069a03f6f3fcedd668fbc262f75c09c0a89caf2394257eb8ef4e472529b98284da59b0965daacdfc65fc023e2f409468594e365b06d3bf7c7dac60d2029fbdcb25aa052058574890240fcf80462312cb98053a040ddda535ea094f9059b5bc7cfdf8b857e0ca3a4b1d1dbeefe15c936791c9ba6661d1676b9c272aabe8e033d325586166ed67ede63542147c090c32d29b916e2e27f999e99c67f0b0ee70cd18c9f218a14e5b1cfed81c25ff1454093c1d5e2f200975b153b848d448acf6510a3441f9791d0471a6526225105d0e9161ab2a6a1a70c2efd6b9c7af34b5b0ef557c0bd9fdfee0b3ced4899613bc572cd7f25d95fb43cda18fa2a13842a019e447b42f182c33ba1d697a6659894ccf1f0c08c077ed2b1c051ec1cb027ea2f7415872a18a588809c1ea86bc8a19a00679f0ced221fcd07a26691a9edaba551db5af0791ea0009bef37811e2986683edd20aa72fccb47549306358751fa5b2ed4c9b6c4abe0b7e33c5ae19144255156aba5f22b26ed9d4ca43a98f038f4c533a5e4d52a2f651613c714427787ab2cf59cfcca85b97db2ad8ea7f2764bf46824844416d4deee3149da5a06d1ec5215fffa4557f5ef80514bdbfddb35ae94c8fb7c4a9008dfc9cbd6bd962dbaa3f2865680f636eecc6c468ec26be1b8cba7f6a4d26174dfa475495459046e9920ed1cc0fb6454e91f59484a95c57a080df77325de74442b4ad2cbdb26fe636e526e659616a81c47c5375f056d8937f1d202eef8e84da18d14ad9483f72cb555eb2cc1e5b9d52be5b1f6a6ffb96133f1f4aa3072107ffb4099afe74605252a0df92bc21b15fe35c4fcb26b77c3e0973e08b4a524509e8a4ab26c0a1532fa96f2ad816f1bcade5381b6e4220ecfca4ec50397c1e97ef94b8d358cc8492c6a9959131ae9cf792b78b98fdfd2510a8eee0985a7d527d24f566bd7bf03263790e8ee6e4f579a503ec46a741fcb0b9c39fa9bcbf1ee71c7c925e27a6d8cf4ef8ccfb723acaa9132f5662baf46e6e14d76599f6461808a94b24cbc043a42c56c25bf02ff8b37bad2fb1a8ac286f4e3f2f3caeea52fd4289288037674343ffa1a82473c67ff3cb3b8a04a261d4b6926f16283f0b3dc3ecba7b9ed3cdf5608a720d2b05a43d8d2d70f03ff472ebcb9c28062c830493687cfdb1195e88590e5b13ca6a9cd52306fa34090a4d59f4decc25e00503e92232d606091402646c0ed0c4d5b86fdd69c819715112a91c9841ecb661f16461997b0e33052096b263f64bf2d783617679d9729898be76dad02936ab0bd148704b96bc4296aa49659907ac2888cac188fede6b3487cc153361e14962d6d173ae8c97e2b6407026f4b2c0308657dca3ec01c489a17b9f54bd018b9312e887c07ace9df507507209690c559aef68feee04b91561d865f37063ab7e8d06d5e9b0af768afbcfee9cff979f3cfce3df9c4b641ba2ece6ee97df2f6c57f1af8f5b7f5d12ffbb9fe48a829f0e92227bd1e1c26e23a33bec1dda8b9a825e5ca12018b7b01397ca53983e3a3bd781013c6effce91d65f782332ffab542cddb7a77b6aeb7c5c5554e1785bbefa76b2912c0c26fa2acf8ba43097cd8055ea6c55b95854c59ffc4956ae4b79e3f3e5d0715f71c740172da7c69b85c38bb62cc3e1e2060692ac19810a7a885cb801d9548998fdbcb0db2c6d581c25e2fa149c4073ea220cab5cd35123651d2c673c041334691c35fc5bb57e4480ab788b9536e3bd2d2b443cdd58205c79462472ad89962e69bc8e1902295b8597beec0af756316643ce598738820b9296cddcb0fc53dde2061554d0a5a4e0300fac253441845fe6c07379490a82f2cf59893ccf86083ba6fa6c7addaa17bc12dae65745870d7ca6f9d17be818763c4c8700e99adf4ebea52f0d2048b0739f34ea0530ea52ab15b030691dda118f28e890b37a56fe981c8f5fcbef316b602790dee61abd93a10921a7443b2237feac361fdf6b8b75c664ee52e46df9032d29ca56de4ffcdfbf8208878c04cbe37f9aa577b4e44bd4c477e7ac5ca2ebb5a313b51384d5a6bcd0957a79ae0195e30df2635120385766237d05599291da0524ecc28477c648ff7de0c9a65a709795c6b3b159b1423aff9b82d684b09cbab6b6dab8f527cd0f52c6b0313a3af50e5498e59e1c41f851a40f0259ff0e9fd28606fd301a52d30022dd9d40b8d799036d4d87a6707fd329f711c4d64ead17654acf0ca43ae8edf9d101ab4e9f723ce59c481cb3634cefb041dca85c1fe8bf80912de804a28a814d364ddbc57b08cdcfbf3b6f6f138704c8899fa8098fccb471e5c46c1fc73882a9c34699bc0ebb4b3c546b1bb7756978b9cc25c374f38916a955db3a8853ea5b061dd413160e7b9c1e1c9ae77d5295187bc450c0ce67774aa6a232f7cde877604878b27c2f6317481f381b08053d6f33c01d6f71c18690a82c556ea232fb2eb09e41c289266dae6821d64e7b8b0dfe6bba3ecfff304b7daa97c54d9d5f471d3cf857b37d74ec9b4338d437c1554141efced8a750593ee6fbc02ac1f0f1c40f3c1cedf482ec8bfba9fca5d73a524d46ca0f144612065cfed3e4b8eb921851f90b7850dadef20182e9f4cd7b2b75ea5f6b8b736730050b1d9b3f1ee7dda4624f57e7068332ec2a697ff802acc07ec28f4b7d91143fe1dadfe963749f6b7f0b48bb565cd976688d0905bf04e883c5a8f40808a20eed84287988f554007de69dccaeffc738dccd567f712f1f8217b1993d852a44cc7932132eb45c81abdfd182838f7b26ea01012785416c25db1b987152ce5ee08531dbfb4258a38f5fabd6eb582cd77126811915c1c2d02b0194b21256aa3654a6a0ec1acba76b5ef018d2694deb3b79c0c876bc50398e076fe315043b6901bcdfab29c18f76f8ebe7fce4da26e89caf7e21d9f7307cdede2d2542220c5692305af9ec8f1dd5af1182a9ceda139fc98cf51fc860cd8669bb7c9cfbc99423fb03e3b153a29e4d90bb983410ada75ebe5233986a40001bffd7f485e9f66a910be608dd31faca3bf5ff0fdcead1a59f6e5b3e54f8b973e346b0fc45ebfeee62b26821afc515a47e507e118cbebe86fdd91a4d5d7d06556f253d60c3d1338d8cf0cc7f94eca615f0125d0796ca4c1a7abb782081f44ad0fe6387f10af358875c090acef390cdebf7373091ead2d1040c91a57a414097368ead0e9b0721405411e90d449b84a23c6b18ab5589e89c6d5cc80a77ccbf57b6e9b406366d6b6771c9bf9c4a8f3ffe06f6ebc10f2dcb8c6473e1c438ff0e4109aebf13e3ed3a441de6f60c114fa86a9f6cd24d70602060e29aa864b981679ae74fabfd9d1db7bd45cdce898c256b361b555ba748dbe418f69c7bbe8158adeee5d711c87cfd75528d763755a28cd7414bd046b1c8f659f922778ef078f5592d94c6d1cd39522a319ba4a3a46d44a1e78d589c22531497d4fa56c38d3713b157ffa94bdba997771e1a0261404a52689a91847e0d0b1536209b6483740f5bcf56260e02bf1d866949879"}) 16:53:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}], "", [[]]}, 0x158) 16:53:58 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @remote, 0x7}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[@rthdr={{0x24, 0x29, 0x2, {0x0, 0x2, 0x0, 0x0, 0x0, [@ipv4={[], [], @remote}]}}}], 0x24}}], 0x2, 0x0) [ 509.195243][T17022] Unknown ioctl 21508 16:53:58 executing program 3: syz_open_dev$sndseq(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000f00)=[{{0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000340)=""/82, 0x52}}, {{0x0, 0x0, 0x0}, 0x8}], 0x2, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/nf_conntrack\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r5, r4, 0x0, 0x4002000004000) 16:53:58 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:53:58 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x80000000012, 0x0) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00'}, 0x45c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, 0x0) 16:53:58 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @remote, 0x7}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[@rthdr={{0x28, 0x29, 0x2, {0x0, 0x2, 0x0, 0x0, 0x0, [@ipv4={[], [], @remote}]}}}], 0x28}}], 0x4000000000000db, 0x0) 16:53:59 executing program 4: capset(&(0x7f00001b4ff8)={0x19980330}, &(0x7f000077ffe8)) r0 = socket$inet6(0xa, 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000080)) [ 510.371872][T17054] Unknown ioctl 21508 16:53:59 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @remote, 0x7}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[@rthdr={{0x28, 0x29, 0x2, {0x0, 0x2, 0x0, 0x0, 0x0, [@ipv4={[], [], @remote}]}}}], 0x28}}], 0x4000000000000db, 0x0) 16:53:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_GSO_MAX_SIZE={0x8}]}, 0x28}}, 0x0) 16:53:59 executing program 4: capset(&(0x7f00001b4ff8)={0x19980330}, &(0x7f000077ffe8)) socket$inet6(0xa, 0x80002, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, &(0x7f0000000080)) 16:53:59 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) [ 511.244081][T17076] Unknown ioctl 21508 16:54:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) write(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) listen(r1, 0x400000001ffffffd) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1a1100, 0x0) r2 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x0, 0x0, &(0x7f0000000040)={0x0, 0x2, 0x5}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r3, 0x0, 0x0}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@empty, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f00000018c0)=0xe8) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) mq_timedreceive(r2, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f00000013c0)=ANY=[@ANYBLOB="58020000050b010e25bd7000fbdbdf250c0000043cf511efc6d5eda75b3728b47f540d6449aa379c83c68a18891d16c3728521afea89fad3c724aa36bc8b85889761116def8caa0a81195e261ddc022d376f623543e6478ac185eb39549a05f47e8f1f0cd0a2fc23a7be2b0e2ca97bb24d730ab5d6500c416222124b3e36bcbde0e2fd6889a45fbb0cc725cf", @ANYRES32=r2, @ANYBLOB], 0x3}}, 0x44) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VIDIOC_S_STD(0xffffffffffffffff, 0x40085618, &(0x7f0000001380)=0x80000) sendmmsg(r5, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x7000000}}], 0x4000000000000d0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) lsetxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v3={0x3000000, [{0xd0}, {0x0, 0x80}], r6}, 0x18, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000001640)=[0x0, &(0x7f00000014c0)='security.capability\x00', &(0x7f0000001500)='\x00', &(0x7f0000001540)='/em0em0\x00', &(0x7f0000001580)='GPLproc^\xaa^vmnet0-system\x00', &(0x7f0000001600)='*user[selinux!%lo\x00'], &(0x7f0000001780)=[&(0x7f0000001680)='NLBL_\x86\x8a\xc8\x9eMB\x80V', &(0x7f0000001700)=']\x00', &(0x7f0000001740)='/dev/vcs\x00']) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000040)=@buf={0xfb1, &(0x7f00000003c0)="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"}) 16:54:00 executing program 3: 16:54:00 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, &(0x7f0000001bc0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @remote, 0x7}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[@rthdr={{0x28, 0x29, 0x2, {0x0, 0x2, 0x0, 0x0, 0x0, [@ipv4={[], [], @remote}]}}}], 0x28}}], 0x4000000000000db, 0x0) 16:54:00 executing program 0: 16:54:00 executing program 4: capset(&(0x7f00001b4ff8)={0x19980330}, &(0x7f000077ffe8)) socket$inet6(0xa, 0x80002, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, &(0x7f0000000080)) 16:54:00 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="03000000000000009d6c10119e06d85f02635d2c7a4299e22153d32132f88a181ee9589df63eaf3050b9568e6bb20639e2d01f2dfdc87c8ea92815b757dc7d65fd046d533368df3fef8c000000002e880e95e3d4b3bee88664e8fdafbfab3e18d3e924d36671e0d9625cc57a50caddc2cc0ca4f70f842cd6e1aa504f02782c3c35a79d9c3971b4b086b07641d9a7b29452505efb1fe4a04b7bb29e068a0000000000000000000000000000000000000000000000000000a4c73cdb32823b297c5dbcb8672b40ad16e36163fbea462dd5527db8eee997b5ef860abd3d4a0638322b2e3cd8f213e3115b020400000326eb88f1d55f9c2d3b9e8bc67bbd3f9797bcd87925312f33d960c672df7178a5f619bffe7100d62973c91d91d4e7adc729d5bd3262c0325a81f3d8487b21b90da25eabe755173329b53c11cb32952dfd17ed87020f79d750d8f936a965d497c6dad922e6618172c21ae6c52637d8628020662f7049248fe016715b46937c444eeecfa0"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:00 executing program 1: 16:54:00 executing program 3: 16:54:00 executing program 4: capset(&(0x7f00001b4ff8)={0x19980330}, &(0x7f000077ffe8)) socket$inet6(0xa, 0x80002, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, &(0x7f0000000080)) [ 511.802931][T17091] Unknown ioctl 21508 16:54:00 executing program 0: 16:54:00 executing program 1: 16:54:01 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) [ 512.498328][T17108] Unknown ioctl 21508 16:54:02 executing program 2: 16:54:02 executing program 4: capset(&(0x7f00001b4ff8)={0x19980330}, &(0x7f000077ffe8)) r0 = socket$inet6(0xa, 0x80002, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, 0x0) 16:54:02 executing program 3: 16:54:02 executing program 1: 16:54:02 executing program 0: 16:54:02 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) [ 513.174137][T17117] Unknown ioctl 21508 16:54:02 executing program 1: 16:54:02 executing program 0: 16:54:02 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:02 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25CTLCON(r0, 0x89e8, &(0x7f0000000000)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, 0x0, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @default, @default]}) 16:54:02 executing program 4: capset(&(0x7f00001b4ff8)={0x19980330}, &(0x7f000077ffe8)) r0 = socket$inet6(0xa, 0x80002, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, 0x0) 16:54:02 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) read$rfkill(r0, &(0x7f0000000080), 0x1) 16:54:02 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1081004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x29384ac, 0x0) 16:54:02 executing program 1: sysfs$2(0x2, 0x800, 0x0) [ 513.877145][T17133] Unknown ioctl 21508 16:54:02 executing program 3: syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x1, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) 16:54:03 executing program 4: capset(&(0x7f00001b4ff8)={0x19980330}, &(0x7f000077ffe8)) r0 = socket$inet6(0xa, 0x80002, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, 0x0) 16:54:03 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:03 executing program 2: prlimit64(0x0, 0x0, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30}, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r3, &(0x7f0000000480), 0x2e9, 0xffd8) [ 514.363470][T17151] Unknown ioctl 21508 16:54:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000017c0)={0x0, 0x0, &(0x7f0000001780)={&(0x7f00000005c0)={0x14, 0x0, 0x4, 0x3}, 0x14}}, 0x0) 16:54:03 executing program 0: syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) r0 = syz_open_dev$usbfs(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x11, r0, 0x0) 16:54:03 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:03 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x3, 0x7) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net\x00') openat(r3, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r3, 0xc0945662, &(0x7f0000000340)={0xfffffdfe, 0x0, [], {0x0, @bt={0x0, 0x40, 0x0, 0x0, 0x5, 0x2, 0x3, 0x6f, 0x6, 0x400, 0x9, 0x1, 0x0, 0xffffffff, 0x19, 0x20, {0x8, 0x7}, 0x9, 0xfe}}}) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x0, &(0x7f00000008c0)=[{0x0}, {0x0}, {&(0x7f0000000b00)=""/126, 0x7e}, {0x0}], 0x4}}], 0x1, 0x20, 0x0) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x30, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x859989707d374285}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @rand_addr="12b88de9647971c68a1286f8368b8cb1"}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000800}, 0x4080) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) sched_yield() socket$key(0xf, 0x3, 0x2) add_key(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, 0x0) ioctl$SNDCTL_DSP_SETFMT(r6, 0xc0045005, &(0x7f0000000000)=0x10) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net\x00') openat(r7, &(0x7f00000000c0)='./file0\x00', 0x400002, 0x4a) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net\x00') openat(r8, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net\x00') openat(r9, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r8, 0x2405, r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x0, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 515.006583][ T32] audit: type=1400 audit(1584032044.050:103): avc: denied { map } for pid=17165 comm="syz-executor.0" path="/dev/radio3" dev="devtmpfs" ino=807 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:v4l_device_t:s0 tclass=chr_file permissive=1 16:54:04 executing program 1: syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x1, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000100)={0x0, 0x0, "7399a3ee284e3f21c9092fb1c47ed8c0573f08df78df0f43277fa673152cd759"}) [ 515.084470][T17176] Unknown ioctl 21508 16:54:04 executing program 3: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) 16:54:04 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fanotify_init(0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 16:54:04 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x3, 0x7) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net\x00') openat(r3, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r3, 0xc0945662, &(0x7f0000000340)={0xfffffdfe, 0x0, [], {0x0, @bt={0x0, 0x40, 0x0, 0x0, 0x5, 0x2, 0x3, 0x6f, 0x6, 0x400, 0x9, 0x1, 0x0, 0xffffffff, 0x19, 0x20, {0x8, 0x7}, 0x9, 0xfe}}}) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x0, &(0x7f00000008c0)=[{0x0}, {0x0}, {&(0x7f0000000b00)=""/126, 0x7e}, {0x0}], 0x4}}], 0x1, 0x20, 0x0) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x30, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x859989707d374285}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @rand_addr="12b88de9647971c68a1286f8368b8cb1"}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000800}, 0x4080) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) sched_yield() socket$key(0xf, 0x3, 0x2) add_key(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, 0x0) ioctl$SNDCTL_DSP_SETFMT(r6, 0xc0045005, &(0x7f0000000000)=0x10) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net\x00') openat(r7, &(0x7f00000000c0)='./file0\x00', 0x400002, 0x4a) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net\x00') openat(r8, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net\x00') openat(r9, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r8, 0x2405, r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x0, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:54:04 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY(r1, 0x0, 0x0) close(r1) 16:54:04 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="03000000000000009d6c10119e06d85f02635d2c7a4299e22153d32132f88a181ee9589df63eaf3050b9568e6bb20639e2d01f2dfdc87c8ea92815b757dc7d65fd046d533368df3fef8c000000002e880e95e3d4b3bee88664e8fdafbfab3e18d3e924d36671e0d9625cc57a50caddc2cc0ca4f70f842cd6e1aa504f02782c3c35a79d9c3971b4b086b07641d9a7b29452505efb1fe4a04b7bb29e068a0000000000000000000000000000000000000000000000000000a4c73cdb32823b297c5dbcb8672b40ad16e36163fbea462dd5527db8eee997b5ef860abd3d4a0638322b2e3cd8f213e3115b020400000326eb88f1d55f9c2d3b9e8bc67bbd3f9797bcd87925312f33d960c672df7178a5f619bffe7100d62973c91d91d4e7adc729d5bd3262c0325a81f3d8487b21b90da25eabe755173329b53c11cb32952dfd17ed87020f79d750d8f936a965d497c6dad922e6618172c21ae6c52637d8628020662f7049248fe016715b46937c444eeecfa0"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:04 executing program 1: r0 = syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x2, 0x2) preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000140)=""/116, 0x74}], 0x1, 0x0) 16:54:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000017c0)={0x0, 0x0, &(0x7f0000001780)={&(0x7f00000005c0)={0x14, 0x4, 0x4, 0x3}, 0x14}}, 0x0) [ 515.889271][T17204] Unknown ioctl 21508 16:54:05 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000200012800b00010067726574617000001000028006000e000000000004001200"], 0x40}}, 0x0) 16:54:05 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x8d0, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x0, &(0x7f00000006c0)) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f00000001c0)=0x3) r4 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r4, &(0x7f0000000480), 0x2e9, 0xffd8) 16:54:05 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="03000000000000009d6c10119e06d85f02635d2c7a4299e22153d32132f88a181ee9589df63eaf3050b9568e6bb20639e2d01f2dfdc87c8ea92815b757dc7d65fd046d533368df3fef8c000000002e880e95e3d4b3bee88664e8fdafbfab3e18d3e924d36671e0d9625cc57a50caddc2cc0ca4f70f842cd6e1aa504f02782c3c35a79d9c3971b4b086b07641d9a7b29452505efb1fe4a04b7bb29e068a0000000000000000000000000000000000000000000000000000a4c73cdb32823b297c5dbcb8672b40ad16e36163fbea462dd5527db8eee997b5ef860abd3d4a0638322b2e3cd8f213e3115b020400000326eb88f1d55f9c2d3b9e8bc67bbd3f9797bcd87925312f33d960c672df7178a5f619bffe7100d62973c91d91d4e7adc729d5bd3262c0325a81f3d8487b21b90da25eabe755173329b53c11cb32952dfd17ed87020f79d750d8f936a965d497c6dad922e6618172c21ae6c52637d8628020662f7049248fe016715b46937c444eeecfa0"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:05 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000140)='d', 0x1) 16:54:05 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x3, 0x7) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net\x00') openat(r3, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r3, 0xc0945662, &(0x7f0000000340)={0xfffffdfe, 0x0, [], {0x0, @bt={0x0, 0x40, 0x0, 0x0, 0x5, 0x2, 0x3, 0x6f, 0x6, 0x400, 0x9, 0x1, 0x0, 0xffffffff, 0x19, 0x20, {0x8, 0x7}, 0x9, 0xfe}}}) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x0, &(0x7f00000008c0)=[{0x0}, {0x0}, {&(0x7f0000000b00)=""/126, 0x7e}, {0x0}], 0x4}}], 0x1, 0x20, 0x0) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x30, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x859989707d374285}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @rand_addr="12b88de9647971c68a1286f8368b8cb1"}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000800}, 0x4080) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) sched_yield() socket$key(0xf, 0x3, 0x2) add_key(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, 0x0) ioctl$SNDCTL_DSP_SETFMT(r6, 0xc0045005, &(0x7f0000000000)=0x10) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net\x00') openat(r7, &(0x7f00000000c0)='./file0\x00', 0x400002, 0x4a) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net\x00') openat(r8, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net\x00') openat(r9, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r8, 0x2405, r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x0, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:54:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r4, 0x0) 16:54:05 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) read$rfkill(r2, &(0x7f0000000080), 0x1) [ 516.680715][T17239] Unknown ioctl 21508 16:54:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000300)='batadv\x00') sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000880)={&(0x7f00000008c0)={0x14, r1, 0x27}, 0x14}}, 0x0) 16:54:05 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) 16:54:05 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000200012800b00010067726574617000001000028006000e000000000004001200"], 0x40}}, 0x0) 16:54:06 executing program 4: syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x1, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000000)={0x0, 0x1}) 16:54:06 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000000)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 16:54:06 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="03000000000000009d6c10119e06d85f02635d2c7a4299e22153d32132f88a181ee9589df63eaf3050b9568e6bb20639e2d01f2dfdc87c8ea92815b757dc7d65fd046d533368df3fef8c000000002e880e95e3d4b3bee88664e8fdafbfab3e18d3e924d36671e0d9625cc57a50caddc2cc0ca4f70f842cd6e1aa504f02782c3c35a79d9c3971b4b086b07641d9a7b29452505efb1fe4a04b7bb29e068a0000000000000000000000000000000000000000000000000000a4c73cdb32823b297c5dbcb8672b40ad16e36163fbea462dd5527db8eee997b5ef860abd3d4a0638322b2e3cd8f213e3115b020400000326eb88f1d55f9c2d3b9e8bc67bbd3f9797bcd87925312f33d960c672df7178a5f619bffe7100d62973c91d91d4e7adc729d5bd3262c0325a81f3d8487b21b90da25eabe755173329b53c11cb32952dfd17ed87020f79d750d8f936a965d497c6dad922e6618172c21ae6c52637d8628020662f7049248fe016715b46937c444eeecfa0"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:06 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002940)={&(0x7f0000000000)=ANY=[@ANYBLOB="3000000032003b050000000000000000000000001c000100180001000b00010073696d706c65"], 0x1}}, 0x0) sendfile(r2, r1, 0x0, 0x100000001) 16:54:06 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0/file0\x00', 0x0, 0xc50c4, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0xb) write$FUSE_NOTIFY_STORE(r0, 0x0, 0x0) getegid() r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000380)=0x1a, 0x4) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000080)=0x27fc, 0x4) fcntl$setstatus(r2, 0x4, 0x4b800) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0xa00) getegid() getresuid(&(0x7f00000001c0), &(0x7f0000000340), &(0x7f00000003c0)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@initdev, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000000780)=0xe4) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x10000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002b00)) 16:54:06 executing program 1: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) ftruncate(r0, 0x48280) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) io_submit(r1, 0x20000000000001cb, &(0x7f0000000540)=[&(0x7f00000000c0)={0x2400, 0x2200, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 16:54:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1524}, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="0f44"], 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 518.088928][ T32] audit: type=1804 audit(1584032047.130:104): pid=17280 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir814911229/syzkaller.DpJOTz/228/cgroup.controllers" dev="sda1" ino=17524 res=1 [ 518.135027][T17282] Unknown ioctl 21508 16:54:07 executing program 4: syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x1, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000000)={0x0, 0x1}) 16:54:07 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0/file0\x00', 0x0, 0xc50c4, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0xb) write$FUSE_NOTIFY_STORE(r0, 0x0, 0x0) getegid() r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000380)=0x1a, 0x4) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x0, &(0x7f0000000080)=0x27fc, 0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4b800) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0xa00) getresuid(&(0x7f00000001c0), &(0x7f0000000340), &(0x7f00000003c0)=0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000000780)=0xe4) getresuid(0x0, &(0x7f0000000800), &(0x7f0000000840)=0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000880)={0x418, 0xffffffffffffffda, 0x5, [{{0x1, 0x2, 0x0, 0x4, 0x3, 0x1e2e, {0x5, 0x1, 0x9, 0x800, 0x0, 0x80e, 0x0, 0x6a, 0x10001, 0x69d3, 0x0, 0x0, 0x0, 0x0, 0x80}}, {0x0, 0x5, 0x7, 0x0, 'selinux'}}, {{0x6, 0x0, 0x5185, 0x3, 0x0, 0x0, {0x0, 0x81, 0x6, 0xfffffffffffffff7, 0x0, 0x5, 0x1, 0x5, 0x6, 0x3, 0x80000001, 0x0, 0x0, 0x8, 0x286}}, {0x0, 0xffffffffffffff7f, 0x15, 0xfffffffc, ')userGPLvmnet0$wnodev'}}, {{0x0, 0x0, 0x4, 0x0, 0x5, 0x800, {0x0, 0x1, 0x9, 0xfffffffffffffeff, 0x7fffffff, 0x0, 0x2, 0x4, 0x6, 0x33, 0x7fffffff, r3, 0xee01, 0x7, 0x40}}, {0x2, 0x0, 0x12, 0x8, '/dev/input/event#\x00'}}, {{0x6, 0x0, 0x0, 0x3, 0x40, 0x0, {0x5, 0x1, 0x7, 0x3, 0x7f, 0x1ff, 0x2, 0x1, 0x10000, 0x1400, 0x0, 0x0, 0x0, 0x4}}, {0x0, 0x1000000000000000, 0x10, 0xc6f5, '\'ppp0.-lo2wlan0\x00'}}, {{0x2, 0x3, 0x0, 0x0, 0x0, 0x0, {0x2, 0x0, 0x0, 0x4, 0x4, 0x6, 0x0, 0x7, 0x16, 0x6, 0x0, r4, 0x0, 0x9, 0xffff0001}}, {0x2, 0x0, 0x12, 0x5, '/dev/input/event#\x00'}}, {{0x0, 0x2, 0x9, 0x0, 0x0, 0x0, {0x2, 0x59a, 0x883, 0x9ba, 0x9c, 0x4, 0x7, 0x0, 0x0, 0x100, 0x5128, r5, 0xee00}}, {0x3, 0x0, 0x12, 0xbd5c, '/dev/input/event#\x00'}}]}, 0x418) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x10000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002b00)) 16:54:07 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:07 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000300)) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0/file0\x00', 0x0, 0xc50c4, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0xb) getegid() r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x0, &(0x7f0000000080), 0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4b800) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0xa00) getresuid(&(0x7f00000001c0), &(0x7f0000000340), &(0x7f00000003c0)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f0000000780)) getresuid(0x0, &(0x7f0000000800), &(0x7f0000000840)=0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000880)={0x370, 0xffffffffffffffda, 0x0, [{{0x1, 0x2, 0x100, 0x4, 0x3, 0x1e2e, {0x5, 0x1, 0x9, 0x800, 0x0, 0x80e, 0x0, 0x6a, 0x10001, 0x69d3, 0x71, 0x0, 0x0, 0x0, 0x80}}, {0x0, 0x5, 0x7, 0x2, 'selinux'}}, {{0x6, 0x0, 0x5185, 0x3, 0x0, 0x0, {0x0, 0x81, 0x6, 0x0, 0x0, 0x5, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8, 0x286}}, {0x0, 0xffffffffffffff7f, 0x15, 0xfffffffc, ')userGPLvmnet0$wnodev'}}, {{0x0, 0x2, 0x4, 0x0, 0x0, 0x800, {0x0, 0x1, 0x0, 0x0, 0x7fffffff, 0x5, 0x2, 0x4, 0x6, 0x33, 0x7fffffff, 0x0, 0xee01, 0x7}}, {0x2, 0x0, 0x12, 0x8, '/dev/input/event#\x00'}}, {{0x2, 0x3, 0x0, 0x0, 0x0, 0x0, {0x2, 0x0, 0x0, 0x4, 0x4, 0x6, 0x0, 0x7, 0x0, 0x6, 0x0, 0x0, 0x0, 0x9, 0xffff0001}}, {0x2, 0x0, 0x12, 0x0, '/dev/input/event#\x00'}}, {{0x0, 0x0, 0x0, 0x5, 0x0, 0x0, {0x0, 0x59a, 0x883, 0x9ba, 0x9c, 0x4, 0x7, 0x0, 0x0, 0x100, 0x5128, r2, 0xee00}}, {0x0, 0x0, 0x12, 0xbd5c, '/dev/input/event#\x00'}}]}, 0x370) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x10000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002b00)) 16:54:08 executing program 4: syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x1, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000000)={0x0, 0x1}) 16:54:08 executing program 4: syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x1, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000000)={0x0, 0x1}) [ 519.429398][T17318] Unknown ioctl 21508 16:54:08 executing program 1: open$dir(&(0x7f0000000000)='./file0\x00', 0x2088611, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x2088611, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x2088611, 0x0) 16:54:09 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f00000017c0)) syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_trie\x00') ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000380)) syz_open_procfs(0x0, 0x0) 16:54:09 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f00000017c0)) 16:54:10 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0/file0\x00', 0x0, 0xc50c4, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0xb) write$FUSE_NOTIFY_STORE(r0, 0x0, 0x0) getegid() r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000380)=0x1a, 0x4) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000080)=0x27fc, 0x4) fcntl$setstatus(r2, 0x4, 0x4b800) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0xa00) getegid() getresuid(&(0x7f00000001c0), &(0x7f0000000340), &(0x7f00000003c0)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@initdev, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000000780)=0xe4) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x10000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002b00)) 16:54:10 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:10 executing program 1: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000000c0)="390000001000090468fe07002b0000000100ff0714000000450001070300001419001a00", 0x24}], 0x1) write(0xffffffffffffffff, &(0x7f00000000c0)="240000001a005f0014f9f407000904000a", 0x11) r0 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:54:10 executing program 4: syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x1, 0x2) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, &(0x7f0000000000)={0x0, 0x1}) 16:54:10 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000004c0)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "7de1095ca8b0794e3187b6c089fb36c58229646c7971a406b31739fed8a2ca7188cadcc65bd869200bfa6129055d5ed9a2705e70bfe3e3f8083c94d67a4172fe", "afae7017ab6382ba6b9ac56c9c085d183e000000000000000000006c2000"}) 16:54:10 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0/file0\x00', 0x0, 0xc50c4, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0xb) write$FUSE_NOTIFY_STORE(r0, 0x0, 0x0) getegid() r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000380)=0x1a, 0x4) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x0, &(0x7f0000000080)=0x27fc, 0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4b800) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0xa00) getresuid(&(0x7f00000001c0), &(0x7f0000000340), &(0x7f00000003c0)=0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000000780)=0xe4) getresuid(0x0, &(0x7f0000000800), &(0x7f0000000840)=0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000880)={0x418, 0xffffffffffffffda, 0x5, [{{0x1, 0x2, 0x0, 0x4, 0x3, 0x1e2e, {0x5, 0x1, 0x9, 0x800, 0x0, 0x80e, 0x0, 0x6a, 0x10001, 0x69d3, 0x0, 0x0, 0x0, 0x0, 0x80}}, {0x0, 0x5, 0x7, 0x0, 'selinux'}}, {{0x6, 0x0, 0x5185, 0x3, 0x0, 0x0, {0x0, 0x81, 0x6, 0xfffffffffffffff7, 0x0, 0x5, 0x1, 0x5, 0x6, 0x3, 0x80000001, 0x0, 0x0, 0x8, 0x286}}, {0x0, 0xffffffffffffff7f, 0x15, 0xfffffffc, ')userGPLvmnet0$wnodev'}}, {{0x0, 0x0, 0x4, 0x0, 0x5, 0x800, {0x0, 0x1, 0x9, 0xfffffffffffffeff, 0x7fffffff, 0x0, 0x2, 0x4, 0x6, 0x33, 0x7fffffff, r3, 0xee01, 0x7, 0x40}}, {0x2, 0x0, 0x12, 0x8, '/dev/input/event#\x00'}}, {{0x6, 0x0, 0x0, 0x3, 0x40, 0x0, {0x5, 0x1, 0x7, 0x3, 0x7f, 0x1ff, 0x2, 0x1, 0x10000, 0x1400, 0x0, 0x0, 0x0, 0x4}}, {0x0, 0x1000000000000000, 0x10, 0xc6f5, '\'ppp0.-lo2wlan0\x00'}}, {{0x2, 0x3, 0x0, 0x0, 0x0, 0x0, {0x2, 0x0, 0x0, 0x4, 0x4, 0x6, 0x0, 0x7, 0x16, 0x6, 0x0, r4, 0x0, 0x9, 0xffff0001}}, {0x2, 0x0, 0x12, 0x5, '/dev/input/event#\x00'}}, {{0x0, 0x2, 0x9, 0x0, 0x0, 0x0, {0x2, 0x59a, 0x883, 0x9ba, 0x9c, 0x4, 0x7, 0x0, 0x0, 0x100, 0x5128, r5, 0xee00}}, {0x3, 0x0, 0x12, 0xbd5c, '/dev/input/event#\x00'}}]}, 0x418) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x10000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002b00)) 16:54:10 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x48, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}}, 0x0) [ 521.208542][T17355] __nla_validate_parse: 16 callbacks suppressed [ 521.208570][T17355] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 521.227993][T17358] Unknown ioctl 21508 16:54:10 executing program 4: syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x1, 0x2) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, &(0x7f0000000000)={0x0, 0x1}) [ 521.371444][T17364] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 16:54:10 executing program 2: 16:54:10 executing program 1: 16:54:10 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:11 executing program 2: [ 522.247791][T17386] Unknown ioctl 21508 16:54:11 executing program 0: 16:54:11 executing program 4: syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x1, 0x2) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, &(0x7f0000000000)={0x0, 0x1}) 16:54:11 executing program 1: 16:54:11 executing program 2: 16:54:11 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:12 executing program 3: 16:54:12 executing program 1: 16:54:12 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000000)={0x0, 0x1}) 16:54:12 executing program 0: 16:54:12 executing program 2: [ 523.128330][T17404] Unknown ioctl 21508 16:54:12 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000000)={0x0, 0x1}) 16:54:12 executing program 0: 16:54:12 executing program 1: 16:54:12 executing program 2: 16:54:12 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, 0x0, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:12 executing program 3: 16:54:13 executing program 1: 16:54:13 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000000)={0x0, 0x1}) 16:54:13 executing program 0: [ 524.176662][T17429] Unknown ioctl 21508 16:54:13 executing program 2: 16:54:13 executing program 3: 16:54:13 executing program 1: 16:54:13 executing program 4: syz_open_dev$radio(0x0, 0x1, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000000)={0x0, 0x1}) 16:54:13 executing program 2: 16:54:13 executing program 0: 16:54:14 executing program 3: 16:54:14 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, 0x0, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:14 executing program 1: 16:54:14 executing program 2: 16:54:14 executing program 4: syz_open_dev$radio(0x0, 0x1, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000000)={0x0, 0x1}) 16:54:14 executing program 0: 16:54:14 executing program 3: [ 525.614558][T17458] Unknown ioctl 21508 16:54:14 executing program 1: 16:54:14 executing program 2: 16:54:15 executing program 0: 16:54:15 executing program 4: syz_open_dev$radio(0x0, 0x1, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000000)={0x0, 0x1}) 16:54:15 executing program 3: 16:54:15 executing program 1: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = socket(0x10, 0x800000000000803, 0x0) sendto(r0, &(0x7f0000000000)="120000001600e70d017b00d473fc00000000", 0x12, 0x0, 0x0, 0xaee6dae35afa37fd) 16:54:15 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, 0x0, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000527c6c0093bf4819510dc5538b660000000000000000000000000000000000000000000000000000000000000000000000000000000000560000000000000000000000000000002ab9908f5e1ec43daa2db1cde6b344486c8970a8422921e423c65f70ce77af589f9fa0b5af3a42012fd1b8f120d20d8beaec5470a3e12aa86ec69bcd5ec2afe30731afaee5ef9d43f6703e62f77f694b"], 0xb8}}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x48, &(0x7f00000013c0)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, 0xe8) 16:54:15 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x1) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x40000, 0x0) unshare(0x2020000) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000180)={0x7, 'batadv0\x00', {0xee63}}) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xce024b8b) unlink(&(0x7f0000000080)='./file0\x00') 16:54:15 executing program 4: syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x1, 0x2) r0 = syz_open_procfs(0x0, 0x0) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000000)={0x0, 0x1}) 16:54:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000527c6c0093bf4819510dc5538b660000000000000000000000000000000000000000000000000000000000000000000000000000000000560000000000000000000000000000002ab9908f5e1ec43daa2db1cde6b344486c8970a8422921e423c65f70ce77af589f9fa0b5af3a42012fd1b8f120d20d8beaec5470a3e12aa86ec69bcd5ec2afe30731afaee5ef9d43f6703e62f77f694b"], 0xb8}}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x14, 0x0, 0x0) 16:54:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40003, 0x2, @perf_bp={0x0}, 0x2820}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x4c0000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x4000) [ 526.825441][T17487] Unknown ioctl 21508 16:54:16 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[], 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:16 executing program 4: syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x1, 0x2) r0 = syz_open_procfs(0x0, 0x0) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000000)={0x0, 0x1}) 16:54:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000fdff00000000000000000000000000000000000000000000000000527c6c0093bf4819510dc5538b6600000000000000000000000000000000000000000000000000000000000000000000000000560000000000000000000000000000002ab9908f5e1ec43daa2db1cde6b344486c8970a8422921e423c65f70ce77af589f9fa0b5af3a42012fd1b8f120d20d8beaec5470a3e12aa86ec69bcd5ec2afe30731afaee5ef9d43f6703e62f77f694b"], 0xb8}}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x30, &(0x7f00000013c0)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) 16:54:16 executing program 4: syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x1, 0x2) r0 = syz_open_procfs(0x0, 0x0) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000000)={0x0, 0x1}) 16:54:16 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) fallocate(r0, 0x11, 0x600, 0x100000001) [ 527.763659][T17512] Unknown ioctl 21508 16:54:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000080)='.\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="25bca274769e620a2734fa0095e0612687ecb86a548802a902000000000000004e2f98b579a782d270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='barrier=0']) 16:54:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40003, 0x2, @perf_bp={0x0}, 0x2820}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x4c0000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x4000) 16:54:17 executing program 4: syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x1, 0x2) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, &(0x7f0000000000)={0x0, 0x1}) [ 528.248195][T17527] EXT4-fs (loop2): Can't read superblock on 2nd try [ 528.441121][T17527] EXT4-fs (loop2): Can't read superblock on 2nd try 16:54:17 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x22800) 16:54:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ustat(0x801, &(0x7f0000000040)) 16:54:17 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[], 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:17 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x1) unshare(0x2020000) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xce024b8b) unlink(&(0x7f0000000080)='./file0\x00') 16:54:18 executing program 4: syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x1, 0x2) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, &(0x7f0000000000)={0x0, 0x1}) [ 529.140945][T17549] Unknown ioctl 21508 16:54:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000527c6c0093bf4819510dc5538b660000000000000000000000000000000000000000000000000000000000000000000000000000000000560000000000000000000000000000002ab9908f5e1ec43daa2db1cde6b344486c8970a8422921e423c65f70ce77af589f9fa0b5af3a42012fd1b8f120d20d8beaec5470a3e12aa86ec69bcd5ec2afe30731afaee5ef9d43f6703e62f77f694b"], 0xb8}}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x30, &(0x7f00000013c0)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, 0x200014a8) 16:54:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40003, 0x2, @perf_bp={0x0}, 0x2820}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x4c0000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x4000) 16:54:18 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xa1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000180)='.^ \xedKyC\xc0\xb8\x8a\xd0^(\a\x85}F[4\xc5\x18\x8e\xae\xcew\x84\x99\x9f.\x1e93\x88\x03\xfaVI\xfd838t\xf1IS', 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x0) lseek(r0, 0x0, 0x3) getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) 16:54:18 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/fib_triestat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) 16:54:18 executing program 4: syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x1, 0x2) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, &(0x7f0000000000)={0x0, 0x1}) 16:54:18 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) 16:54:18 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[], 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:19 executing program 4: syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x1, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, 0x0) 16:54:19 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) 16:54:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40003, 0x2, @perf_bp={0x0}, 0x2820}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x4c0000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x4000) [ 530.549891][T17591] Unknown ioctl 21508 16:54:19 executing program 4: syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x1, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, 0x0) 16:54:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 16:54:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40003, 0x2, @perf_bp={0x0}, 0x2820}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x4c0000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x4000) 16:54:20 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/fib_triestat\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) 16:54:20 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) 16:54:20 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x1) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:20 executing program 4: syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x1, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, 0x0) 16:54:20 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000500)={@void, @val, @mpls={[], @ipv6=@gre_packet={0x0, 0x6, 'r~P', 0x44, 0x2f, 0x0, @rand_addr="54326d5498070000400061e500a5785a", @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}}}}}}, 0x76) [ 531.859671][T17628] Unknown ioctl 21508 16:54:20 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) 16:54:21 executing program 4: syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x1, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000000)) 16:54:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40003, 0x2, @perf_bp={0x0}, 0x2820}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x4c0000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x4000) 16:54:21 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x1) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:21 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="1c0000005e001f0814584707f9f4ffffff000000100000001f000000", 0x1c) 16:54:21 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f0000000200)='./file0\x00', 0x0) 16:54:21 executing program 4: syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x1, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000000)) [ 532.736750][T17645] Unknown ioctl 21508 16:54:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40003, 0x2, @perf_bp={0x0}, 0x2820}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x4c0000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x4000) 16:54:22 executing program 2: 16:54:22 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x1) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:22 executing program 4: syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x1, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000000)) [ 533.792637][T17668] Unknown ioctl 21508 16:54:23 executing program 0: 16:54:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40003, 0x2, @perf_bp={0x0}, 0x2820}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x4c0000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000) 16:54:23 executing program 2: 16:54:23 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f0000000200)='./file0\x00', 0x0) 16:54:23 executing program 4: 16:54:23 executing program 2: 16:54:23 executing program 4: 16:54:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40003, 0x2, @perf_bp={0x0}, 0x2820}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x4c0000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000) 16:54:23 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="03000000000000009d6c10119e06d85f02635d2c7a4299e22153d32132f88a181ee9589df63eaf3050b9568e6bb20639e2d01f2dfdc87c8ea92815b757dc7d65fd046d533368df3fef8c000000002e880e95e3d4b3bee88664e8fdafbfab3e18d3e924d36671e0d9625cc57a50caddc2cc0ca4f70f842cd6e1aa504f02782c3c35a79d9c3971b4b086b07641d9a7b29452505efb1fe4a04b7bb29e068a0000000000000000000000000000000000000000000000000000a4c7"], 0x1) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:23 executing program 2: 16:54:23 executing program 4: 16:54:23 executing program 0: 16:54:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40003, 0x2, @perf_bp={0x0}, 0x2820}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x4c0000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000) 16:54:24 executing program 4: 16:54:24 executing program 2: [ 535.196943][T17701] Unknown ioctl 21508 16:54:24 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f0000000200)='./file0\x00', 0x0) 16:54:24 executing program 0: 16:54:24 executing program 4: 16:54:24 executing program 2: 16:54:25 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="03000000000000009d6c10119e06d85f02635d2c7a4299e22153d32132f88a181ee9589df63eaf3050b9568e6bb20639e2d01f2dfdc87c8ea92815b757dc7d65fd046d533368df3fef8c000000002e880e95e3d4b3bee88664e8fdafbfab3e18d3e924d36671e0d9625cc57a50caddc2cc0ca4f70f842cd6e1aa504f02782c3c35a79d9c3971b4b086b07641d9a7b29452505efb1fe4a04b7bb29e068a0000000000000000000000000000000000000000000000000000a4c7"], 0x1) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:25 executing program 0: 16:54:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40003, 0x2, @perf_bp={0x0}, 0x2820}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000) 16:54:25 executing program 4: 16:54:25 executing program 2: [ 536.460621][T17723] Unknown ioctl 21508 16:54:25 executing program 0: 16:54:25 executing program 4: 16:54:25 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) 16:54:26 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="03000000000000009d6c10119e06d85f02635d2c7a4299e22153d32132f88a181ee9589df63eaf3050b9568e6bb20639e2d01f2dfdc87c8ea92815b757dc7d65fd046d533368df3fef8c000000002e880e95e3d4b3bee88664e8fdafbfab3e18d3e924d36671e0d9625cc57a50caddc2cc0ca4f70f842cd6e1aa504f02782c3c35a79d9c3971b4b086b07641d9a7b29452505efb1fe4a04b7bb29e068a0000000000000000000000000000000000000000000000000000a4c7"], 0x1) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40003, 0x2, @perf_bp={0x0}, 0x2820}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000) 16:54:26 executing program 2: 16:54:26 executing program 0: 16:54:26 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) 16:54:26 executing program 4: [ 537.497447][T17748] Unknown ioctl 21508 16:54:26 executing program 2: 16:54:26 executing program 0: 16:54:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40003, 0x2, @perf_bp={0x0}, 0x2820}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000) 16:54:26 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) 16:54:26 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000002c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000500000000000e00000004000000800300000000000008010000080100000000000008010000b0020000b0020000b0020000b0020000b0020000040000008c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a80008010000000000000000000000000000000000000000000000006000484d41524b000000000000000000000000f3ff0400000000000100000000ff010000000000000000000000000001000010000000000000000000000000000000000000000000000000200000000000000000ea0000000000000000000000fe880000000000000000000000000001fe8800000000000000000000000000010000000000000000ffffffff00000014f4b5544a63ed87000000000000000000726f73653000000000000000000000006e657464657673696d300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d8000000000000000000000000000000000000000000000000003000534554000000000000000000000000000000000000000000000000000002000006000000060000000000660300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000400001800000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) r1 = socket$inet6(0xa, 0x3, 0x9) sendmmsg$inet6(r1, &(0x7f0000000280)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0}}], 0x1, 0x0) 16:54:27 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)}, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NFQNL_MSG_VERDICT(r0, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000b00)=ANY=[@ANYBLOB="20000000010301020000000000000000000000000c000200daffff01000000"], 0x20}}, 0x0) 16:54:27 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x1) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:27 executing program 0: 16:54:27 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) 16:54:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40003, 0x2, @perf_bp={0x0}, 0x2820}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x4c0000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000) 16:54:27 executing program 0: 16:54:27 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) [ 538.707811][T17782] fuse: Bad value for 'fd' 16:54:27 executing program 4: [ 538.935940][T17791] Unknown ioctl 21508 16:54:28 executing program 0: [ 539.074011][T17796] fuse: Bad value for 'fd' 16:54:28 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) 16:54:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40003, 0x2, @perf_bp={0x0}, 0x2820}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x4c0000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000) 16:54:28 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r4, 0x8955, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) stat(0x0, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r5, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(r5, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x39}}}, 0x1c) writev(0xffffffffffffffff, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) 16:54:28 executing program 4: getpid() r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1}, 0x0) gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) r1 = socket(0x10, 0x3, 0xc) write(r1, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f30501000a000100010423dcffdf00", 0x23c) 16:54:28 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x1) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000000000ff0f000000000500000010040000d8030000d8010000a8020000b800008ed797c60fba1f51007803000078030081e40300007803000005000000", @ANYPTR, @ANYBLOB="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"], 0x3) [ 539.597359][T17809] fuse: Bad value for 'fd' 16:54:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40003, 0x2, @perf_bp={0x0}, 0x2820}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x4c0000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000) 16:54:28 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) [ 539.960657][T17825] Unknown ioctl 21508 16:54:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40003, 0x2, @perf_bp={0x0}, 0x2820}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x4c0000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000) 16:54:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x5) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 16:54:29 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x1) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:29 executing program 4: syslog(0x2, &(0x7f0000000080)=""/160, 0xa0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r0 = gettid() tkill(r0, 0x0) 16:54:29 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r4, 0x8955, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) stat(0x0, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r5, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(r5, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x39}}}, 0x1c) writev(0xffffffffffffffff, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) 16:54:29 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) [ 540.668097][T17847] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 540.843834][T17856] Unknown ioctl 21508 16:54:30 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) 16:54:30 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x4c0000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000) 16:54:30 executing program 4: perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x17}) 16:54:30 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x1) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:30 executing program 1: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x4c0000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000) 16:54:30 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000180)={'bond0\x00', @ifru_names='veth1_vlan\x00'}) 16:54:30 executing program 3: creat(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) 16:54:30 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @local, 0x4}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_security(0x11, r1, &(0x7f00000000c0)=""/18, 0x12) r2 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000340)="18faca5ce30009dc7792", 0x2f03fc7e454c7ecb, r1) keyctl$revoke(0x3, r2) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r3, 0x8983, &(0x7f0000000200)) keyctl$setperm(0x5, r2, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, r2, 0x0, &(0x7f0000000100)='^keyring[wlan0\x00', &(0x7f0000000140)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) close(r4) fsetxattr(r4, &(0x7f0000000000)=@known='com.apple.system.Security\x00', &(0x7f0000000080)='pagemap\x00', 0x8, 0x1) wait4(0x0, 0x0, 0x80000000, 0x0) prctl$PR_GET_FPEXC(0xb, &(0x7f00000001c0)) getpid() [ 541.638552][T17879] Unknown ioctl 21508 16:54:30 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r4, 0x8955, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) stat(0x0, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r5, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(r5, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x39}}}, 0x1c) writev(0xffffffffffffffff, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) 16:54:31 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x1) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:31 executing program 1: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x4c0000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000) 16:54:31 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0xffffffffffffffff, 0x0, 0x0) [ 542.612795][T17906] Unknown ioctl 21508 16:54:31 executing program 3: creat(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) 16:54:31 executing program 1: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x4c0000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000) 16:54:32 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYBLOB="00000000100000000000000000000000030000001a"]) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x58) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 16:54:32 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xa1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = getpid() sendmmsg$unix(r0, &(0x7f0000000640)=[{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000300)='|', 0x9701}], 0xa, &(0x7f0000000140)=[@cred={{0x1c, 0x1, 0x2, {r1}}}], 0x20}], 0x198, 0x0) 16:54:32 executing program 3: creat(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) 16:54:32 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000002340), 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x4c0000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000) 16:54:32 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="03000000000000009d6c10119e06d85f02635d2c7a4299e22153d32132f88a181ee9589df63eaf3050b9568e6bb20639e2d01f2dfdc87c8ea92815b757dc7d65fd046d533368df3fef8c000000002e880e95e3d4b3bee88664e8fdafbfab3e18d3e924d36671e0d9625cc57a50caddc2cc0ca4f70f842cd6e1aa504f02782c3c35a79d9c3971b4b086b07641d9a7b29452505efb1fe4a04b7bb29e068a0000000000000000000000000000000000000000000000000000a4c73cdb32823b297c5dbcb8672b40ad16e36163fbea462dd5527db8eee997b5ef860abd3d4a0638322b2e3cd8f213e3115b020400000326eb88f1d55f9c2d3b9e8bc67bbd3f9797bcd87925312f33d960c672df7178a5f619bffe7100d62973c91d91d4e7adc729d5bd3262c0325a81f3d8487b21b90da25eabe755173329b53c11cb32952dfd17ed87020f"], 0x1) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:32 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r4, 0x8955, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) stat(0x0, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r5, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(r5, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x39}}}, 0x1c) writev(0xffffffffffffffff, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) [ 543.740765][T17927] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended 16:54:32 executing program 0: getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) open(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="4000000014009ff300000000000000000a000000", @ANYRES32, @ANYBLOB="14000100fe80000000000000070000000000000014000200fe88000000000000000015000000000166a9853f1d676550b81640af8eb83aa169c5c57ef913f7cf0b7c1546e17c590a63a92ae607fc3e702719d1e599ba6f6fa358df702b6cb1e85659eb9cf2f21cd0f3a5a0348acebad037fc57b531d0a07d0226d83d5773967356c6218bbe6162de89197c7aeb176cbfcfcb1469ed"], 0x40}}, 0x0) socket(0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x0, 0x0) 16:54:32 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) [ 543.848747][T17927] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 543.858742][T17927] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 543.869200][T17927] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 544.045875][T17927] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 544.105660][T17957] Unknown ioctl 21508 16:54:33 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000002340), 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x4c0000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000) 16:54:33 executing program 4: 16:54:33 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) [ 544.434677][T17968] fuse: Bad value for 'fd' 16:54:33 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000002340), 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x4c0000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000) 16:54:33 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r4, 0x8955, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) stat(0x0, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r5, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(r5, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x39}}}, 0x1c) writev(0xffffffffffffffff, 0x0, 0x0) 16:54:34 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x1) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:34 executing program 4: 16:54:34 executing program 0: 16:54:34 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) [ 545.139708][T17987] fuse: Bad value for 'fd' 16:54:34 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000002340)=[{0x0}], 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x4c0000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000) 16:54:34 executing program 0: 16:54:34 executing program 4: [ 545.635915][T18004] Unknown ioctl 21508 [ 545.762476][T18009] fuse: Bad value for 'fd' 16:54:34 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) 16:54:35 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000002340)=[{0x0}], 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x4c0000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000) 16:54:35 executing program 0: 16:54:35 executing program 4: 16:54:35 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r4, 0x8955, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) stat(0x0, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r5, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(r5, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x39}}}, 0x1c) 16:54:35 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x1) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:35 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) 16:54:35 executing program 0: 16:54:35 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000002340)=[{0x0}], 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x4c0000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000) 16:54:35 executing program 4: [ 546.681242][T18033] Unknown ioctl 21508 16:54:35 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) 16:54:36 executing program 0: 16:54:36 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x1) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:36 executing program 4: 16:54:36 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x4c0000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000) 16:54:36 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) [ 547.416408][T18059] Unknown ioctl 21508 16:54:36 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r4, 0x8955, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) stat(0x0, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r5, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(r5, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, 0x0) 16:54:36 executing program 0: 16:54:36 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') r0 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) dup2(r0, r0) 16:54:36 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) 16:54:36 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000) 16:54:36 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x1) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:37 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) 16:54:37 executing program 0: r0 = socket(0x1, 0x1, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 16:54:37 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NFNL_MSG_CTHELPER_DEL(0xffffffffffffffff, 0x0, 0x4000050) request_key(0x0, 0x0, &(0x7f0000000180)='^\x00', 0xfffffffffffffff8) write$FUSE_POLL(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r0, 0x8200) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000100)=ANY=[@ANYPTR64], 0x8) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000140)) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r2, 0x0) 16:54:37 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000) [ 548.350503][T18087] Unknown ioctl 21508 16:54:37 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) 16:54:37 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x1) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:38 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r4, 0x8955, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) stat(0x0, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r5, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(r5, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, 0x0) pipe(&(0x7f00000000c0)) 16:54:38 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) ioperm(0x0, 0x1, 0x0) 16:54:38 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000) [ 549.082488][T18112] Unknown ioctl 21508 16:54:38 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00', {}, 0x41}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$input_event(r0, &(0x7f0000000000)={{0x77359400}, 0x15, 0x2a1b}, 0x18) [ 549.425790][T18126] input: syz1 as /devices/virtual/input/input19 16:54:38 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x4000) 16:54:38 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) 16:54:38 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="03000000000000009d6c10119e06d85f02635d2c7a4299e22153d32132f88a181ee9589df63eaf3050b9568e6bb20639e2d01f2dfdc87c8ea92815b757dc7d65fd046d533368df3fef8c000000002e880e95e3d4b3bee88664e8fdafbfab3e18d3e924d36671e0d9625cc57a50caddc2cc0ca4f70f842cd6e1aa504f02782c3c35a79d9c3971b4b086b07641d9a7b29452505efb1fe4a04b7bb29e068a0000000000000000000000000000000000000000000000000000a4c73cdb32823b297c5dbcb8672b40ad16e36163fbea462dd5527db8eee997b5ef860abd3d4a0638322b2e3cd8f213e3115b020400000326eb88f1d55f9c2d3b9e8bc67bbd3f9797bcd87925312f33d960c672df7178a5f619bffe7100d62973c91d91d4e7adc729d5bd3262c0325a81f3d8487b21b90da25eabe755173329b53c11cb32952dfd17ed87020f79d750d8f936a965d497c6dad922e6618172c21ae6c52637d8628020662f7049248fe0"], 0x1) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) [ 549.518417][T18130] input: syz1 as /devices/virtual/input/input20 16:54:39 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) [ 549.893073][ T32] audit: type=1326 audit(1584032078.930:105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=18110 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=265 compat=1 ip=0xf7f3ed99 code=0xffff0000 16:54:39 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2}]}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000010605"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4010000004ffdc, 0x0) 16:54:39 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x4000) [ 550.016720][ T32] audit: type=1326 audit(1584032079.010:106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=18110 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=40000003 syscall=265 compat=1 ip=0xf7f3ed99 code=0xffff0000 [ 550.207139][T18148] Unknown ioctl 21508 16:54:39 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='/'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 16:54:39 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r4, 0x8955, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) stat(0x0, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r5, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(r5, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, 0x0) [ 550.488333][T18158] selinux_netlink_send: 20 callbacks suppressed [ 550.488391][T18158] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1537 sclass=netlink_route_socket pid=18158 comm=syz-executor.4 [ 550.595237][T18158] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18158 comm=syz-executor.4 [ 550.672693][T18158] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18158 comm=syz-executor.4 [ 550.709426][T18164] ceph: No path or : separator in source 16:54:39 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x4000) 16:54:39 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) [ 550.736511][T18158] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18158 comm=syz-executor.4 [ 550.815430][T18158] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18158 comm=syz-executor.4 [ 550.894577][T18158] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18158 comm=syz-executor.4 [ 550.934835][T18158] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18158 comm=syz-executor.4 16:54:40 executing program 0: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) shmget$private(0x0, 0x2000, 0x78000000, &(0x7f0000ffd000/0x2000)=nil) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x1410}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2cb0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x0, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [""]}, 0x14}}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000001a40)={"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"}) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000080)=0x10000000002) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x10000, 0x0) fremovexattr(r4, &(0x7f0000000140)=@known='trusted.overlay.origin\x00') getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000040), &(0x7f00000000c0)=0x30) ioctl$KVM_RUN(r3, 0xae80, 0x0) 16:54:40 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x1) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) [ 550.978069][T18158] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18158 comm=syz-executor.4 16:54:40 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x4000) [ 551.075226][T18158] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18158 comm=syz-executor.4 [ 551.157738][T18158] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18158 comm=syz-executor.4 16:54:40 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) [ 551.317156][T18179] fuse: Bad value for 'fd' 16:54:40 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, 0x0) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) open(0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000001a40)={"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"}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x10000000002) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 551.467210][T18189] Unknown ioctl 21508 16:54:40 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') preadv(r0, 0x0, 0x0, 0x4000) 16:54:40 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x1) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) [ 551.777225][T18197] fuse: Bad value for 'fd' 16:54:40 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) 16:54:40 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r4, 0x8955, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) stat(0x0, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r5, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(r5, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) [ 552.247999][T18218] Unknown ioctl 21508 16:54:41 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) [ 552.277621][T18219] fuse: Bad value for 'fd' 16:54:41 executing program 0: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) shmget$private(0x0, 0x2000, 0x78000000, &(0x7f0000ffd000/0x2000)=nil) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x1410}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2cb0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x0, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [""]}, 0x14}}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000001a40)={"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"}) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000080)=0x10000000002) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x10000, 0x0) fremovexattr(r4, &(0x7f0000000140)=@known='trusted.overlay.origin\x00') getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000040), &(0x7f00000000c0)=0x30) ioctl$KVM_RUN(r3, 0xae80, 0x0) 16:54:41 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') preadv(r0, 0x0, 0x0, 0x4000) 16:54:41 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000001440)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000040)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x40000000040201, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup2(r3, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r2, 0xc0984124, 0x0) 16:54:41 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') preadv(r0, 0x0, 0x0, 0x4000) [ 553.004311][T18238] fuse: Invalid rootmode 16:54:42 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) 16:54:42 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="03000000000000009d6c10119e06d85f02635d2c7a4299e22153d32132f88a181ee9589df63eaf3050b9568e6bb20639e2d01f2dfdc87c8ea92815b757dc7d65fd046d533368df3fef8c000000002e880e95e3d4b3bee88664e8fdafbfab3e18d3e924d36671e0d9625cc57a50caddc2cc0ca4f70f842cd6e1aa504f02782c3c35a79d9c3971b4b086b07641d9a7b29452505efb1fe4a04b7bb29e068a0000000000000000000000000000000000000000000000000000a4c73cdb32823b297c5dbcb8672b40ad16e36163fbea462dd5527db8eee997b5ef860abd3d4a0638322b2e3cd8f213e3115b020400000326eb88f1d55f9c2d3b9e8bc67bbd3f9797bcd87925312f33d960c672df7178a5f619bffe7100d62973c91d91d4e7adc729d5bd3262c0325a81f3d8487b21b90da25eabe755173329b53c11cb32952dfd17ed87020f79d750d8f936a965d497c6dad922e6618172c21ae6c52637d8628020662f7049248fe016715b46937c"], 0x1) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:42 executing program 4: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, 0x0) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000340)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, 0x0, 0x10008011) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r4 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000001a40)={"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"}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x10000000002) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:54:42 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r4, 0x8955, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) stat(0x0, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r5, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) 16:54:42 executing program 0: unshare(0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) utimensat(0xffffffffffffffff, 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) utimensat(0xffffffffffffffff, 0x0, 0x0, 0x0) unlink(&(0x7f0000000080)='./file0\x00') 16:54:42 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) [ 553.598997][T18260] Unknown ioctl 21508 16:54:42 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) 16:54:43 executing program 0: 16:54:43 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 16:54:43 executing program 4: [ 554.316405][T18276] fuse: Invalid rootmode 16:54:43 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x1) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:43 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) 16:54:43 executing program 0: 16:54:43 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r4, 0x8955, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) stat(0x0, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r5, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) 16:54:43 executing program 4: 16:54:44 executing program 0: 16:54:44 executing program 4: 16:54:44 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 16:54:44 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) 16:54:44 executing program 0: 16:54:44 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x1) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:44 executing program 4: 16:54:44 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) 16:54:44 executing program 0: [ 555.805409][T18321] Unknown ioctl 21508 16:54:44 executing program 1: 16:54:45 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r4, 0x8955, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) stat(0x0, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r5, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) 16:54:45 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) 16:54:45 executing program 0: 16:54:45 executing program 4: 16:54:45 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x1) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:45 executing program 1: 16:54:45 executing program 4: 16:54:45 executing program 0: 16:54:45 executing program 1: [ 556.931773][T18349] Unknown ioctl 21508 16:54:46 executing program 4: 16:54:46 executing program 0: 16:54:46 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x1) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:46 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x0, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000007c0)=ANY=[@ANYRES16], 0x1}}, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) exit(0x0) add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={0x0, 0x0, 0x2d}, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=""/45) 16:54:46 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r4, 0x8955, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) stat(0x0, 0x0) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) 16:54:46 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) 16:54:46 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/bus/input/devices\x00', 0x0, 0x0) preadv(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)=""/250, 0xfffffe79}], 0x1, 0xe17) 16:54:46 executing program 0: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000001600)=[{0x0}], 0x1, 0x2) 16:54:47 executing program 4: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r1, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') syz_open_dev$audion(&(0x7f00000002c0)='/dev/audio#\x00', 0x0, 0x100) exit(0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0x0) getuid() keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r2, 0xf, 0x2d}, 0x0, &(0x7f0000000180)="a97dd138e7135e8ee25f7ebb88a766", &(0x7f00000001c0)=""/45) [ 557.997162][T18373] Unknown ioctl 21508 16:54:47 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) getpid() r2 = syz_open_procfs(0x0, &(0x7f0000000280)='net/tcp\x00') sendfile(r0, r2, 0x0, 0xedc0) open(0x0, 0x141042, 0x0) 16:54:47 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', 0x0) 16:54:47 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x1) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:47 executing program 4: semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x281, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1c18c}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xd1, 0x200007fd, &(0x7f0000e68000)={0x2, 0x2000000004e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='vxcan1\x00', 0xf) fchdir(0xffffffffffffffff) getpgid(0xffffffffffffffff) capget(&(0x7f00000002c0)={0x19980330}, 0x0) semget$private(0x0, 0x0, 0x5c) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000005c0)) r1 = dup2(r0, r0) sendmsg$tipc(r1, &(0x7f0000002580)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000180)="fe", 0x1}], 0x1}, 0x0) ioctl$VIDIOC_S_INPUT(0xffffffffffffffff, 0xc0045627, &(0x7f00000001c0)) sendto$inet(r0, &(0x7f0000000400)="f62ab313949355e0273e65d3abda21f068933ec46b1fdf41a833e981e7de5b6aa4a1b65d8ec8094ee099d8271d26428366e221fc061208889c5686a4dc0c2d3d4fd66741cc11c4c833102fc156857f99a8b799636ea87c35b0283036520e5953baf9c51316d8d93aa5096030bd0d0dfbbdf445006af75ad33303c89c2de7ee8ac49a59a6605f3343c51ee399b1977da2e34ffbe0425866c7b7ad499ab8611286d60c0f27a1e62be4fb4b9e41eabec273531810fb81d733a5ea29408c19aba4587f9da5920ad564ad6bb89ac4565194535c7f6f54993deceb58a75e137be85d7600", 0xffffff90, 0x60, 0x0, 0x127) 16:54:47 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r4, 0x8955, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) stat(0x0, 0x0) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) [ 558.887027][T18411] Unknown ioctl 21508 16:54:48 executing program 1: semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000000)=""/198) 16:54:48 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="03000000000000009d6c10119e06d85f02635d2c7a4299e22153d32132f88a181ee9589df63eaf3050b9568e6bb20639e2d01f2dfdc87c8ea92815b757dc7d65fd046d533368df3fef8c000000002e880e95e3d4b3bee88664e8fdafbfab3e18d3e924d36671e0d9625cc57a50caddc2cc0ca4f70f842cd6e1aa504f02782c3c35a79d9c3971b4b086b07641d9a7b29452505efb1fe4a04b7bb29e068a0000000000000000000000000000000000000000000000000000a4c73cdb32823b297c5dbcb8672b40ad16e36163fbea462dd5527db8eee997b5ef860abd3d4a0638322b2e3cd8f213e3115b020400000326eb88f1d55f9c2d3b9e8bc67bbd3f9797bcd87925312f33d960c672df7178a5f619bffe7100d62973c91d91d4e7adc729d5bd3262c0325a81f3d8487b21b90da25eabe755173329b53c11cb32952dfd17ed87020f79d750d8f936a965d497c6dad922e6618172c21ae6c52637d8628020662f7049248fe016715b46937c444eeecf"], 0x1) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:49 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(0x0, 0x0) 16:54:49 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x4000, 0x0) 16:54:49 executing program 1: r0 = userfaultfd(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f000073b000/0x4000)=nil, 0x3) 16:54:49 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r4, 0x8955, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) stat(0x0, 0x0) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) 16:54:49 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(0x0, 0x0) 16:54:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$\x00\x00\x00!\x00\a', 0x7}], 0x1}, 0x0) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) [ 560.383967][T18437] Unknown ioctl 21508 16:54:49 executing program 4: semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x281, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1c18c}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xd1, 0x200007fd, &(0x7f0000e68000)={0x2, 0x2000000004e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='vxcan1\x00', 0xf) fchdir(0xffffffffffffffff) getpgid(0xffffffffffffffff) capget(&(0x7f00000002c0)={0x19980330}, 0x0) semget$private(0x0, 0x0, 0x5c) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000005c0)) r1 = dup2(r0, r0) sendmsg$tipc(r1, &(0x7f0000002580)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000180)="fe", 0x1}], 0x1}, 0x0) ioctl$VIDIOC_S_INPUT(0xffffffffffffffff, 0xc0045627, &(0x7f00000001c0)) sendto$inet(r0, &(0x7f0000000400)="f62ab313949355e0273e65d3abda21f068933ec46b1fdf41a833e981e7de5b6aa4a1b65d8ec8094ee099d8271d26428366e221fc061208889c5686a4dc0c2d3d4fd66741cc11c4c833102fc156857f99a8b799636ea87c35b0283036520e5953baf9c51316d8d93aa5096030bd0d0dfbbdf445006af75ad33303c89c2de7ee8ac49a59a6605f3343c51ee399b1977da2e34ffbe0425866c7b7ad499ab8611286d60c0f27a1e62be4fb4b9e41eabec273531810fb81d733a5ea29408c19aba4587f9da5920ad564ad6bb89ac4565194535c7f6f54993deceb58a75e137be85d7600", 0xffffff90, 0x60, 0x0, 0x127) [ 560.757425][T18447] selinux_netlink_send: 6 callbacks suppressed [ 560.757556][T18447] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18447 comm=syz-executor.0 [ 560.795566][T18447] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18447 comm=syz-executor.0 16:54:49 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(0xffffffffffffffff, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:49 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(0x0, 0x0) [ 560.866638][T18447] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18447 comm=syz-executor.0 [ 560.917886][T18447] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18447 comm=syz-executor.0 [ 560.991991][T18447] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18447 comm=syz-executor.0 [ 561.011073][T18447] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18447 comm=syz-executor.0 [ 561.034763][T18447] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18447 comm=syz-executor.0 [ 561.049354][T18447] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18447 comm=syz-executor.0 [ 561.065634][T18447] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18447 comm=syz-executor.0 [ 561.080093][T18447] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18447 comm=syz-executor.0 16:54:50 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r4, 0x8955, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r5, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(r5, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) 16:54:50 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x20, 0x10, 0x411, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6841}}, 0x20}}, 0x0) 16:54:50 executing program 1: move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffc000/0x3000)=nil], 0x0, 0x0, 0x0) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xffffffffffffffc9, 0x0) [ 561.986494][T18459] Unknown ioctl 21508 16:54:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x104000000000000, 0x40, &(0x7f00000007c0)=@raw={'raw\x00', 0x2, 0x3, 0x220, 0x0, 0xe8, 0xe8, 0xe8, 0xe8, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@unspec=@cgroup0={{0x28, 'cgroup\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@inet=@SET2={0x30, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3c1) 16:54:51 executing program 4: semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x281, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1c18c}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xd1, 0x200007fd, &(0x7f0000e68000)={0x2, 0x2000000004e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='vxcan1\x00', 0xf) fchdir(0xffffffffffffffff) getpgid(0xffffffffffffffff) capget(&(0x7f00000002c0)={0x19980330}, 0x0) semget$private(0x0, 0x0, 0x5c) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000005c0)) r1 = dup2(r0, r0) sendmsg$tipc(r1, &(0x7f0000002580)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000180)="fe", 0x1}], 0x1}, 0x0) ioctl$VIDIOC_S_INPUT(0xffffffffffffffff, 0xc0045627, &(0x7f00000001c0)) sendto$inet(r0, &(0x7f0000000400)="f62ab313949355e0273e65d3abda21f068933ec46b1fdf41a833e981e7de5b6aa4a1b65d8ec8094ee099d8271d26428366e221fc061208889c5686a4dc0c2d3d4fd66741cc11c4c833102fc156857f99a8b799636ea87c35b0283036520e5953baf9c51316d8d93aa5096030bd0d0dfbbdf445006af75ad33303c89c2de7ee8ac49a59a6605f3343c51ee399b1977da2e34ffbe0425866c7b7ad499ab8611286d60c0f27a1e62be4fb4b9e41eabec273531810fb81d733a5ea29408c19aba4587f9da5920ad564ad6bb89ac4565194535c7f6f54993deceb58a75e137be85d7600", 0xffffff90, 0x60, 0x0, 0x127) 16:54:51 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(0xffffffffffffffff, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:51 executing program 1: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000001a40)={"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"}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x10000000002) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 562.531385][T18484] Unknown ioctl 21508 16:54:51 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x281, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xd1, 0x200007fd, &(0x7f0000e68000)={0x2, 0x2000000004e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='vxcan1\x00', 0xf) r1 = dup2(r0, r0) sendmsg$tipc(r1, &(0x7f0000002580)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000180)="fe", 0x1}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000400)="f62ab313949355e0273e65d3abda21f068933ec46b1fdf41a833e981e7de5b6aa4a1b65d8ec8094ee099d8271d26428366e221fc061208889c5686a4dc0c2d3d4fd66741cc11c4c833102fc156857f99a8b799636ea87c35b0283036520e5953baf9c51316d8d93aa5096030bd0d0dfbbdf445006af75ad33303c89c2de7ee8ac49a59a6605f3343c51ee399b1977da2e34ffbe0425866c7b7ad499ab8611286d60c0f27a1e62be4fb4b9e41eabec273531810fb81d733a5ea29408c19aba4587f9da5920ad564ad6bb89ac4565194535c7f6f54993deceb58a75e137be8", 0xde, 0x60, 0x0, 0x0) 16:54:51 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x801, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) 16:54:51 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(0xffffffffffffffff, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:52 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000000)) [ 563.127758][T18499] Unknown ioctl 21508 16:54:52 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r4, 0x8955, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r5, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(r5, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) 16:54:52 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, 0x0, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:52 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000280)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x0) creat(&(0x7f0000002440)='./file0\x00', 0x0) close(r0) 16:54:52 executing program 4: semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x281, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1c18c}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xd1, 0x200007fd, &(0x7f0000e68000)={0x2, 0x2000000004e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='vxcan1\x00', 0xf) fchdir(0xffffffffffffffff) getpgid(0xffffffffffffffff) capget(&(0x7f00000002c0)={0x19980330}, 0x0) semget$private(0x0, 0x0, 0x5c) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000005c0)) r1 = dup2(r0, r0) sendmsg$tipc(r1, &(0x7f0000002580)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000180)="fe", 0x1}], 0x1}, 0x0) ioctl$VIDIOC_S_INPUT(0xffffffffffffffff, 0xc0045627, &(0x7f00000001c0)) sendto$inet(r0, &(0x7f0000000400)="f62ab313949355e0273e65d3abda21f068933ec46b1fdf41a833e981e7de5b6aa4a1b65d8ec8094ee099d8271d26428366e221fc061208889c5686a4dc0c2d3d4fd66741cc11c4c833102fc156857f99a8b799636ea87c35b0283036520e5953baf9c51316d8d93aa5096030bd0d0dfbbdf445006af75ad33303c89c2de7ee8ac49a59a6605f3343c51ee399b1977da2e34ffbe0425866c7b7ad499ab8611286d60c0f27a1e62be4fb4b9e41eabec273531810fb81d733a5ea29408c19aba4587f9da5920ad564ad6bb89ac4565194535c7f6f54993deceb58a75e137be85d7600", 0xffffff90, 0x60, 0x0, 0x127) 16:54:52 executing program 1: r0 = fanotify_init(0x0, 0x0) fanotify_mark(r0, 0x90, 0x0, 0xffffffffffffffff, 0x0) 16:54:53 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2cb0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000001a40)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db500800000000000008f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047666865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000080)=0x10000000002) r3 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x10000, 0x0) fremovexattr(r3, &(0x7f0000000140)=@known='trusted.overlay.origin\x00') ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 564.040417][T18513] Unknown ioctl 21508 16:54:53 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, 0x0, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:53 executing program 1: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/bluetooth/6lowpan_enable\x00', 0x2, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80001d00c0d0) [ 564.779243][T18535] Unknown ioctl 21508 16:54:54 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r4, 0x8955, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r5, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(r5, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) 16:54:54 executing program 0: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x98428d57a99b5f44) io_setup(0xd, &(0x7f0000000100)=0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) io_submit(r1, 0x200002f1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 16:54:54 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, 0x0, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:54 executing program 3: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x8) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') syz_open_dev$audion(&(0x7f00000002c0)='/dev/audio#\x00', 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x3b, &(0x7f0000000480)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000043fe0000070600000ee60000bf050000000000001f650000000000006507000002000000270700004c0000001f75000005000000bf5400000000000007040000f0fff8ffad430100000000009500000000000000050000000000000095000000000000001c0a7900009d3c2792432a4fa650c512aee994a56462712cb064ecd5615f3196e3359aceb768637e60bd5d2e4b5992de991371274fdff6e79fc722e25659a7c85415c1b808c894123cfe2314e887efecdcb7381ef4932cb0dcebea6d90e9c1677fbefd35893d883a2c559b6a34db461b1974af360eace66cec40d92706d0bbcc5bf6fec345ae9606c3c1a348f9b395592c1018e5e4b41b13a5fd0cc270000c94df1f2db24c67d4c7ba9ec035883e2791c4e9dff3e8bfc7d1746091b1820102b1905a1561d8e64e27019095601e3a3412086dee84efd375f0645f3301f55d3b9efdfbed9b430bcf0418e100bdff1c8bcfbdc229874bc3d2418babdca31afc3362874b83a5d0ffbad27c80997c8bef9aa55841caa572ddff9220c67c9e17bee524c3dc747455763ecb0a7c2cd12bc34b0fc02711"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) exit(0x0) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000200)='asymmetric\x00', &(0x7f0000000240)=@keyring={'key_or_keyring:', 0x0, 0xa}) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, 0x0, &(0x7f0000000180)="a97dd138e7135e8ee25f7ebb88a76634a07c06", &(0x7f00000001c0)=""/45) 16:54:54 executing program 4: move_pages(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000ffc000/0x3000)=nil], 0x0, &(0x7f0000000440), 0x0) [ 565.744982][T18552] Unknown ioctl 21508 [ 565.989686][ T32] audit: type=1800 audit(1584032094.940:107): pid=18540 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=17345 res=0 [ 566.012440][ T32] audit: type=1800 audit(1584032094.960:108): pid=18541 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=17345 res=0 16:54:55 executing program 4: 16:54:55 executing program 1: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/bluetooth/6lowpan_enable\x00', 0x2, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80001d00c0d0) 16:54:55 executing program 0: 16:54:55 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:55 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) 16:54:55 executing program 0: 16:54:55 executing program 4: 16:54:55 executing program 3: 16:54:56 executing program 0: 16:54:56 executing program 4: 16:54:56 executing program 3: 16:54:56 executing program 1: 16:54:56 executing program 0: 16:54:56 executing program 4: 16:54:56 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:56 executing program 3: 16:54:57 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe(0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) 16:54:57 executing program 1: 16:54:57 executing program 0: 16:54:57 executing program 4: 16:54:57 executing program 1: 16:54:57 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="03000000000000009d6c10119e06d85f02635d2c7a4299e22153d32132f88a181ee9589df63eaf3050b9568e6bb20639e2d01f2dfdc87c8ea92815b757dc7d65fd046d533368df3fef8c000000002e880e95e3d4b3bee88664e8fdafbfab3e18d3e924d36671e0d9625cc57a50caddc2cc0ca4f70f842cd6e1aa504f02782c3c35a79d9c3971b4b086b07641d9a7b29452505efb1fe4a04b7bb29e068a0000000000000000000000000000000000000000000000000000a4c73cdb32823b297c5dbcb8672b40ad16e36163fbea462dd5527db8eee997b5ef860abd3d4a0638322b2e3cd8f213e3115b020400000326eb88f1d55f9c2d3b9e8bc67bbd3f9797bcd87925312f33d960c672df7178a5f619bffe7100d62973c91d91d4e7adc729d5bd3262c0325a81f3d8487b21b90da25eabe755173329b53c11cb32952dfd17ed87020f79d750d8f936a965d497c6dad922e6618172c21ae6c52637d8628020662f7049248fe016715b46937c444eeecfa0"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:57 executing program 3: 16:54:57 executing program 0: 16:54:57 executing program 4: 16:54:57 executing program 1: 16:54:58 executing program 3: 16:54:58 executing program 0: 16:54:58 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) 16:54:58 executing program 4: 16:54:58 executing program 1: 16:54:58 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="03000000000000009d6c10119e06d85f02635d2c7a4299e22153d32132f88a181ee9589df63eaf3050b9568e6bb20639e2d01f2dfdc87c8ea92815b757dc7d65fd046d533368df3fef8c000000002e880e95e3d4b3bee88664e8fdafbfab3e18d3e924d36671e0d9625cc57a50caddc2cc0ca4f70f842cd6e1aa504f02782c3c35a79d9c3971b4b086b07641d9a7b29452505efb1fe4a04b7bb29e068a0000000000000000000000000000000000000000000000000000a4c73cdb32823b297c5dbcb8672b40ad16e36163fbea462dd5527db8eee997b5ef860abd3d4a0638322b2e3cd8f213e3115b020400000326eb88f1d55f9c2d3b9e8bc67bbd3f9797bcd87925312f33d960c672df7178a5f619bffe7100d62973c91d91d4e7adc729d5bd3262c0325a81f3d8487b21b90da25eabe755173329b53c11cb32952dfd17ed87020f79d750d8f936a965d497c6dad922e6618172c21ae6c52637d8628020662f7049248fe016715b46937c444eeecfa0"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:58 executing program 3: 16:54:58 executing program 0: 16:54:58 executing program 4: 16:54:58 executing program 1: 16:54:58 executing program 3: 16:54:58 executing program 0: 16:54:59 executing program 4: 16:54:59 executing program 1: 16:54:59 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) 16:54:59 executing program 3: 16:54:59 executing program 0: 16:54:59 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:54:59 executing program 4: 16:54:59 executing program 1: 16:55:00 executing program 3: 16:55:00 executing program 4: 16:55:00 executing program 0: 16:55:00 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="03000000000000009d6c10119e06d85f02635d2c7a4299e22153d32132f88a181ee9589df63eaf3050b9568e6bb20639e2d01f2dfdc87c8ea92815b757dc7d65fd046d533368df3fef8c000000002e880e95e3d4b3bee88664e8fdafbfab3e18d3e924d36671e0d9625cc57a50caddc2cc0ca4f70f842cd6e1aa504f02782c3c35a79d9c3971b4b086b07641d9a7b29452505efb1fe4a04b7bb29e068a0000000000000000000000000000000000000000000000000000a4c73cdb32823b297c5dbcb8672b40ad16e36163fbea462dd5527db8eee997b5ef860abd3d4a0638322b2e3cd8f213e3115b020400000326eb88f1d55f9c2d3b9e8bc67bbd3f9797bcd87925312f33d960c672df7178a5f619bffe7100d62973c91d91d4e7adc729d5bd3262c0325a81f3d8487b21b90da25eabe755173329b53c11cb32952dfd17ed87020f79d750d8f936a965d497c6dad922e6618172c21ae6c52637d8628020662f7049248fe016715b46937c444eeecfa0"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:55:00 executing program 4: 16:55:00 executing program 1: 16:55:00 executing program 3: 16:55:00 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) 16:55:00 executing program 0: 16:55:01 executing program 3: 16:55:01 executing program 1: 16:55:01 executing program 4: 16:55:01 executing program 0: 16:55:01 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="03000000000000009d6c10119e06d85f02635d2c7a4299e22153d32132f88a181ee9589df63eaf3050b9568e6bb20639e2d01f2dfdc87c8ea92815b757dc7d65fd046d533368df3fef8c000000002e880e95e3d4b3bee88664e8fdafbfab3e18d3e924d36671e0d9625cc57a50caddc2cc0ca4f70f842cd6e1aa504f02782c3c35a79d9c3971b4b086b07641d9a7b29452505efb1fe4a04b7bb29e068a0000000000000000000000000000000000000000000000000000a4c73cdb32823b297c5dbcb8672b40ad16e36163fbea462dd5527db8eee997b5ef860abd3d4a0638322b2e3cd8f213e3115b020400000326eb88f1d55f9c2d3b9e8bc67bbd3f9797bcd87925312f33d960c672df7178a5f619bffe7100d62973c91d91d4e7adc729d5bd3262c0325a81f3d8487b21b90da25eabe755173329b53c11cb32952dfd17ed87020f79d750d8f936a965d497c6dad922e6618172c21ae6c52637d8628020662f7049248fe016715b46937c444eeecfa0"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:55:01 executing program 1: 16:55:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3}) ioctl$BLKTRACETEARDOWN(r0, 0x125d, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 16:55:01 executing program 0: mlock(&(0x7f0000ff7000/0x4000)=nil, 0x4000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) munlock(&(0x7f0000ffa000/0x1000)=nil, 0x1000) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffa000/0x4000)=nil) 16:55:01 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x12, 0x0, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8640888a8", 0x0, 0x200}, 0x28) 16:55:02 executing program 1: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'lblc\x00', 0x0, 0x4}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) lstat(&(0x7f0000000040)='./file0/file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 16:55:02 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) 16:55:02 executing program 4: mlock(&(0x7f0000ff7000/0x4000)=nil, 0x4000) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ffa000/0x4000)=nil) 16:55:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x3, 0x6}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000240)=0x4, 0x8) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 573.500450][T18731] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:55:02 executing program 4: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x101141, 0x0) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000180)=""/254) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000140)="80fd02", 0x3}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2b3) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:55:02 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:55:02 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup2(r1, r0) ioctl$TUNGETSNDBUF(r0, 0x5411, &(0x7f0000000000)) 16:55:03 executing program 1: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'lblc\x00', 0x0, 0x4}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) lstat(&(0x7f0000000040)='./file0/file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 573.965342][T14967] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:55:03 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0000000400000098030000f8000000c8010000f8000000c8010000f8000000c8020000c8020000c8020000c8020000c80200000400000000000000000000004cc7872711511674c05009ff3488171900000000000000000000ffff000000000000000000000000000000000000000000000000000000000000000000000000736974300000000000000000000000006272696467655f736c6176655f3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8000000000000000000000000000000000000000000000000002800686c00000000000000000000000000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000070000000000020000018000000000fe880000000000000000000000000001fe8800000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000687372300000000000000000000000000000000000000000000000000000000000000000000000002d1b27020000000000000000000000000000000000000000000000000000000000000000a800d00000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000000000020000060000000000fe8000000000000000000000000000bbfe88000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000006272696467655f736c6176655f310000626174616476300000000000000000000000000000000000000000000000000000000000000000000000000000000000110000050000000000000000d800000100000000000000000000000000000000000000000000000030006c327470000000000000000000000000000000000000000000000000000000000000000000000000020000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_tables_matches\x00') sendfile(r3, r4, 0x0, 0x9) lstat(0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 574.339641][T18762] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:55:03 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') sendfile(r2, r3, 0x0, 0x9) 16:55:03 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) [ 574.749219][T14929] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:55:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffff7}]}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0xc0182101, 0x0) 16:55:04 executing program 1: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'lblc\x00', 0x0, 0x4}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) lstat(&(0x7f0000000040)='./file0/file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 16:55:04 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:55:04 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clock_nanosleep(0x2, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) 16:55:04 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x7ffe) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) fdatasync(r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x0, 0x0, 0x4}) [ 575.302368][T18786] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:55:04 executing program 1: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'lblc\x00', 0x0, 0x4}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) lstat(&(0x7f0000000040)='./file0/file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 575.377048][T14880] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:55:04 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000800)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c1030000030000002004000080020000800200008002000000000000800200005003000050030000500300005003000050030000030000000000000000000000fe8000000000000000000000000000bbff020000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000076657468315f746f5f626f6e640000006e6574706369300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500280020000000800000000000000000000000000000000000000005001686173686c696d697400000000000000000000000000000000000000000273797a6b616c6c65723100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000fe18b61a000800000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a6b616c6c657231000000000000000000000000000004000000000000000000001528000000a60000000000000000000000000000003000434f4e4ecd41524b00000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800434c4153534946590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000080)={{{@in=@loopback, @in6=@local}}, {{@in6=@remote}, 0x0, @in=@initdev}}, 0x0) 16:55:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/keys\x00', 0x0, 0x0) getdents(r2, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) r3 = gettid() r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r3, r4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ioctl$NS_GET_OWNER_UID(r2, 0xb704, 0x0) getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) r6 = gettid() r7 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x32, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r6, r7, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) openat$cgroup_type(r1, &(0x7f0000000340)='cgroup.type\x00', 0x2, 0x0) r9 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/fuse\x00', 0x2, 0x0) r11 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) gettid() ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) 16:55:04 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r3, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(r3, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) 16:55:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x38, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}]}}}]}, 0x38}}, 0x0) 16:55:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getresgid(0x0, 0x0, &(0x7f0000000300)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x16, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) [ 576.038596][T18803] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:55:05 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:55:05 executing program 1: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'lblc\x00', 0x0, 0x4}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) lstat(&(0x7f0000000040)='./file0/file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 16:55:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/keys\x00', 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) getegid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x70) 16:55:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x6, 0x1, 0x101, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) [ 576.829314][T18837] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:55:06 executing program 1: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'lblc\x00', 0x0, 0x4}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) lstat(&(0x7f0000000040)='./file0/file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 16:55:06 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) socket$inet(0x2, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/cpuinfo\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 16:55:06 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:55:06 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r0, r1) 16:55:06 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) 16:55:06 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r3, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(r3, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) [ 577.436297][T18849] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:55:06 executing program 1: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'lblc\x00', 0x0, 0x4}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) lstat(&(0x7f0000000040)='./file0/file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 16:55:06 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) write$tun(r0, &(0x7f0000001980)={@void, @val={0x0, 0x0, 0x1}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a5c268", 0xfda, 0x3a, 0x0, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x19, "e5fb000005005357cd99e33bca98e246dc9027eb3334ea443e7fdc4049b892d54090878bee496aa11e07fb0f1db1a0ebe2f95347b0317613063381165c01f08fea1048ea59a6f2273e02707fdd7defc02bde3192360593169594710bddd04aead6c89c87778555de42d23236534ba1a799a63eb4532003a703b249e4628e4706bccc7a264ee85014d99a7fd4565d3c416c835a741eb4e97140e834013724d23450072f0087ac65295ca0d7c601c30de0161560e2d20c5b1052e9b208e25470e9fa884ecd2082ec38b3cb19c083"}, {0x0, 0x1b, "14a142ef59c04e8e7b4db5309006bd98ec79847a52ed68124e8a24d3079fc53b81c039a7d59f992dcb481043f510a0ce1ebb98c07a624ff8c8cc0b4fd3b8e700196d1f5696e184393de669ffaebfbd494a9d6a5fedac0738ffc3dcb3c1b96e48fd063786ae5701f6aa5022621e665607848e20f162630df96d0a773993e97ae6b847e51883d73d66bb30b4375229cfd0c9c41f511bfbf2bca94caa7ce76be257173a4eae2b484117ac32acf6ea1a32def26c919c93055c2f9a640b2d847d527357902538828abd66b3d1a9b85034066154f0b2ec054f6a8712ec98e5"}, {0x0, 0x1f, "8cf0833ae2772f05d302c778833be4f2b9c43c83284b82e71ca1ee382af46513079a2f52da08c93afdfc1a18e4b677b307a1c7df90787cbd143b129bc8dbc39104eb21674d26fd4ced8626df256869e168d42f4d160ad1442cae2bd8fda0fc44a08759d245bfe8eba42ec7967c1e953256a057369159333bca73b498a882fb5e840d429804169a6446c1d1b013144ae0ee276a463ef69ea4c4636751083041811c9b549256c6a3a71e451f8fd4de25629b3de61cba78315412fa14e350bb03feaf63909bd7320561df80bc77f36d4561a5efcc324450355ed398d9e46e798e23e2a4a2c787728b9c549a1894c53dcdfe834c7785fb3c4331"}, {0x0, 0x3, "6598975984c98199c07565e33783bc472344c2fc4e6a32"}, {0x0, 0x1a1, "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"}]}}}}}, 0x100c) 16:55:07 executing program 3: socketpair$unix(0x1, 0x2, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) r3 = socket$inet6(0xa, 0x3, 0x3a) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) r4 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8482) openat$fuse(0xffffffffffffff9c, &(0x7f0000001540)='/dev/fuse\x00', 0x2, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001540)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="7bbd2b", @ANYRESHEX=r5, @ANYBLOB=',00000000000000040000,user_id=', @ANYRESDEC]) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x1, 0x0, 0x20, 0x5, 0x0, 0x0, 0x2, 0x0, 0x4}, 0x0) [ 578.364153][T18883] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:55:07 executing program 1: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'lblc\x00', 0x0, 0x4}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) lstat(&(0x7f0000000040)='./file0/file0\x00', 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 16:55:07 executing program 0: 16:55:07 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="03000000000000009d6c10119e06d85f02635d2c7a4299e22153d32132f88a181ee9589df63eaf3050b9568e6bb20639e2d01f2dfdc87c8ea92815b757dc7d65fd046d533368df3fef8c000000002e880e95e3d4b3bee88664e8fdafbfab3e18d3e924d36671e0d9625cc57a50caddc2cc0ca4f70f842cd6e1aa504f02782c3c35a79d9c3971b4b086b07641d9a7b29452505efb1fe4a04b7bb29e068a0000000000000000000000000000000000000000000000000000a4c73cdb32823b297c5dbcb8672b40ad16e36163fbea462dd5527db8eee997b5ef860abd3d4a0638322b2e3cd8f213e3115b020400000326eb88f1d55f9c2d3b9e8bc67bbd3f9797bcd87925312f33d960c672df7178a5f619bffe7100d62973c91d91d4e7adc729d5bd3262c0325a81f3d8487b21b90da25eabe755173329b53c11cb32952dfd17ed87020f79d750d8f936a965d497c6dad922e6618172c21ae6c52637d8628020662f7049248fe016715b46937c444eeecfa0"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xffffff81, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:55:07 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000ac0)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r2, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(r2, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) 16:55:07 executing program 4: [ 578.950020][T18895] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:55:08 executing program 1: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'lblc\x00', 0x0, 0x4}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) lstat(&(0x7f0000000040)='./file0/file0\x00', 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 16:55:08 executing program 0: 16:55:08 executing program 4: [ 579.555954][T18909] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 579.718363][ T32] audit: type=1800 audit(1584032108.760:109): pid=18894 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=17489 res=0 16:55:08 executing program 0: 16:55:08 executing program 1: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'lblc\x00', 0x0, 0x4}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) lstat(&(0x7f0000000040)='./file0/file0\x00', 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 16:55:08 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0x0, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:55:09 executing program 3: 16:55:09 executing program 4: 16:55:09 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r2, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(r2, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) 16:55:09 executing program 4: [ 580.575282][T18928] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:55:09 executing program 0: 16:55:09 executing program 3: 16:55:10 executing program 1: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'lblc\x00', 0x0, 0x4}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 16:55:10 executing program 0: 16:55:10 executing program 3: 16:55:10 executing program 4: [ 581.565984][T18944] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:55:10 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) 16:55:10 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="03000000000000009d6c10119e06d85f02635d2c7a4299e22153d32132f88a181ee9589df63eaf3050b9568e6bb20639e2d01f2dfdc87c8ea92815b757dc7d65fd046d533368df3fef8c000000002e880e95e3d4b3bee88664e8fdafbfab3e18d3e924d36671e0d9625cc57a50caddc2cc0ca4f70f842cd6e1aa504f02782c3c35a79d9c3971b4b086b07641d9a7b29452505efb1fe4a04b7bb29e068a0000000000000000000000000000000000000000000000000000a4c73cdb32823b297c5dbcb8672b40ad16e36163fbea462dd5527db8eee997b5ef860abd3d4a0638322b2e3cd8f213e3115b020400000326eb88f1d55f9c2d3b9e8bc67bbd3f9797bcd87925312f33d960c672df7178a5f619bffe7100d62973c91d91d4e7adc729d5bd3262c0325a81f3d8487b21b90da25eabe755173329b53c11cb32952dfd17ed87020f79d750d8f936a965d497c6dad922e6618172c21ae6c52637d8628020662f7049248fe016715b46937c444eeecfa0"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0x0, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) socket(0x0, 0x0, 0x0) 16:55:11 executing program 4: 16:55:11 executing program 1: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'lblc\x00', 0x0, 0x4}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 582.083686][T14880] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:55:11 executing program 3: 16:55:11 executing program 0: 16:55:11 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) 16:55:11 executing program 4: 16:55:11 executing program 3: [ 582.857404][T18973] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:55:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4004ae86, &(0x7f0000000380)) 16:55:12 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) 16:55:12 executing program 3: creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) execve(0x0, 0x0, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 16:55:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000000000080000040"]) [ 583.215668][T14916] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:55:12 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0x0, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) 16:55:12 executing program 1: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'lblc\x00', 0x0, 0x4}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 583.629500][T18986] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000, 16:55:12 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) 16:55:12 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fgetxattr(r0, &(0x7f0000000000)=@known='security.apparmor\x00', 0x0, 0x7) [ 583.769416][T18997] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000000, 16:55:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_genetlink_get_family_id$fou(0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 584.078484][T19005] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:55:13 executing program 1: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'lblc\x00', 0x0, 0x4}, {@empty}}, 0x44) lstat(&(0x7f0000000040)='./file0/file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 16:55:13 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4004ae86, &(0x7f0000000380)) 16:55:13 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0x0, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) 16:55:13 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4138ae84, &(0x7f0000000380)) 16:55:13 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) 16:55:13 executing program 1: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'lblc\x00', 0x0, 0x4}, {@empty}}, 0x44) lstat(&(0x7f0000000040)='./file0/file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 16:55:14 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$sock(r0, &(0x7f0000003340)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@mark={{0x10}}, @mark={{0x10}}], 0x20}}], 0x1, 0x0) 16:55:14 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x8004ae98, &(0x7f0000000380)) 16:55:14 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) 16:55:14 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xd1fa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:55:14 executing program 1: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'lblc\x00', 0x0, 0x4}, {@empty}}, 0x44) lstat(&(0x7f0000000040)='./file0/file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 16:55:14 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$sock(r0, &(0x7f0000003340)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@mark={{0x10}}, @mark={{0x10}}], 0x20}}], 0x1, 0x0) 16:55:14 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x8) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000002c0)={0x0, 0x40000, 0x0, 0x0, 0x0, "6846bd56226063e82089ec099a15c5f8115315"}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) 16:55:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x5, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x63, 0x11, 0x7}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 16:55:15 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) 16:55:15 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000001a40)={"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"}) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x10000000002) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:55:15 executing program 1: syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) lstat(&(0x7f0000000040)='./file0/file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 16:55:15 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$sock(r0, &(0x7f0000003340)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@mark={{0x10}}, @mark={{0x10}}], 0x20}}], 0x1, 0x0) 16:55:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x5, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x63, 0x11, 0x7}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 16:55:15 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) 16:55:16 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000080)="0f0147d1d1861900000f23c80f21f8350000e0000f23f8b9190b0000b8ba690000ba000000000f308fe938028d2f000000f30f2cc0b805000000f9e0a264df0f01c166ba4300ecc744240000000000c7442402bc0c0000c7442406000000000f011c24c4c11972d000", 0x69}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents(r4, &(0x7f0000000000)=""/62, 0xd6147cbb6f273a13) 16:55:16 executing program 1: syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) lstat(&(0x7f0000000040)='./file0/file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 16:55:16 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$sock(r0, &(0x7f0000003340)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@mark={{0x10}}, @mark={{0x10}}], 0x20}}], 0x1, 0x0) 16:55:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) link(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='./file0\x00') r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) setitimer(0x2, &(0x7f0000000340)={{}, {0x0, r2/1000+10000}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x88, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, 0x304}, [@IFLA_LINKINFO={0x60, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_GRE_ENCAP_SPORT={0x6, 0x10, 0x4e24}, @IFLA_GRE_ENCAP_DPORT={0x6, 0x11, 0x4e21}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_FLOWINFO={0x8, 0xc, 0x7}, @IFLA_GRE_ENCAP_SPORT={0x6, 0x10, 0x4e22}, @IFLA_GRE_REMOTE={0x14, 0x7, @mcast2}, @IFLA_GRE_ERSPAN_VER={0x5, 0x16, 0x2}, @IFLA_GRE_TTL={0x5, 0x8, 0x2}]}}}, @IFLA_MASTER={0x8}]}, 0x88}}, 0x0) 16:55:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x5, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x63, 0x11, 0x7}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 16:55:16 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) 16:55:16 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendmmsg$sock(r0, &(0x7f0000003340)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@mark={{0x10}}, @mark={{0x10}}], 0x20}}], 0x1, 0x0) 16:55:16 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, &(0x7f0000000800)=[{{&(0x7f0000000880)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f00000005c0)=[@flowinfo={{0x14, 0x29, 0xb, 0x1}}], 0x18}}], 0x1, 0x0) 16:55:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001bc0), 0xfe, 0x0, &(0x7f0000001d00)={0x77359400}) 16:55:17 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) 16:55:17 executing program 1: syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) lstat(&(0x7f0000000040)='./file0/file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 16:55:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x5, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x63, 0x11, 0x7}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 16:55:17 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:55:17 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendmmsg$sock(r0, &(0x7f0000003340)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@mark={{0x10}}, @mark={{0x10}}], 0x20}}], 0x1, 0x0) 16:55:17 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) 16:55:17 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) 16:55:17 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendmmsg$sock(r0, &(0x7f0000003340)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@mark={{0x10}}, @mark={{0x10}}], 0x20}}], 0x1, 0x0) 16:55:18 executing program 1: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) lstat(&(0x7f0000000040)='./file0/file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 16:55:18 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)={r3, 0x401, 0x2, r3}) 16:55:18 executing program 4: 16:55:18 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) 16:55:18 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) 16:55:18 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$sock(r0, &(0x7f0000003340)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@mark={{0x10}}, @mark={{0x10}}], 0x20}}], 0x1, 0x0) [ 589.316802][T19179] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500) [ 589.325093][T19179] FAT-fs (loop1): Filesystem has been set read-only 16:55:18 executing program 1: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) lstat(&(0x7f0000000040)='./file0/file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 16:55:18 executing program 4: 16:55:18 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)={r3, 0x401, 0x2, r3}) 16:55:19 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) 16:55:19 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) 16:55:19 executing program 4: 16:55:19 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$sock(r0, &(0x7f0000003340)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@mark={{0x10}}, @mark={{0x10}}], 0x20}}], 0x1, 0x0) 16:55:19 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)={r3, 0x401, 0x2, r3}) 16:55:19 executing program 1: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) lstat(&(0x7f0000000040)='./file0/file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 16:55:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x63, 0x11, 0x7}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 16:55:19 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$sock(r0, &(0x7f0000003340)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@mark={{0x10}}, @mark={{0x10}}], 0x20}}], 0x1, 0x0) 16:55:19 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x3f2}}) 16:55:19 executing program 4: 16:55:20 executing program 3: bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000003340)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@mark={{0x10}}, @mark={{0x10}}], 0x20}}], 0x1, 0x0) 16:55:20 executing program 4: 16:55:20 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)={r3, 0x401, 0x2, r3}) 16:55:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x63, 0x11, 0x7}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 16:55:20 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(r0, 0x541c, 0x0) 16:55:20 executing program 1: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'lblc\x00'}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) lstat(&(0x7f0000000040)='./file0/file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 16:55:20 executing program 3: bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000003340)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@mark={{0x10}}, @mark={{0x10}}], 0x20}}], 0x1, 0x0) 16:55:20 executing program 4: 16:55:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x63, 0x11, 0x7}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 16:55:20 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(r0, 0x541c, 0x0) 16:55:20 executing program 4: 16:55:21 executing program 5: 16:55:21 executing program 1: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'lblc\x00'}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) lstat(&(0x7f0000000040)='./file0/file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 16:55:21 executing program 3: bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000003340)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@mark={{0x10}}, @mark={{0x10}}], 0x20}}], 0x1, 0x0) 16:55:21 executing program 4: 16:55:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x5, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 16:55:21 executing program 5: 16:55:21 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000100)) ioctl$TIOCL_SETSEL(r0, 0x541c, 0x0) [ 592.460316][T19287] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500) [ 592.468651][T19287] FAT-fs (loop1): Filesystem has been set read-only [ 592.475501][T19287] ===================================================== [ 592.482466][T19287] BUG: KMSAN: uninit-value in fat_evict_inode+0x2f4/0x920 [ 592.489611][T19287] CPU: 0 PID: 19287 Comm: syz-executor.1 Not tainted 5.6.0-rc2-syzkaller #0 [ 592.498285][T19287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 592.508361][T19287] Call Trace: [ 592.511665][T19287] dump_stack+0x1c9/0x220 [ 592.516020][T19287] kmsan_report+0xf7/0x1e0 [ 592.520481][T19287] __msan_warning+0x58/0xa0 [ 592.524989][T19287] fat_evict_inode+0x2f4/0x920 [ 592.529762][T19287] ? fat_write_inode+0x250/0x250 [ 592.534698][T19287] evict+0x4ab/0xe10 [ 592.538604][T19287] iput+0xa70/0xe10 [ 592.542421][T19287] fat_build_inode+0x6a3/0x840 [ 592.547188][T19287] vfat_mkdir+0x547/0x7d0 [ 592.551527][T19287] ? vfat_unlink+0x660/0x660 [ 592.556125][T19287] vfs_mkdir+0x691/0x920 [ 592.560375][T19287] do_mkdirat+0x39f/0x680 [ 592.564725][T19287] __ia32_sys_mkdir+0x9f/0xd0 [ 592.569422][T19287] ? __se_sys_mkdir+0x90/0x90 [ 592.574108][T19287] do_fast_syscall_32+0x3c7/0x6e0 [ 592.579145][T19287] entry_SYSENTER_compat+0x68/0x77 [ 592.584249][T19287] RIP: 0023:0xf7fabd99 [ 592.588310][T19287] Code: 90 e8 0b 00 00 00 f3 90 0f ae e8 eb f9 8d 74 26 00 89 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 592.608537][T19287] RSP: 002b:00000000f5da60cc EFLAGS: 00000296 ORIG_RAX: 0000000000000027 [ 592.616976][T19287] RAX: ffffffffffffffda RBX: 0000000020000740 RCX: 0000000000000000 [ 592.624949][T19287] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 592.632912][T19287] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 592.640875][T19287] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 592.648837][T19287] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 592.656813][T19287] [ 592.659128][T19287] Uninit was created at: [ 592.663365][T19287] kmsan_save_stack_with_flags+0x3c/0x90 [ 592.668997][T19287] kmsan_alloc_page+0x12a/0x310 [ 592.673923][T19287] __alloc_pages_nodemask+0x5712/0x5e80 [ 592.679458][T19287] alloc_pages_current+0x67d/0x990 [ 592.684574][T19287] alloc_slab_page+0x111/0x12f0 [ 592.689415][T19287] new_slab+0x2bc/0x1130 [ 592.693645][T19287] ___slab_alloc+0x1533/0x1f30 [ 592.698394][T19287] kmem_cache_alloc+0xb23/0xd70 [ 592.703241][T19287] fat_alloc_inode+0x58/0x120 [ 592.707908][T19287] new_inode_pseudo+0xb1/0x590 [ 592.712664][T19287] new_inode+0x5a/0x3d0 [ 592.716824][T19287] fat_build_inode+0x537/0x840 [ 592.721575][T19287] vfat_mkdir+0x547/0x7d0 [ 592.725892][T19287] vfs_mkdir+0x691/0x920 [ 592.730127][T19287] do_mkdirat+0x39f/0x680 [ 592.734445][T19287] __ia32_sys_mkdir+0x9f/0xd0 [ 592.739113][T19287] do_fast_syscall_32+0x3c7/0x6e0 [ 592.744136][T19287] entry_SYSENTER_compat+0x68/0x77 [ 592.749332][T19287] ===================================================== [ 592.756245][T19287] Disabling lock debugging due to kernel taint [ 592.762386][T19287] Kernel panic - not syncing: panic_on_warn set ... [ 592.768967][T19287] CPU: 0 PID: 19287 Comm: syz-executor.1 Tainted: G B 5.6.0-rc2-syzkaller #0 [ 592.779011][T19287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 592.789055][T19287] Call Trace: [ 592.792342][T19287] dump_stack+0x1c9/0x220 [ 592.796695][T19287] panic+0x3d5/0xc3e [ 592.800624][T19287] kmsan_report+0x1df/0x1e0 [ 592.805145][T19287] __msan_warning+0x58/0xa0 [ 592.809654][T19287] fat_evict_inode+0x2f4/0x920 [ 592.814426][T19287] ? fat_write_inode+0x250/0x250 [ 592.819449][T19287] evict+0x4ab/0xe10 [ 592.823367][T19287] iput+0xa70/0xe10 [ 592.827190][T19287] fat_build_inode+0x6a3/0x840 [ 592.831961][T19287] vfat_mkdir+0x547/0x7d0 [ 592.836317][T19287] ? vfat_unlink+0x660/0x660 [ 592.840923][T19287] vfs_mkdir+0x691/0x920 [ 592.845197][T19287] do_mkdirat+0x39f/0x680 [ 592.849538][T19287] __ia32_sys_mkdir+0x9f/0xd0 [ 592.854210][T19287] ? __se_sys_mkdir+0x90/0x90 [ 592.858882][T19287] do_fast_syscall_32+0x3c7/0x6e0 [ 592.863926][T19287] entry_SYSENTER_compat+0x68/0x77 [ 592.869039][T19287] RIP: 0023:0xf7fabd99 [ 592.873099][T19287] Code: 90 e8 0b 00 00 00 f3 90 0f ae e8 eb f9 8d 74 26 00 89 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 592.892690][T19287] RSP: 002b:00000000f5da60cc EFLAGS: 00000296 ORIG_RAX: 0000000000000027 [ 592.901091][T19287] RAX: ffffffffffffffda RBX: 0000000020000740 RCX: 0000000000000000 [ 592.909052][T19287] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 592.917015][T19287] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 592.925015][T19287] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 592.932989][T19287] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 592.942427][T19287] Kernel Offset: 0x5800000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 592.953969][T19287] Rebooting in 86400 seconds..