[ 72.514890][ T26] audit: type=1800 audit(1564693565.673:26): pid=10185 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 72.557299][ T26] audit: type=1800 audit(1564693565.673:27): pid=10185 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 72.583032][ T26] audit: type=1800 audit(1564693565.673:28): pid=10185 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 73.475438][ T26] audit: type=1800 audit(1564693566.653:29): pid=10185 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.18' (ECDSA) to the list of known hosts. 2019/08/01 21:06:16 fuzzer started 2019/08/01 21:06:19 dialing manager at 10.128.0.26:40035 2019/08/01 21:06:19 syscalls: 2484 2019/08/01 21:06:19 code coverage: enabled 2019/08/01 21:06:19 comparison tracing: enabled 2019/08/01 21:06:19 extra coverage: extra coverage is not supported by the kernel 2019/08/01 21:06:19 setuid sandbox: enabled 2019/08/01 21:06:19 namespace sandbox: enabled 2019/08/01 21:06:19 Android sandbox: /sys/fs/selinux/policy does not exist 2019/08/01 21:06:19 fault injection: enabled 2019/08/01 21:06:19 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/08/01 21:06:19 net packet injection: enabled 2019/08/01 21:06:19 net device setup: enabled 21:07:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000025c0)=[{&(0x7f0000000140)=""/101, 0x65}, {0x0}, {0x0}], 0x3) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x896e, 0x0, 0x0, 0x800e00519) shutdown(r1, 0x0) setsockopt$sock_timeval(r2, 0xffff, 0x1006, &(0x7f0000000040)={0x81b}, 0x10) fchmod(r2, 0x0) recvfrom$inet(r2, 0x0, 0x10201, 0x2, 0x0, 0x800e0051d) shutdown(r2, 0x0) 21:07:40 executing program 1: poll(0x0, 0x0, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xfffffff0, 0x0, 0x0, 0x800e00b2a) ppoll(&(0x7f0000000040)=[{}, {}, {r0, 0x179}, {r0}], 0x4, &(0x7f00000000c0)={0x400}, 0x0, 0x0) shutdown(r0, 0x0) syzkaller login: [ 167.822589][T10352] IPVS: ftp: loaded support on port[0] = 21 [ 167.834921][T10354] IPVS: ftp: loaded support on port[0] = 21 21:07:41 executing program 2: poll(&(0x7f0000000040), 0x2000000000000014, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xfffffff0, 0x0, 0x0, 0x800e00a30) ppoll(&(0x7f0000000040)=[{r0, 0x3}, {r0}], 0x2, 0x0, &(0x7f0000000140), 0x8) shutdown(r0, 0x0) [ 168.035401][T10354] chnl_net:caif_netlink_parms(): no params data found [ 168.065624][T10352] chnl_net:caif_netlink_parms(): no params data found [ 168.110180][T10358] IPVS: ftp: loaded support on port[0] = 21 [ 168.145806][T10354] bridge0: port 1(bridge_slave_0) entered blocking state 21:07:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000025c0)=[{&(0x7f0000000140)=""/101, 0x65}, {0x0}, {0x0}, {0x0}], 0x4) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x896e, 0x0, 0x0, 0x800e00519) shutdown(r1, 0x0) fchmod(r2, 0x0) recvfrom$inet(r2, 0x0, 0x10201, 0x2, 0x0, 0x800e0051d) shutdown(r2, 0x0) [ 168.154545][T10354] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.163456][T10354] device bridge_slave_0 entered promiscuous mode [ 168.196762][T10354] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.206561][T10354] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.215944][T10354] device bridge_slave_1 entered promiscuous mode [ 168.223677][T10352] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.231506][T10352] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.239826][T10352] device bridge_slave_0 entered promiscuous mode [ 168.276062][T10354] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 168.288990][T10352] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.296179][T10352] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.305046][T10352] device bridge_slave_1 entered promiscuous mode [ 168.317721][T10354] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 168.356103][T10352] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 168.376584][T10354] team0: Port device team_slave_0 added [ 168.388971][T10352] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 168.431536][T10354] team0: Port device team_slave_1 added [ 168.442173][T10360] IPVS: ftp: loaded support on port[0] = 21 [ 168.471730][T10352] team0: Port device team_slave_0 added 21:07:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000840)=""/4096, 0x1000}, {0x0}], 0x2}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfe72, 0x0, 0x0, 0x800e00516) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1}, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x1de, 0x0, 0x0, 0x800e0050e) shutdown(r3, 0x0) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r5, &(0x7f0000000300)=[{&(0x7f0000000040)=""/49, 0x31}], 0x1) shutdown(r4, 0x0) shutdown(r1, 0x0) [ 168.482122][T10352] team0: Port device team_slave_1 added [ 168.505324][T10358] chnl_net:caif_netlink_parms(): no params data found [ 168.560826][T10354] device hsr_slave_0 entered promiscuous mode [ 168.617526][T10354] device hsr_slave_1 entered promiscuous mode 21:07:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000780)=[{&(0x7f0000000100)=""/250, 0xfa}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x1008d, 0x0, 0x0, 0x800e00527) shutdown(r1, 0x0) r3 = dup(r1) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x1f, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xfffffdc4, 0x2, 0x0, 0x800e00525) shutdown(r2, 0x0) [ 168.680033][T10363] IPVS: ftp: loaded support on port[0] = 21 [ 168.731211][T10352] device hsr_slave_0 entered promiscuous mode [ 168.797635][T10352] device hsr_slave_1 entered promiscuous mode [ 168.837344][T10352] debugfs: Directory 'hsr0' with parent '/' already present! [ 168.862385][T10354] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.869993][T10354] bridge0: port 2(bridge_slave_1) entered forwarding state [ 168.877603][T10354] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.884698][T10354] bridge0: port 1(bridge_slave_0) entered forwarding state [ 168.909268][T10358] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.916659][T10358] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.925336][T10358] device bridge_slave_0 entered promiscuous mode [ 168.951152][T10358] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.951840][T10365] IPVS: ftp: loaded support on port[0] = 21 [ 168.960034][T10358] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.972622][T10358] device bridge_slave_1 entered promiscuous mode [ 169.039597][T10352] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.046704][T10352] bridge0: port 2(bridge_slave_1) entered forwarding state [ 169.054236][T10352] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.061529][T10352] bridge0: port 1(bridge_slave_0) entered forwarding state [ 169.070829][T10367] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.079743][T10367] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.090557][T10367] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.098872][T10367] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.133856][T10358] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 169.144471][T10360] chnl_net:caif_netlink_parms(): no params data found [ 169.168965][T10354] 8021q: adding VLAN 0 to HW filter on device bond0 [ 169.177035][T10358] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 169.230340][T10358] team0: Port device team_slave_0 added [ 169.249579][T10358] team0: Port device team_slave_1 added [ 169.260877][T10354] 8021q: adding VLAN 0 to HW filter on device team0 [ 169.287529][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 169.295308][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 169.323285][T10360] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.330515][T10360] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.339040][T10360] device bridge_slave_0 entered promiscuous mode [ 169.346979][T10360] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.354220][T10360] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.362294][T10360] device bridge_slave_1 entered promiscuous mode [ 169.420168][T10358] device hsr_slave_0 entered promiscuous mode [ 169.457474][T10358] device hsr_slave_1 entered promiscuous mode [ 169.507277][T10358] debugfs: Directory 'hsr0' with parent '/' already present! [ 169.541850][T10360] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 169.553417][ T2807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 169.562602][ T2807] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 169.572138][ T2807] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.579322][ T2807] bridge0: port 1(bridge_slave_0) entered forwarding state [ 169.589201][T10363] chnl_net:caif_netlink_parms(): no params data found [ 169.612155][T10360] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 169.627697][ T2807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 169.640966][ T2807] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 169.649495][ T2807] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.656670][ T2807] bridge0: port 2(bridge_slave_1) entered forwarding state [ 169.664456][ T2807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 169.673641][ T2807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 169.735545][T10365] chnl_net:caif_netlink_parms(): no params data found [ 169.755163][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 169.764433][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 169.773422][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 169.782364][T10360] team0: Port device team_slave_0 added [ 169.789916][T10360] team0: Port device team_slave_1 added [ 169.805168][T10363] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.812372][T10363] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.820110][T10363] device bridge_slave_0 entered promiscuous mode [ 169.831147][T10363] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.838617][T10363] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.846227][T10363] device bridge_slave_1 entered promiscuous mode [ 169.882959][T10363] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 169.895683][T10366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 169.904810][T10366] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 169.913951][T10366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 169.922429][T10366] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 169.969853][T10360] device hsr_slave_0 entered promiscuous mode [ 170.007687][T10360] device hsr_slave_1 entered promiscuous mode [ 170.047787][T10360] debugfs: Directory 'hsr0' with parent '/' already present! [ 170.070578][T10363] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 170.101181][ T2807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 170.110494][ T2807] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 170.120871][T10363] team0: Port device team_slave_0 added [ 170.130520][T10352] 8021q: adding VLAN 0 to HW filter on device bond0 [ 170.137884][T10365] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.144975][T10365] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.153256][T10365] device bridge_slave_0 entered promiscuous mode [ 170.161111][T10365] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.168512][T10365] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.177763][T10365] device bridge_slave_1 entered promiscuous mode [ 170.186211][T10363] team0: Port device team_slave_1 added [ 170.222834][T10365] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 170.233457][T10354] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 170.245867][T10352] 8021q: adding VLAN 0 to HW filter on device team0 [ 170.318964][T10363] device hsr_slave_0 entered promiscuous mode [ 170.357502][T10363] device hsr_slave_1 entered promiscuous mode [ 170.397480][T10363] debugfs: Directory 'hsr0' with parent '/' already present! [ 170.407979][T10365] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 170.421029][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 170.428936][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 170.452327][T10358] 8021q: adding VLAN 0 to HW filter on device bond0 [ 170.469111][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 170.478444][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 170.486834][T10367] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.493981][T10367] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.502188][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 170.511230][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 170.519779][T10367] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.526855][T10367] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.534517][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 170.570954][T10365] team0: Port device team_slave_0 added [ 170.577567][T10366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 170.587954][T10366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 170.596663][T10366] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 170.605721][T10366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 170.614593][T10366] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 170.623294][T10366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 170.631768][T10366] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 170.640032][T10366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 170.648531][T10366] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 170.656835][T10366] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 170.685094][T10354] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 170.694211][T10365] team0: Port device team_slave_1 added [ 170.708384][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 170.720241][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 170.728723][T10352] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 170.750738][T10358] 8021q: adding VLAN 0 to HW filter on device team0 [ 170.830368][T10365] device hsr_slave_0 entered promiscuous mode [ 170.887938][T10365] device hsr_slave_1 entered promiscuous mode [ 170.947365][T10365] debugfs: Directory 'hsr0' with parent '/' already present! [ 170.961951][T10360] 8021q: adding VLAN 0 to HW filter on device bond0 [ 170.972263][T10352] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 171.023236][T10366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 171.032830][T10366] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 171.041925][T10366] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.049114][T10366] bridge0: port 1(bridge_slave_0) entered forwarding state [ 171.056723][T10366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 171.065540][T10366] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 171.074318][T10366] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.081534][T10366] bridge0: port 2(bridge_slave_1) entered forwarding state [ 171.089368][T10366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 171.098229][T10366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 171.106768][T10366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 171.115379][T10366] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 171.123740][T10366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 171.132364][T10366] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 171.142484][T10366] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 171.150419][T10366] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 171.163081][T10360] 8021q: adding VLAN 0 to HW filter on device team0 [ 171.182397][T10363] 8021q: adding VLAN 0 to HW filter on device bond0 [ 171.200527][T10358] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 171.220189][T10358] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 171.234549][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 171.245457][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 171.253557][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 171.262102][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 171.270673][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 171.279496][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 171.288210][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 171.310721][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 171.319345][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 171.327787][T10367] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.334836][T10367] bridge0: port 1(bridge_slave_0) entered forwarding state [ 171.342581][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 171.351155][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 171.359633][T10367] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.366693][T10367] bridge0: port 2(bridge_slave_1) entered forwarding state [ 171.374388][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 171.383145][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 171.392071][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 171.400799][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 171.409437][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 171.418373][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 171.426996][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 21:07:44 executing program 1: r0 = openat$usbmon(0xffffffffffffff9c, &(0x7f0000000000)='/dev/usbmon0\x00', 0x800, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)={0xffffffffffffffff}) r2 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_CHECK_EXTENSION_VM(r2, 0xae03, 0x40) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f00000002c0)) finit_module(r0, &(0x7f0000000040)='/dev/kvm\x00', 0x1) socketpair(0x1f, 0x2, 0x200, &(0x7f00000001c0)={0xffffffffffffffff}) open(&(0x7f00000000c0)='./file0\x00', 0x4000, 0x140) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000200)=[@in={0x2, 0x4e20, @multicast1}, @in={0x2, 0x4e23, @empty}], 0x20) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x800, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$IMCLEAR_L2(0xffffffffffffffff, 0x80044946, &(0x7f0000000140)=0x9b) ioctl$VIDIOC_S_SELECTION(0xffffffffffffffff, 0xc040565f, &(0x7f0000000180)={0x6, 0x103, 0x7, {0x3, 0x4, 0x7, 0xce}}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x40505330, &(0x7f0000000380)={{0x5, 0x200}, {0x40, 0x100}, 0x3, 0x5, 0x800}) getsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000300), 0x4) poll(&(0x7f0000000080)=[{r4, 0x2000}, {r5}], 0x2, 0x6) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000100)={0x101ff, 0x0, 0x1, 0x2000, &(0x7f0000000000/0x2000)=nil}) [ 171.435528][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 171.456318][T10358] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 171.492509][T10363] 8021q: adding VLAN 0 to HW filter on device team0 [ 171.508089][ T3316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 171.528549][ T3316] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 171.531631][T10388] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 171.537016][ T3316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 171.561743][ T3316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 171.573245][ T3316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 171.581484][ T3316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 171.593649][T10360] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 171.654646][T10366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 171.674313][T10366] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 171.696498][T10366] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.707558][T10366] bridge0: port 1(bridge_slave_0) entered forwarding state [ 171.716423][T10366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 171.725627][T10366] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 171.734091][T10366] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.741207][T10366] bridge0: port 2(bridge_slave_1) entered forwarding state [ 171.748935][T10366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 21:07:45 executing program 1: r0 = syz_open_dev$sndpcmp(0xfffffffffffffffe, 0x1f9, 0x2000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000180), &(0x7f0000000040)=0x4) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000100)={0x1, 0xa5, 0x1000, 0x1e, &(0x7f0000000080)="65096fd5fadd0b4979ee9dbc65591d33c19df2f0ef3daf89d444794271ea", 0x39, 0x0, &(0x7f00000000c0)="ae743dada1c1d1882731fa8fcba577b1c60b62e62ce80e4981998668fc0103c3e31a4745e1662cf1570e687c4db66cb695982d9ae0a59b2af2"}) socket$inet6_sctp(0xa, 0x1, 0x84) [ 171.757712][T10366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 171.769470][T10365] 8021q: adding VLAN 0 to HW filter on device bond0 [ 171.776434][T10366] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 171.792253][T10360] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 171.827914][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 171.842421][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 21:07:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11cca505160bcfe47bf070") recvmmsg(0xffffffffffffffff, &(0x7f00000061c0)=[{{0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000200)=""/117, 0x75}], 0x1}}], 0x1, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) close(r0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sysfs$2(0x2, 0x8, &(0x7f00000002c0)=""/208) ioctl(r3, 0x81, &(0x7f0000000480)="8f8e5ecea180d2952724410d4943cb81cece60a964b68253f90041bb3d46424db42b50a1915232e0ddf8c377a0f75526de901d49ee7bd5bea6d1ecf168fe97fa9396de0dd7339f1e83d53a1ce0661d686e956d1c0e0f0ef695f12c899a036cad120e1688773fe5a82ca9ce5c6bd56c50866a1b1be75ad2d95953") readv(r2, &(0x7f00000002c0), 0x18f) getsockopt(r0, 0x4, 0xfffffffffffffffe, &(0x7f00000003c0)=""/124, &(0x7f0000000440)=0x7c) getsockopt$EBT_SO_GET_INIT_ENTRIES(r3, 0x0, 0x83, &(0x7f0000000180)={'filter\x00', 0x0, 0x4, 0x17, [], 0x4, &(0x7f0000000100)=[{}, {}, {}, {}], &(0x7f0000000140)=""/23}, &(0x7f0000000280)=0x78) 21:07:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x46507048ce6aa596, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r1, 0xc040564a, &(0x7f0000000180)={0x6, 0x0, 0x301b, 0xe813, 0x200000000000, 0x9, 0x1000, 0x1}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x36, &(0x7f00000001c0)=ANY=[@ANYBLOB="8faaaabf084f000000c4e58ccbaee62b7800000000000000a4484e95ff5e94190900000000000000001252c2022599039b0000000000"], 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000200)={0x0, @local, @initdev}, &(0x7f0000000240)=0xc) bind$can_raw(r1, &(0x7f0000000280)={0x1d, r2}, 0x10) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) ioctl$DRM_IOCTL_GET_STATS(r3, 0x80f86406, &(0x7f0000000080)=""/141) [ 171.869384][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 171.878794][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 171.898140][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 171.934082][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 171.953505][T10367] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 171.980595][T10365] 8021q: adding VLAN 0 to HW filter on device team0 [ 172.010575][ T2807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 172.021904][T10416] QAT: Invalid ioctl [ 172.029256][ T2807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 172.044896][ T2807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 21:07:45 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score_adj\x00') clock_gettime(0x2000000000, &(0x7f0000000000)) writev(r0, &(0x7f00000000c0), 0x20000000000003fa) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r1, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r2 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f0000000080)={@local}, &(0x7f0000000140)=0x14) connect$pptp(r1, &(0x7f0000000180)={0x18, 0x2, {0x1, @multicast2}}, 0x1e) close(r1) ioctl$VIDIOC_S_OUTPUT(r2, 0xc004562f, &(0x7f00000001c0)=0x8) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000440)) fcntl$getownex(r1, 0x10, &(0x7f0000000280)) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000200)={0xc1, 0x1, 0xfff}) connect$llc(0xffffffffffffffff, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001380), 0x40003ad, 0x2000000) r3 = getpgid(0xffffffffffffffff) r4 = getpgid(r3) creat(&(0x7f0000000240)='./file0\x00', 0x10) socket$inet_smc(0x2b, 0x1, 0x0) rt_tgsigqueueinfo(r3, r4, 0x28, &(0x7f0000000080)={0x3e, 0x2, 0x889}) socket$vsock_dgram(0x28, 0x2, 0x0) [ 172.053584][ T2807] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 172.063251][T10411] QAT: Invalid ioctl [ 172.073531][T10363] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 21:07:45 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000100)={0x400000100002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) splice(r0, &(0x7f0000000080)=0x42, r0, &(0x7f00000000c0), 0x6, 0x4) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 172.107529][T10366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 172.116347][T10366] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 172.125492][T10366] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.133086][T10366] bridge0: port 1(bridge_slave_0) entered forwarding state 21:07:45 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) quotactl(0x0, 0x0, 0x0, 0x0) r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x1c) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={0x0, 0x16, "494b8a17054cfdcebafaa134d580b179d15a488db586"}, &(0x7f0000000100)=0x1e) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000140)={r2, 0x7}, &(0x7f0000000180)=0x8) [ 172.161506][T10366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 172.176652][T10366] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 172.187934][ C1] hrtimer: interrupt took 33534 ns [ 172.191868][T10366] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.200292][T10366] bridge0: port 2(bridge_slave_1) entered forwarding state 21:07:45 executing program 0: r0 = syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x729, 0x0, 0x0, 0x0, 0x6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000080)=0x100, 0x2) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x3}, 0x2c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) setsockopt$sock_timeval(r1, 0x1, 0x0, &(0x7f0000000040), 0x10) sendmsg$tipc(r2, &(0x7f0000000480)={&(0x7f0000000000), 0x10, 0x0}, 0x0) [ 172.255488][T10363] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 172.288093][ T2807] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 172.297980][ T2807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 172.306872][ T2807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 21:07:45 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x401, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2000000, 0x8000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 172.356419][ T2807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 172.391712][ T2807] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 172.401196][ T2807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 172.414417][ T2807] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 172.430851][ T2807] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 172.441012][ T2807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 172.453525][ T2807] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 172.463693][ T2807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 172.475992][ T2807] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 172.487443][T10365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 21:07:45 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000440)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-ssse3\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000240)=ANY=[], 0xfffffe04) sysfs$2(0x2, 0x4, &(0x7f0000000000)=""/74) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) [ 172.559042][T10365] 8021q: adding VLAN 0 to HW filter on device batadv0 21:07:46 executing program 4: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x0, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) r1 = socket$kcm(0x2, 0x5, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB='/dev/nulib0\x00'], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='devpts\x00', 0x2, &(0x7f0000000180)=')bdev\x00') r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000080)={0x4, 0x0, 0x2, 0x3, 0x4, 0x81, 0x100000000, 0xe000000000, 0x3ff, 0x7fffffff, 0xfffffffffffffffe, 0x9}) ioctl$SCSI_IOCTL_DOORLOCK(r2, 0x5380) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r2, &(0x7f0000000300)={&(0x7f0000000200), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r3, 0x800, 0x70bd27, 0x25dfdbfd, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4001}, 0x20000005) setsockopt$sock_attach_bpf(r1, 0x84, 0x7c, &(0x7f0000000040)=r2, 0xfffffffffffffe9c) 21:07:46 executing program 1: msgctl$IPC_STAT(0x0, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000080)={0x9b0000, 0x7, 0x9, [], &(0x7f0000000040)={0x9b0b7b, 0x8, [], @p_u8=&(0x7f0000000000)=0x4}}) r2 = memfd_create(&(0x7f00000003c0)='-bdevlo\x00', 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000001c0)=0x2, 0x4) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r2) dup2(r2, 0xffffffffffffffff) unshare(0x20000) r3 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r3, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000140)={0x0, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast2}, 0x90, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000100), 0x4, 0xffff, 0x401}) 21:07:46 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) r3 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMAUDOUT(r3, 0xc0345642, &(0x7f0000000100)={0x0, "9b758054d013127b736058d537d9aace5d6396362f8a2718a46e0af085a91f4c", 0x1, 0x1}) ioctl$DRM_IOCTL_AGP_RELEASE(r3, 0x6431) ioctl$VIDIOC_G_FBUF(r3, 0x8030560a, &(0x7f0000000140)={0x1, 0x1, &(0x7f00000001c0)="a6cb3320bcabc1b5114b0806bcc1a2c626d02ea0474b396b02b1d8c6caf592c4c2831fe1746c5c69143709bfc4b89b332009fcad5e754ef6cac39e2e738d63c7e6dba32d6c641080ccc184360e8375825c535598c343e0c7", {0x101, 0x1, 0x333f5f5f, 0x4, 0x0, 0x5, 0x8, 0x6}}) ioctl$RTC_UIE_ON(r0, 0x7003) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000240)=0x1d18, 0x4) 21:07:46 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCGICOUNT(r1, 0x545d, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000140)=0x20, 0x3) 21:07:46 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_names\x00') ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000001c0)={0x7, @sdr={0x79737759, 0xfffffffffffffffc}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=ANY=[@ANYBLOB="850000000000000bedff94000000000030b2ac6b00000000"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x3c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x3, 0x36, 0x0, &(0x7f0000000100)="e45dcdfb0024080200000a9386dd6a00000000072feb3003cdc7dba155c1ff00010000000000004635b9e1381e1435c9e49946b0e8d5", 0x0}, 0x28) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000040)) r2 = shmget(0x1, 0x2000, 0x4, &(0x7f0000ffc000/0x2000)=nil) shmctl$IPC_RMID(r2, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000140)=r1) 21:07:46 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) alarm(0x0) ioctl$FICLONE(r0, 0x40049409, r0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x212401, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0xad9, 0x4) 21:07:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x0, 0x0) pidfd_send_signal(r0, 0x0, &(0x7f0000000180)={0x0, 0x7f, 0x1000}, 0x0) 21:07:46 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[], 0xfffffed5) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-ssse3\x00'}, 0x5a) r3 = accept4(r2, 0x0, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x2, 0x200) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x1ffffd, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000000)={0x2, 0x1, 0x3ff, 0x9, 0x1}, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 21:07:46 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1005, 0x0) ioctl$int_in(r0, 0x8000008004500b, &(0x7f0000000080)) semget$private(0x0, 0x3, 0x8) r1 = semget$private(0x0, 0x2, 0x4e) semctl$SEM_STAT(r1, 0x3, 0x12, &(0x7f00000001c0)=""/244) 21:07:46 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) alarm(0x0) ioctl$FICLONE(r0, 0x40049409, r0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x212401, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0xad9, 0x4) 21:07:46 executing program 3: r0 = bpf$PROG_LOAD(0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xfffffffffffffffa) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x5) getsockopt$inet6_int(r0, 0x29, 0x4c, &(0x7f0000000000), &(0x7f0000000040)=0x4) 21:07:46 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003b40)=[{{0x0, 0xfffffffffffffe76, 0x0, 0x0, 0x0, 0xc}}], 0x40000000000004d, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000180)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r0 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @reserved}, 0x10, 0x80000) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x1000, 0x200000) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000140)={0x9, 0xfffffffffffffff7}) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000040)={'veth1_to_hsr\x00', {0x2, 0x4e20, @loopback}}) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 21:07:46 executing program 1: msgctl$IPC_STAT(0x0, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000080)={0x9b0000, 0x7, 0x9, [], &(0x7f0000000040)={0x9b0b7b, 0x8, [], @p_u8=&(0x7f0000000000)=0x4}}) r2 = memfd_create(&(0x7f00000003c0)='-bdevlo\x00', 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000001c0)=0x2, 0x4) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r2) dup2(r2, 0xffffffffffffffff) unshare(0x20000) r3 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r3, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000140)={0x0, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast2}, 0x90, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000100), 0x4, 0xffff, 0x401}) 21:07:46 executing program 5: msgctl$IPC_STAT(0x0, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000080)={0x9b0000, 0x7, 0x9, [], &(0x7f0000000040)={0x9b0b7b, 0x8, [], @p_u8=&(0x7f0000000000)=0x4}}) r2 = memfd_create(&(0x7f00000003c0)='-bdevlo\x00', 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000001c0)=0x2, 0x4) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r2) dup2(r2, 0xffffffffffffffff) unshare(0x20000) r3 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r3, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000140)={0x0, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @multicast2}, 0x90, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000100), 0x4, 0xffff, 0x401}) 21:07:46 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$SIOCX25GCALLUSERDATA(0xffffffffffffffff, 0x89e4, &(0x7f0000000580)={0x0, "e602282f3415188368db3175379a6744fd68cd37a62797492717ae4b407b80138502cde9f6f8e36a62151353d305e7c0b23d6fa2d3b74ff5142e675e3a3a99e8a69446e6dd5a3f11a0153fe8ebb54338516cc365baaa0fbb9790d8fa7a78c6c897780c1000219fed7b654b40d982366d7c0e07d7594585ffbb9261938eebce40"}) sendmsg$xdp(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000001780)={@remote}, 0x14) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000000)={0x800000010000, 0x200000040000000, 0x0, 0x1000, &(0x7f0000001000/0x1000)=nil}) readlinkat(r0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)=""/191, 0xbf) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) syz_read_part_table(0x0, 0x0, 0x0) accept$packet(r0, &(0x7f0000001740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002880)=0x14) stat(&(0x7f00000028c0)='./file0\x00', &(0x7f0000002900)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast2, @in=@loopback, 0x4e21, 0x7f, 0x4e21, 0x0, 0x2, 0xa0, 0x20, 0x8c, r2, r3}, {0x8, 0x7, 0x4, 0x25f8, 0x101, 0x0, 0x8, 0x7}, {0x7f, 0x8, 0x3, 0x3}, 0xfffffffffffffffe, 0x6e6bb1, 0x1, 0x0, 0x3, 0x3}, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4d2, 0x3e}, 0x0, @in=@remote, 0x0, 0x1, 0x2, 0x7, 0x6, 0x7, 0x400}}, 0xe8) 21:07:46 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1005, 0x0) ioctl$int_in(r0, 0x8000008004500b, &(0x7f0000000080)) semget$private(0x0, 0x3, 0x8) r1 = semget$private(0x0, 0x2, 0x4e) semctl$SEM_STAT(r1, 0x3, 0x12, &(0x7f00000001c0)=""/244) 21:07:46 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xffffffff, 0x40) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000000180)={0x0, 0x40, 0xfffffffffffffff8, &(0x7f0000000100)=0x7}) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:46 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003b40)=[{{0x0, 0xfffffffffffffe76, 0x0, 0x0, 0x0, 0xc}}], 0x40000000000004d, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000180)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r0 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @reserved}, 0x10, 0x80000) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x1000, 0x200000) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000140)={0x9, 0xfffffffffffffff7}) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000040)={'veth1_to_hsr\x00', {0x2, 0x4e20, @loopback}}) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 21:07:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x5b17, 0x100) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x400) sendfile(r0, r1, 0x0, 0x10000) syz_emit_ethernet(0x5e, &(0x7f0000000040)={@random="4117afe8291b", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, [{[{0x9100, 0x0, 0x8, 0x4}], {0x8100, 0xfff}}], {@canfd={0xd, {{0x0, 0x0, 0x10344000, 0x200}, 0x0, 0x2, 0x0, 0x0, "27f34328a592419c814cb4fe0bc9679a42e412409a61d413b3b4f8cc1e5f0b6ffb2310e0c4a1429231c85bf89f3b55cfc17b0896e9865173f63899d67b635a0a"}}}}, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x1) setxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x2) [ 173.721617][T10555] mmap: syz-executor.5 (10555) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 173.805588][ T26] kauditd_printk_skb: 1 callbacks suppressed [ 173.805611][ T26] audit: type=1800 audit(1564693666.983:31): pid=10555 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16535 res=0 [ 173.842660][T10559] libceph: resolve 'LÄ.Ú]' (ret=-3): failed [ 173.852211][T10559] libceph: parse_ips bad ip 'LÄ.Ú],0:E0' [ 173.858230][T10559] source parameter not specified [ 173.859800][ T26] audit: type=1804 audit(1564693667.023:32): pid=10560 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir244999253/syzkaller.x7BMxe/4/file0" dev="sda1" ino=16535 res=1 [ 173.878248][T10563] libceph: resolve 'LÄ.Ú]' (ret=-3): failed [ 173.899138][T10563] libceph: parse_ips bad ip 'LÄ.Ú],0:E0' [ 173.904806][T10563] source parameter not specified 21:07:47 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000000)=0x22dd, 0x4) ioctl$sock_x25_SIOCDELRT(r0, 0x890c, 0x0) 21:07:47 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x4000, 0x0) ioctl$RTC_PIE_ON(r2, 0x7005) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x220000020106, 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x80000, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x20000, 0x0) r6 = dup2(r0, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xf, 0xc, &(0x7f0000000400)=ANY=[@ANYBLOB="18100000", @ANYRES32=r3, @ANYBLOB="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", @ANYRES32=r4, @ANYBLOB="000000000000000055ff0100fcffffff850000004f00000018160000", @ANYRES32=r5, @ANYBLOB="00000000000000008daf0600ffffffff181f0000", @ANYRES32=r6, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f00000001c0)='GPL\x00', 0x7f, 0x0, 0x0, 0x40f00, 0x4, [], r7, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000280)={0x5, 0x6, 0x1000, 0xd9fb}, 0x10}, 0x70) perf_event_open(0x0, r1, 0x0, r0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r8 = eventfd(0x0) getsockopt$inet_sctp_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000380), &(0x7f00000003c0)=0x4) ioctl$NBD_CLEAR_SOCK(r8, 0xab04) 21:07:47 executing program 4: r0 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x6, 0x1) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000200)={0x5, &(0x7f00000001c0)=[{}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f0000000180)={r1}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000021c0)="11dca50d5e0bcfe47bf070") r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000000)={0x7f00, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0xf, 0x4000000000, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_address={0x5, 0x5, 0x6c, 0xa0, 0x0, @in6={0xa, 0x4e23, 0xc5c, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8}}, @sadb_spirange={0x2, 0x10, 0x4d6, 0x4d2}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 21:07:47 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) fallocate(r0, 0x40, 0x0, 0x8) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000080)='em1\x00', &(0x7f00000000c0)='./file0\x00', r0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000040)={0xa, 0xa, 0x80000000}, 0xa) 21:07:47 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xffffffff, 0x40) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000000180)={0x0, 0x40, 0xfffffffffffffff8, &(0x7f0000000100)=0x7}) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:47 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) perf_event_open(&(0x7f00000001c0)={0x4, 0x70, 0xbe0000000000, 0x1, 0x2, 0x5, 0x0, 0x8000, 0x100, 0x4, 0x7, 0x98, 0x7, 0x81, 0x7, 0x9, 0x2, 0x1, 0x5, 0x7, 0xf5, 0x0, 0x0, 0x1, 0x9, 0x17cba0e6, 0x0, 0x80, 0x100000001, 0x100, 0x2, 0x3ff, 0x7fffffff, 0x7, 0x4, 0x3, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x2000, 0x4, 0x6, 0x2, 0x4, 0x4, 0x8}, r1, 0x6, r0, 0x9) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x7fffffff}) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) ioctl$TCXONC(r0, 0x540a, 0xf4) r2 = syz_open_pts(r0, 0x0) r3 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x800) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x1, &(0x7f0000000040)=0x2676, 0x4) readv(r2, &(0x7f0000000540)=[{&(0x7f00000003c0)=""/176, 0xb0}], 0x1) [ 174.113331][T10571] libceph: resolve 'LÄ.Ú]' (ret=-3): failed [ 174.149632][T10571] libceph: parse_ips bad ip 'LÄ.Ú],0:E0' [ 174.161439][T10571] source parameter not specified 21:07:47 executing program 0: syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000100)={0x26}) ppoll(&(0x7f00000000c0), 0x20000000000001af, &(0x7f0000000080)={0x0, 0x989680}, 0x0, 0x0) 21:07:47 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x3, 0x290000) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f00000001c0)={0x3f, 0x5, 0x101}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000180), 0xfd29) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000100)={0xfffffffffffffff9}, 0x4) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000140)=0x80000000) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) fadvise64(r0, 0x0, 0x3, 0x7) keyctl$session_to_parent(0x12) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={0x0, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e20, @multicast2}, {0x2, 0x4e20, @multicast2}, 0x201, 0x0, 0x0, 0x0, 0xd2, &(0x7f0000000200)='team0\x00', 0x0, 0x2, 0x1f}) 21:07:47 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xffffffff, 0x40) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000000180)={0x0, 0x40, 0xfffffffffffffff8, &(0x7f0000000100)=0x7}) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:47 executing program 1: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000140)='/dev/capi20\x00', 0x8000, 0x0) ioctl$CAPI_REGISTER(r0, 0xc0104307, &(0x7f00000000c0)={0x5000000}) 21:07:47 executing program 0: add_key$keyring(&(0x7f0000000380)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x240000, 0x0) ioctl$IMSETDEVNAME(r2, 0x80184947, &(0x7f0000000180)={0xb76, 'syz1\x00'}) ioctl(r1, 0x1000008912, &(0x7f0000000400)="11d6a50d5c0bcfe47bf0f0") add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000140)="8e", 0x1, r0) [ 174.434975][T10596] libceph: resolve 'LÄ.Ú]' (ret=-3): failed [ 174.465271][T10596] libceph: parse_ips bad ip 'LÄ.Ú],0:E0' [ 174.485276][T10596] source parameter not specified 21:07:47 executing program 5: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008911, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d2972569b532f5a2c20ec753df14cec0f22e2d81bcd849de928c6a0b209f89f086e3ec7963357d7c59a16de4b676d046656a0799b8e8a1d7776275f") timer_create(0x7, &(0x7f0000000000)={0x0, 0x35, 0x3, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) timer_gettime(r1, &(0x7f0000000100)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:47 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000000)=0xe8) io_setup(0x3f, &(0x7f0000000240)=0x0) io_submit(r1, 0x1, &(0x7f0000000380)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x0) rt_sigsuspend(&(0x7f0000000080)={0x9115}, 0x8) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040)={0x3}, 0x4) clone(0x0, 0x0, &(0x7f00000000c0), &(0x7f00000001c0), &(0x7f0000000280)="5e0aac2b4bd42a27ef00000008000000000000d7e14e82065a08e87fab970d63f54a95734694e40f72efc7405407a22e87bd4f6e99846e7977ffe080f6b079eda7a5b05564e55bed") 21:07:47 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x0, 0x0) dup2(r0, r1) open_by_handle_at(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="da000000010001005dd93949a76125162471b1d9761aa7ad73a60ce9b33ea57fe7695d366c610d81c2f4ef6186e5e5dad0e36d3e77287712afc698010d98026e05e2b149ace369359cf30a4f331c5097b586c9e264519c86b3b10d089fd130655f2734c0558602b6b0777f2bd9ea8c51e66dcdabf78705ea7ad70354e642e72e53d47e28b3801a981e88f4c278d3ae868e768403d5b3262b0aec9fcf5f8678e6dc0868c1bdaf7686ed886df39e7d43fbdfd76fe507e20de1e337a048000000003cf46225f12ce401534bdc09cba800a32f6522406d8a738c0bbbafeef2a8347439de38ba9d4a296d564c0592c88026d5db519133c2894848b284aee9d0ffb5c8ba69a2ef4bb946bd89485a727df01e5edf29fbe624a7afa469c6359e7e5325aa659ba968c302187012dad3d5483cf358fbfb8dcca308113ac89134f0eb3677a312e6c8212f4f81e21cfed77962426d6463d5c226425398c370d7dbead81d0d9482cfcc7c4ae6f7f51bb507c1185b0c418b1f0cec902ce250d356830551ed94f27d89ed187f1e5da5a7995a0fdcf5cba06c9acd03fbb97d3c646da4648f24ca5c5a1725c58ecf7f32ac10c4160c7eee081c11ad710000000000000000000000a87a184dec3a4dfe603482cb652da9b571f22d3d59da1a490dd0b413975c3f4a602fd55b056ae19aecb97c1da28af454ea87feae6500a5bebed0aaea015af7781caff7690224ce9c1aeb9b2f227c5a7d53a9a59af9bd2fa716cc40a34b93fecb11249524015fa80ab26c99286203fc64c140a3f4337b5de675b3d0f7ee5422f6e5096e14eaf7bdaa045016f2c85491a28c4dfe6618208a8fdfafac30dc05b6"], 0x200001) 21:07:47 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000140)=ANY=[@ANYBLOB="02002100b951d03859a3be1b380a68cbfca9b39aa83cd617519208d079643400dd3bc25966"]) io_setup(0x81, &(0x7f0000000240)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x101}]) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:ld_so_t:s0\x00', 0x1d, 0x1) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$KVM_GET_CLOCK(r2, 0x8030ae7c, &(0x7f00000001c0)) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f0000000180)=""/51) 21:07:47 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xffffffff, 0x40) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000000180)={0x0, 0x40, 0xfffffffffffffff8, &(0x7f0000000100)=0x7}) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 174.560101][ T26] audit: type=1804 audit(1564693667.743:33): pid=10560 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir244999253/syzkaller.x7BMxe/4/file0" dev="sda1" ino=16535 res=1 [ 174.665158][T10614] Unknown ioctl -2144293252 [ 174.682918][T10614] Unknown ioctl 19274 [ 174.686945][T10611] libceph: resolve 'LÄ.Ú]' (ret=-3): failed [ 174.686972][T10611] libceph: parse_ips bad ip 'LÄ.Ú],0:E0' 21:07:47 executing program 1: socketpair(0x6, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, &(0x7f0000000000)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) [ 174.726176][T10611] source parameter not specified [ 174.751782][T10614] Unknown ioctl -2144293252 [ 174.779858][T10625] Unknown ioctl 19274 21:07:48 executing program 2: r0 = syz_open_dev$vbi(0x0, 0x1, 0x2) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000d0fff5)='/dev/audio\x00', 0x42801, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback, 0x800000}, 0x1c) ioctl$int_in(r1, 0x800000c0045005, &(0x7f0000000040)) close(r1) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)) r3 = open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000140)='security.capability\x00', &(0x7f0000000180)=@v2, 0x14, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x7f, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x44, 0x1, 0x0, 0x0, 0x2, 0x3, 0x0, 0x2, 0x5, 0x5, 0x0, 0x0, 0x4, 0x0, 0x100000000, 0x0, 0x20000000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40006, 0x2, 0x80000000, 0x8001, 0x7fffffff, 0x6, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x400}, 0x0, 0x0, r0, 0x8) sendmsg(0xffffffffffffffff, 0x0, 0x0) 21:07:48 executing program 5: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008911, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d2972569b532f5a2c20ec753df14cec0f22e2d81bcd849de928c6a0b209f89f086e3ec7963357d7c59a16de4b676d046656a0799b8e8a1d7776275f") timer_create(0x7, &(0x7f0000000000)={0x0, 0x35, 0x3, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) timer_gettime(r1, &(0x7f0000000100)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:48 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xffffffff, 0x40) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x7, 0x200) accept4$inet(r2, 0x0, &(0x7f00000004c0), 0x80000) r3 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x0) ioctl$VIDIOC_G_AUDIO(r3, 0x80345621, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000100)="4f565cca325ef8b66b7711f970b4aa9b88731e98228df1f80cf2dcc4255d727ab1909902a9028d2ab06b946791897e762a89aced", 0x34}, {&(0x7f0000000140)="0faa2e5244d85cf812b2f2db2943d80caa797c5783eb0cd5eabb679296617ad4c1eecf54b06c2eec9b6ffd1ac35e4a6082047cc20c718e6de52a01a8a71796289f675bcbbbf00afc", 0x48}, {&(0x7f0000000340)="a1edd5185da08c6566b0b298cae06bdb5e130bd8c7b50b195854c77f6ab065cf95a4d253cf0537fcf261304030a0af1f79f251e594ee69cec5ff05c0fd6ea584d38dd838043c0352b1", 0x49}], 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x7, {0x80000000, 0x81, 0x8001, 0x9, 0x40, 0x2}, 0x3}, 0xe) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000200)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x37, 0x2, 0x7, "a61ab7d3522beba68f927a5beefa0951", "0afcaa8052ea61e1225a8f538714c64a57fea35163e07a56a137762d91d9027c3293"}, 0x37, 0x2) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x4000, 0x0) ioctl$KVM_PPC_GET_PVINFO(r4, 0x4080aea1, &(0x7f00000003c0)=""/201) 21:07:48 executing program 0: r0 = socket$inet6(0xa, 0x400000000002, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0x10c7}], 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0xa040, 0x0) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f0000000200)) 21:07:48 executing program 5: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008911, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d2972569b532f5a2c20ec753df14cec0f22e2d81bcd849de928c6a0b209f89f086e3ec7963357d7c59a16de4b676d046656a0799b8e8a1d7776275f") timer_create(0x7, &(0x7f0000000000)={0x0, 0x35, 0x3, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) timer_gettime(r1, &(0x7f0000000100)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) [ 175.042260][T10641] libceph: resolve 'LÄ.Ú]' (ret=-3): failed [ 175.064358][T10641] libceph: parse_ips bad ip 'LÄ.Ú],0:E0' [ 175.085197][T10641] source parameter not specified 21:07:48 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 175.260158][T10660] libceph: resolve 'LÄ.Ú]' (ret=-3): failed [ 175.286092][T10660] libceph: parse_ips bad ip 'LÄ.Ú],0:E0' [ 175.308504][T10660] source parameter not specified 21:07:48 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:48 executing program 5: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008911, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d2972569b532f5a2c20ec753df14cec0f22e2d81bcd849de928c6a0b209f89f086e3ec7963357d7c59a16de4b676d046656a0799b8e8a1d7776275f") timer_create(0x7, &(0x7f0000000000)={0x0, 0x35, 0x3, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) timer_gettime(r1, &(0x7f0000000100)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:48 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xffffffff, 0x40) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x5, 0x98c, 0x0, {}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "e013bd21c2131606876f2d7b670377fad5d1a5e1f9ed04482e90fee4baf83ce2bfbcfd43f2b2e29b0d961cbae71f06c38cd60a9d1ce8d874311a8a200eb9f8ba"}}, 0x80}}, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x200, 0x0) accept4(r2, &(0x7f00000002c0)=@hci={0x1f, 0x0}, &(0x7f0000000340)=0x80, 0x800) sendmsg$can_bcm(r1, &(0x7f0000000540)={&(0x7f0000000380)={0x1d, r3}, 0x10, &(0x7f0000000500)={&(0x7f0000000480)={0x1, 0x20, 0x7fffffff, {0x77359400}, {0x77359400}, {0x3, 0x2, 0x9, 0x2}, 0x1, @can={{0x3, 0x53b70d0b, 0x3f, 0x4}, 0x7, 0x0, 0x0, 0x0, "f531731d3e16c8f9"}}, 0x48}, 0x1, 0x0, 0x0, 0x8004}, 0x0) utimensat(r2, &(0x7f0000000240)='.\x00', &(0x7f0000000280)={{0x77359400}}, 0x100) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) 21:07:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open$dir(0x0, 0x0, 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000800)="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", 0x200) pipe2(&(0x7f0000000080), 0x84000) r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1!$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e\xff\xff\xff\xff\xff\xff\xff\xfe,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') rt_sigtimedwait(0x0, 0x0, &(0x7f000044a000)={0x0, 0x989680}, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="31433e99"], 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='loginuid\x00') sendfile(r0, r1, 0x0, 0x1) 21:07:48 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:48 executing program 5: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008911, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d2972569b532f5a2c20ec753df14cec0f22e2d81bcd849de928c6a0b209f89f086e3ec7963357d7c59a16de4b676d046656a0799b8e8a1d7776275f") timer_create(0x7, &(0x7f0000000000)={0x0, 0x35, 0x3, @tid=0xffffffffffffffff}, &(0x7f0000000040)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) [ 175.571589][T10675] libceph: resolve 'LÄ.Ú]' (ret=-3): failed [ 175.599846][T10675] libceph: parse_ips bad ip 'LÄ.Ú],0:E0' [ 175.614642][T10682] libceph: resolve 'LÄ.Ú]' (ret=-3): failed [ 175.627560][T10675] source parameter not specified [ 175.657930][T10682] libceph: parse_ips bad ip 'LÄ.Ú],0:E0' [ 175.663782][T10683] libceph: resolve 'LÄ.Ú]' (ret=-3): failed 21:07:48 executing program 1: set_mempolicy(0x1, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x73, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, 0x0, &(0x7f0000000080)) preadv(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, 0x8) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'ip6tnl0\x00', r2}) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000380)={r0, @in6={{0xa, 0x0, 0x80, @mcast1}}, 0x6, 0xfffd, 0x200, 0xd03, 0x40}, 0x98) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r3, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r3, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r3, 0x0, 0x4, &(0x7f00000000c0), 0x0) setsockopt$inet_mtu(r3, 0x0, 0xa, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 21:07:48 executing program 3: mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:48 executing program 5: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008911, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d2972569b532f5a2c20ec753df14cec0f22e2d81bcd849de928c6a0b209f89f086e3ec7963357d7c59a16de4b676d046656a0799b8e8a1d7776275f") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) [ 175.703896][T10682] source parameter not specified [ 175.713996][T10683] libceph: parse_ips bad ip 'LÄ.Ú],0:E0' 21:07:49 executing program 2: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008911, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d2972569b532f5a2c20ec753df14cec0f22e2d81bcd849de928c6a0b209f89f086e3ec7963357d7c59a16de4b676d046656a0799b8e8a1d7776275f") timer_create(0x7, &(0x7f0000000000)={0x0, 0x35, 0x3, @tid=0xffffffffffffffff}, &(0x7f0000000040)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) [ 175.781094][T10683] source parameter not specified 21:07:49 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xffffffff, 0x40) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:49 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:49 executing program 5: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:49 executing program 3: mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 175.996589][T10704] libceph: resolve 'LÄ.Ú]' (ret=-3): failed 21:07:49 executing program 2: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008911, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d2972569b532f5a2c20ec753df14cec0f22e2d81bcd849de928c6a0b209f89f086e3ec7963357d7c59a16de4b676d046656a0799b8e8a1d7776275f") timer_create(0x7, &(0x7f0000000000)={0x0, 0x35, 0x3, @tid=0xffffffffffffffff}, &(0x7f0000000040)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:49 executing program 3: mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:49 executing program 5: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) [ 176.047533][T10704] libceph: parse_ips bad ip 'LÄ.Ú],0:E0' [ 176.058312][T10709] libceph: resolve 'LÄ.Ú]' (ret=-3): failed [ 176.064779][T10709] libceph: parse_ips bad ip 'LÄ.Ú],0:E0' [ 176.072034][T10704] source parameter not specified [ 176.080638][T10709] source parameter not specified 21:07:49 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xffffffff, 0x40) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:49 executing program 1: set_mempolicy(0x1, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x73, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, 0x0, &(0x7f0000000080)) preadv(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, 0x8) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'ip6tnl0\x00', r2}) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000380)={r0, @in6={{0xa, 0x0, 0x80, @mcast1}}, 0x6, 0xfffd, 0x200, 0xd03, 0x40}, 0x98) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r3, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r3, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r3, 0x0, 0x4, &(0x7f00000000c0), 0x0) setsockopt$inet_mtu(r3, 0x0, 0xa, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 21:07:49 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:49 executing program 2: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008911, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d2972569b532f5a2c20ec753df14cec0f22e2d81bcd849de928c6a0b209f89f086e3ec7963357d7c59a16de4b676d046656a0799b8e8a1d7776275f") timer_create(0x7, &(0x7f0000000000)={0x0, 0x35, 0x3, @tid=0xffffffffffffffff}, &(0x7f0000000040)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:49 executing program 3: mknod$loop(0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:49 executing program 5: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) [ 176.299901][T10725] libceph: resolve 'LÄ.Ú]' (ret=-3): failed [ 176.306021][T10725] libceph: parse_ips bad ip 'LÄ.Ú],0:E0' [ 176.380483][T10725] source parameter not specified [ 176.405854][T10733] libceph: resolve 'LÄ.Ú]' (ret=-3): failed [ 176.433942][T10733] libceph: parse_ips bad ip 'LÄ.Ú],0:E0' 21:07:49 executing program 2: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008911, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d2972569b532f5a2c20ec753df14cec0f22e2d81bcd849de928c6a0b209f89f086e3ec7963357d7c59a16de4b676d046656a0799b8e8a1d7776275f") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:49 executing program 5: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x1000008911, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d2972569b532f5a2c20ec753df14cec0f22e2d81bcd849de928c6a0b209f89f086e3ec7963357d7c59a16de4b676d046656a0799b8e8a1d7776275f") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) [ 176.453495][T10733] source parameter not specified 21:07:49 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:49 executing program 3: mknod$loop(0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:49 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:49 executing program 5: ioctl(0xffffffffffffffff, 0x1000008911, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d2972569b532f5a2c20ec753df14cec0f22e2d81bcd849de928c6a0b209f89f086e3ec7963357d7c59a16de4b676d046656a0799b8e8a1d7776275f") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:49 executing program 2: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) [ 176.681949][T10751] libceph: resolve 'LÄ.Ú]' (ret=-3): failed [ 176.731381][T10755] libceph: resolve 'LÄ.Ú]' (ret=-3): failed [ 176.731985][T10751] libceph: parse_ips bad ip 'LÄ.Ú],0:E0' 21:07:50 executing program 1: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008911, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d2972569b532f5a2c20ec753df14cec0f22e2d81bcd849de928c6a0b209f89f086e3ec7963357d7c59a16de4b676d046656a0799b8e8a1d7776275f") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:50 executing program 3: mknod$loop(0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:50 executing program 2: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) [ 176.775266][T10755] libceph: parse_ips bad ip 'LÄ.Ú],0:E0' [ 176.801572][T10751] source parameter not specified [ 176.804955][T10755] source parameter not specified 21:07:50 executing program 5: ioctl(0xffffffffffffffff, 0x1000008911, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d2972569b532f5a2c20ec753df14cec0f22e2d81bcd849de928c6a0b209f89f086e3ec7963357d7c59a16de4b676d046656a0799b8e8a1d7776275f") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:50 executing program 4: mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:50 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:50 executing program 2: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:50 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:50 executing program 1: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008911, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d2972569b532f5a2c20ec753df14cec0f22e2d81bcd849de928c6a0b209f89f086e3ec7963357d7c59a16de4b676d046656a0799b8e8a1d7776275f") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) [ 176.974874][T10773] source parameter not specified 21:07:50 executing program 4: mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:50 executing program 2: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x1000008911, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d2972569b532f5a2c20ec753df14cec0f22e2d81bcd849de928c6a0b209f89f086e3ec7963357d7c59a16de4b676d046656a0799b8e8a1d7776275f") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:50 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:50 executing program 5: ioctl(0xffffffffffffffff, 0x1000008911, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d2972569b532f5a2c20ec753df14cec0f22e2d81bcd849de928c6a0b209f89f086e3ec7963357d7c59a16de4b676d046656a0799b8e8a1d7776275f") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) [ 177.107326][T10788] libceph: resolve 'LÄ.Ú]' (ret=-3): failed 21:07:50 executing program 1: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008911, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d2972569b532f5a2c20ec753df14cec0f22e2d81bcd849de928c6a0b209f89f086e3ec7963357d7c59a16de4b676d046656a0799b8e8a1d7776275f") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) [ 177.167319][T10788] libceph: parse_ips bad ip 'LÄ.Ú],0:E0' [ 177.197630][T10788] source parameter not specified 21:07:50 executing program 4: mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 177.252732][T10800] source parameter not specified 21:07:50 executing program 0: mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:50 executing program 5: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x0) ioctl(0xffffffffffffffff, 0x1000008911, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d2972569b532f5a2c20ec753df14cec0f22e2d81bcd849de928c6a0b209f89f086e3ec7963357d7c59a16de4b676d046656a0799b8e8a1d7776275f") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:50 executing program 2: ioctl(0xffffffffffffffff, 0x1000008911, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d2972569b532f5a2c20ec753df14cec0f22e2d81bcd849de928c6a0b209f89f086e3ec7963357d7c59a16de4b676d046656a0799b8e8a1d7776275f") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:50 executing program 1: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:50 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:50 executing program 0: mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:50 executing program 2: ioctl(0xffffffffffffffff, 0x1000008911, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d2972569b532f5a2c20ec753df14cec0f22e2d81bcd849de928c6a0b209f89f086e3ec7963357d7c59a16de4b676d046656a0799b8e8a1d7776275f") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:50 executing program 4: mknod$loop(0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:50 executing program 5: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x0) ioctl(0xffffffffffffffff, 0x1000008911, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d2972569b532f5a2c20ec753df14cec0f22e2d81bcd849de928c6a0b209f89f086e3ec7963357d7c59a16de4b676d046656a0799b8e8a1d7776275f") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:50 executing program 1: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) [ 177.577623][T10827] source parameter not specified 21:07:50 executing program 0: mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:50 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:50 executing program 2: ioctl(0xffffffffffffffff, 0x1000008911, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d2972569b532f5a2c20ec753df14cec0f22e2d81bcd849de928c6a0b209f89f086e3ec7963357d7c59a16de4b676d046656a0799b8e8a1d7776275f") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:50 executing program 5: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x0) ioctl(0xffffffffffffffff, 0x1000008911, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d2972569b532f5a2c20ec753df14cec0f22e2d81bcd849de928c6a0b209f89f086e3ec7963357d7c59a16de4b676d046656a0799b8e8a1d7776275f") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:50 executing program 4: mknod$loop(0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:50 executing program 1: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:51 executing program 0: mknod$loop(0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 177.817135][T10843] ceph: Bad value for 'source' 21:07:51 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:51 executing program 2: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x0) ioctl(0xffffffffffffffff, 0x1000008911, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d2972569b532f5a2c20ec753df14cec0f22e2d81bcd849de928c6a0b209f89f086e3ec7963357d7c59a16de4b676d046656a0799b8e8a1d7776275f") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:51 executing program 5: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d2972569b532f5a2c20ec753df14cec0f22e2d81bcd849de928c6a0b209f89f086e3ec7963357d7c59a16de4b676d046656a0799b8e8a1d7776275f") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:51 executing program 4: mknod$loop(0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:51 executing program 1: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x1000008911, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d2972569b532f5a2c20ec753df14cec0f22e2d81bcd849de928c6a0b209f89f086e3ec7963357d7c59a16de4b676d046656a0799b8e8a1d7776275f") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:51 executing program 0: mknod$loop(0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:51 executing program 2: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x0) ioctl(0xffffffffffffffff, 0x1000008911, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d2972569b532f5a2c20ec753df14cec0f22e2d81bcd849de928c6a0b209f89f086e3ec7963357d7c59a16de4b676d046656a0799b8e8a1d7776275f") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) [ 178.083693][T10872] ceph: Bad value for 'source' 21:07:51 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:51 executing program 5: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:51 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:51 executing program 1: ioctl(0xffffffffffffffff, 0x1000008911, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d2972569b532f5a2c20ec753df14cec0f22e2d81bcd849de928c6a0b209f89f086e3ec7963357d7c59a16de4b676d046656a0799b8e8a1d7776275f") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:51 executing program 0: mknod$loop(0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:51 executing program 2: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x0) ioctl(0xffffffffffffffff, 0x1000008911, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d2972569b532f5a2c20ec753df14cec0f22e2d81bcd849de928c6a0b209f89f086e3ec7963357d7c59a16de4b676d046656a0799b8e8a1d7776275f") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:51 executing program 5: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) [ 178.314717][T10893] source parameter not specified [ 178.324260][T10888] ceph: Bad value for 'source' 21:07:51 executing program 1: ioctl(0xffffffffffffffff, 0x1000008911, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d2972569b532f5a2c20ec753df14cec0f22e2d81bcd849de928c6a0b209f89f086e3ec7963357d7c59a16de4b676d046656a0799b8e8a1d7776275f") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:51 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:51 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:51 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:51 executing program 2: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d2972569b532f5a2c20ec753df14cec0f22e2d81bcd849de928c6a0b209f89f086e3ec7963357d7c59a16de4b676d046656a0799b8e8a1d7776275f") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:51 executing program 5: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) [ 178.540053][T10906] ceph: Bad value for 'source' 21:07:51 executing program 5: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) [ 178.574117][T10915] source parameter not specified 21:07:51 executing program 2: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:51 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 178.612686][T10919] source parameter not specified 21:07:51 executing program 1: ioctl(0xffffffffffffffff, 0x1000008911, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d2972569b532f5a2c20ec753df14cec0f22e2d81bcd849de928c6a0b209f89f086e3ec7963357d7c59a16de4b676d046656a0799b8e8a1d7776275f") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:51 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:51 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:51 executing program 5: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) [ 178.751916][T10931] ceph: Bad value for 'source' [ 178.798871][T10936] source parameter not specified 21:07:52 executing program 2: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:52 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:52 executing program 1: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x0) ioctl(0xffffffffffffffff, 0x1000008911, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d2972569b532f5a2c20ec753df14cec0f22e2d81bcd849de928c6a0b209f89f086e3ec7963357d7c59a16de4b676d046656a0799b8e8a1d7776275f") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) [ 178.857893][T10939] source parameter not specified [ 178.936442][T10949] ceph: Bad value for 'source' 21:07:52 executing program 5: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:52 executing program 2: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:52 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:52 executing program 1: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x0) ioctl(0xffffffffffffffff, 0x1000008911, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d2972569b532f5a2c20ec753df14cec0f22e2d81bcd849de928c6a0b209f89f086e3ec7963357d7c59a16de4b676d046656a0799b8e8a1d7776275f") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:52 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:52 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:52 executing program 2: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) [ 179.150765][T10964] device name is missing path (no : separator in LÄ.Ú],) [ 179.150765][T10964] [ 179.162264][T10965] ceph: Bad value for 'source' 21:07:52 executing program 1: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x0) ioctl(0xffffffffffffffff, 0x1000008911, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d2972569b532f5a2c20ec753df14cec0f22e2d81bcd849de928c6a0b209f89f086e3ec7963357d7c59a16de4b676d046656a0799b8e8a1d7776275f") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:52 executing program 5: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d297256") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) [ 179.195865][T10968] source parameter not specified 21:07:52 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:52 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:52 executing program 2: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:52 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:52 executing program 1: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d2972569b532f5a2c20ec753df14cec0f22e2d81bcd849de928c6a0b209f89f086e3ec7963357d7c59a16de4b676d046656a0799b8e8a1d7776275f") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) [ 179.365469][T10985] device name is missing path (no : separator in LÄ.Ú],) [ 179.365469][T10985] [ 179.400873][T10987] ceph: Bad value for 'source' 21:07:52 executing program 5: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) [ 179.417859][T10988] ceph: Bad value for 'source' 21:07:52 executing program 2: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:52 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:52 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:52 executing program 1: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:52 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:52 executing program 5: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:52 executing program 2: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d297256") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) [ 179.647801][T11002] device name is missing path (no : separator in LÄ.Ú],) [ 179.647801][T11002] [ 179.673565][T11008] ceph: Bad value for 'source' 21:07:52 executing program 1: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:52 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 179.731268][T11015] ceph: Bad value for 'source' 21:07:52 executing program 2: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:52 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:53 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:53 executing program 5: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:53 executing program 1: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) [ 179.890991][T11024] ceph: Bad value for 'source' 21:07:53 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:53 executing program 2: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:53 executing program 1: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) [ 179.956139][T11031] device name is missing path (no : separator in LÄ.Ú],0:E) [ 179.956139][T11031] [ 179.992911][T11036] ceph: Bad value for 'source' 21:07:53 executing program 5: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:53 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:53 executing program 2: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) [ 180.074099][T11043] ceph: Bad value for 'source' 21:07:53 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:53 executing program 1: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:53 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:53 executing program 5: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) [ 180.190439][T11051] device name is missing path (no : separator in LÄ.Ú],0:E) [ 180.190439][T11051] [ 180.274499][T11059] ceph: Bad value for 'source' 21:07:53 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:53 executing program 1: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:53 executing program 2: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) [ 180.317051][T11065] ceph: Bad value for 'source' 21:07:53 executing program 5: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 21:07:53 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:53 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 180.419125][T11070] device name is missing path (no : separator in LÄ.Ú],0:E) [ 180.419125][T11070] 21:07:53 executing program 1: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11d4a520ec0abf0c03f7b191c3848feab9e9fb0843c31a0b7c793cd194e02864a4ff5ee7595aa312893da4c9c99aec346f99fa0d368d297256") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:53 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a4530"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:53 executing program 2: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:53 executing program 5: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) [ 180.551019][T11084] ceph: Bad value for 'source' [ 180.557786][T11083] device name is missing path (no : separator in LÄ.Ú],) [ 180.557786][T11083] 21:07:53 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:53 executing program 1: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:07:53 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 180.660610][T11094] device name is missing path (no : separator in LÄ.Ú],0:E0) [ 180.660610][T11094] 21:07:53 executing program 2: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 21:07:53 executing program 5: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 21:07:53 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a4530"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:54 executing program 1: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) [ 180.780923][T11103] ceph: Bad value for 'source' [ 180.799129][T11104] device name is missing path (no : separator in LÄ.Ú],) [ 180.799129][T11104] 21:07:54 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:54 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:54 executing program 2: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) [ 180.907924][T11114] device name is missing path (no : separator in LÄ.Ú],0:E0) [ 180.907924][T11114] 21:07:54 executing program 5: poll(&(0x7f0000000140), 0x6c, 0x8000000000049) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x30e, 0x0, 0x0, 0x800e006af) poll(&(0x7f0000000000)=[{r0, 0x2001}], 0x1, 0x0) shutdown(r0, 0x0) 21:07:54 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a4530"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:54 executing program 1: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) [ 181.032310][T11123] device name is missing path (no : separator in LÄ.Ú],) [ 181.032310][T11123] [ 181.045395][T11124] device name is missing path (no : separator in LÄ.Ú],) [ 181.045395][T11124] 21:07:54 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:54 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:54 executing program 2: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 21:07:54 executing program 1: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) [ 181.201073][T11138] device name is missing path (no : separator in LÄ.Ú],) [ 181.201073][T11138] [ 181.248752][T11146] device name is missing path (no : separator in LÄ.Ú],0:E) [ 181.248752][T11146] [ 181.262768][T11145] device name is missing path (no : separator in LÄ.Ú],0:E0) [ 181.262768][T11145] 21:07:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000580)=[{&(0x7f0000001980)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) r1 = dup(r0) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0x2ec, 0x0, 0x0, 0x800e00549) shutdown(r2, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r4, &(0x7f0000000640)=[{&(0x7f0000000180)=""/184, 0xb8}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0, 0xffffff0f}, {0x0}], 0x225) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r4, 0x0) r6 = socket$inet6_sctp(0x1c, 0x3, 0x84) readv(r6, &(0x7f00000019c0)=[{&(0x7f00000008c0)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) shutdown(r5, 0x0) shutdown(r3, 0x0) 21:07:54 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:54 executing program 5: shutdown(0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000c00)=[{&(0x7f0000000140)=""/38, 0x26}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x2d79, 0x0, 0x0, 0x800e00519) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}], 0x4}, 0x0) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0x1de, 0x0, 0x0, 0x800e0050e) shutdown(r4, 0x0) r6 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r6, &(0x7f0000000300)=[{&(0x7f0000000040)=""/49, 0x31}], 0x1) shutdown(r5, 0x0) shutdown(r2, 0x0) 21:07:54 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:54 executing program 1: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 21:07:54 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], 0x0, &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 181.453602][T11158] device name is missing path (no : separator in LÄ.Ú],0:E) [ 181.453602][T11158] [ 181.480123][T11164] device name is missing path (no : separator in LÄ.Ú],) [ 181.480123][T11164] 21:07:54 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:54 executing program 1: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 21:07:54 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], 0x0, &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:54 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 181.632405][T11181] device name is missing path (no : separator in LÄ.Ú],0:E) [ 181.632405][T11181] 21:07:54 executing program 1: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 21:07:54 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], 0x0, &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 181.675685][T11187] device name is missing path (no : separator in LÄ.Ú],0:E) [ 181.675685][T11187] 21:07:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000025c0)=[{&(0x7f0000000140)=""/101, 0x65}, {0x0}, {0x0}], 0x3) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x896e, 0x0, 0x0, 0x800e00519) shutdown(r1, 0x0) setsockopt$sock_timeval(r2, 0xffff, 0x1006, &(0x7f0000000040)={0x81b}, 0x10) accept4(r0, 0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0x10201, 0x2, 0x0, 0x800e0051d) shutdown(r2, 0x0) 21:07:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000034c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x5e36, 0x0, 0x0, 0x800e00545) shutdown(r0, 0x0) shutdown(r1, 0x1) recvfrom$inet(r1, 0x0, 0xf263aaa569d5e4a, 0x0, 0x0, 0x800e0053d) shutdown(r1, 0x0) 21:07:55 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:55 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a4530"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:55 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 21:07:55 executing program 1: poll(&(0x7f0000000140), 0x6c, 0x8000000000049) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x30e, 0x0, 0x0, 0x800e006af) shutdown(r0, 0x0) [ 181.875871][T11204] device name is missing path (no : separator in LÄ.Ú],0:E) [ 181.875871][T11204] [ 181.899669][T11207] device name is missing path (no : separator in LÄ.Ú],0:E0) [ 181.899669][T11207] 21:07:55 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:55 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a4530"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:55 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 21:07:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000001840)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000001c0)=""/118, 0x76}, {0x0}, {0x0, 0x75}, {0x0, 0x30a}, {0x0, 0xffffffffffffff02}, {0x0}], 0xd, 0x0, 0xffffffffffffffc9}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xa1720495f3f7f40, 0x0, 0x0, 0x800e00516) shutdown(r1, 0x0) setsockopt$inet_mreq(r0, 0x0, 0xd, &(0x7f0000000000)={@rand_addr, @broadcast}, 0x8) recvfrom$inet(r2, 0x0, 0xfefc, 0x0, 0x0, 0x800e00510) shutdown(r2, 0x0) [ 182.062690][T11224] device name is missing path (no : separator in LÄ.Ú],0:E) [ 182.062690][T11224] [ 182.065621][T11227] device name is missing path (no : separator in LÄ.Ú],0:E0) [ 182.065621][T11227] 21:07:55 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a4530"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:55 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) 21:07:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000380)='selinuxfs\x00', 0x0, 0x0) 21:07:55 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a4530"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:55 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 21:07:55 executing program 5: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040), 0x1000000000000324, 0x0, 0xfffffffffffffdfc}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000100)=0xc) setreuid(0x0, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x00\x00\x00\x00\x00)\x00', @ifru_flags}) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 182.301314][T11249] device name is missing path (no : separator in LÄ.Ú],0:E0) [ 182.301314][T11249] [ 182.364789][T11256] device name is missing path (no : separator in LÄ.Ú],0:E0) [ 182.364789][T11256] 21:07:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000480)={{0x0, 0x400, 0xfffffffffffffff7, 0xfffffdfd}, 'syz1\x00'}) 21:07:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mkdir(&(0x7f0000000800)='./file0\x00', 0x40) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffde7, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r1, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x102, &(0x7f0000001880), 0xffffffffffffffe5) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x8dffffff, 0x0, 0x0) 21:07:55 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000001b40)=[{0x0, 0x0, 0x0}], 0x1, 0xc000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000240)="fd", 0x1}], 0x1, &(0x7f0000000980)=[{0x10}], 0x10}, 0x0) 21:07:55 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], 0x0, &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:55 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a4530"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:55 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x8000077ff, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000000)={0x0, 0x3, 0x4}) [ 182.573028][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:07:55 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], 0x0, &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:55 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000004100)={'batadv0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x25}}) [ 182.656122][T11282] device name is missing path (no : separator in LÄ.Ú],0:E0) [ 182.656122][T11282] 21:07:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x15, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0963104000"/21], 0x0, 0x100000000000000, 0x0}) 21:07:55 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x60}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:07:55 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a4530"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:56 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], 0x0, &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:56 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) madvise(&(0x7f000090b000/0x3000)=nil, 0x3000, 0x4) [ 182.882738][T11302] binder: 11301:11302 unknown command 0 [ 182.923975][T11309] device name is missing path (no : separator in LÄ.Ú],0:E0) [ 182.923975][T11309] [ 182.925684][T11302] binder: 11301:11302 ioctl c0306201 20000440 returned -22 21:07:56 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], 0x0, &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:56 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 21:07:56 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="05000000000000001c00000020000000000000000000"], 0x16) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f000002eff0)={0x85c, &(0x7f0000000000)=[{}]}, 0x10) 21:07:56 executing program 5: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000000300)={0x0, [], 0x8}) 21:07:56 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000004100)={'batadv0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x18}}) 21:07:56 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000004100)={'batadv0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x16}}) 21:07:56 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], 0x0, &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:56 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 21:07:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="01634040000000000000000000000000000000000000000000000000000000000000000018000000000000000800000000000000", @ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB="852a62730000000000000000000000000000000000000000852a62730000000000000000000000000000000000000000852a62730000000000000000000000000bb9da57c4e0c5ba"], @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00'/24]], 0xfffffffffffffe43, 0x100000000000000, &(0x7f00000003c0)}) 21:07:56 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='bdev\x00', 0x0, 0x0) 21:07:56 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xb000) socketpair$nbd(0x1, 0x1, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xcbaa60f5) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 21:07:56 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) dup3(r0, r1, 0x80000) [ 183.690887][T11346] binder: 11345:11346 ioctl c0306201 20000440 returned -14 21:07:56 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], 0x0, &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:07:56 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 21:07:57 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) write$FUSE_ATTR(r0, 0x0, 0x2) 21:07:57 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000260600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 21:07:57 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 21:07:57 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000004100)={'batadv0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x29}}) 21:07:57 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x8000077ff, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000480)={0x3, @raw_data="4759dc3afc44b2c4049553ac8f2442fdaf4af915dc76ca5e075fb38f1b88f679f36e3383cff7636ab4159d2655020736fa6eaa9da7dc4b5e3beb71040ad4f812382fded3b34c2daac1314db2c213f91c0fe62e5ac86863fbf06ba26ff61abf76f0bb3582fa6b349cbb4ca452bc5a052e66669ccd37f3fdaf9f4b6daf16931e1f806df188a6280658b830f3c1ad9f95035dd14cfb99945e3a22739ba619f4cc734e0ab0b5d7e64aad85bab3a14f235539f1814518c81c32ad5263c996bc7223e96d71c895b7f94358"}) 21:07:57 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000004100)={'batadv0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x2d}}) 21:07:57 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getdents64(r0, 0x0, 0x0) 21:07:57 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xb000) socketpair$nbd(0x1, 0x1, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xcbaa60f5) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 21:07:57 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 21:07:57 executing program 3: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000000300)={0x0, [], 0x4}) 21:07:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0x837, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffde7, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r1, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) 21:07:57 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000004100)={'batadv0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x14}}) 21:07:57 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000004100)={'batadv0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x2b}}) 21:07:57 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 21:07:57 executing program 4: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000180)={0x0, 0x9, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "829b3b0b"}, 0x0, 0x0, @fd, 0x4, 0x0, 0x2}) 21:07:57 executing program 3: r0 = gettid() sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="2cc60f34"], 0x4}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)}], 0x3}}], 0x1, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="db78f09eb815051c21ea66fcedd484317f11d634bdefe4e924b263f88fe5808c430cefdad3d1864e8a40d2f506c4f7248d535d60bdc16096b13073532ac5af93e17d0672bae0c70c252ec40fa4a06fb22323fb3cc4744193497b5623b7cd", @ANYRES64, @ANYPTR64, @ANYBLOB="4e13473b89fbc45cf6e43c476c0937d1f72e54cff2ab3e002db95212b9e7236a506d02d973b73c956991d30db9adc280ecc37d8563a314037854942c981f125c9b9cb8333854deac7366a73846ee3cd44315a2c92f4d9ec3f47367c8c650aceccc3e35cc45b1a9cc7e2778d9fed05451a5549dfc5d73bf", @ANYRES64], 0x0, 0xed}, 0x20) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:07:57 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setreuid(0x0, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000440)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) pipe(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:07:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000040)=""/148, 0x458}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/dev_mcast\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 21:07:57 executing program 4: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000180)={0x0, 0x9, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "829b3b0b"}, 0x0, 0x0, @fd, 0x4, 0x0, 0x2}) 21:07:57 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xb000) socketpair$nbd(0x1, 0x1, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xcbaa60f5) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 21:07:57 executing program 0: r0 = mq_open(&(0x7f0000000100)='trusted.syz\x00', 0xc0, 0x0, &(0x7f0000000240)={0x8, 0x1000000000000000, 0x1, 0x80000000, 0x8, 0x5, 0x6, 0x101}) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000840)={0x0, 0x0, 0x5, 0x0, [], [{0xe6c, 0x8, 0x5, 0x7, 0x200, 0x4a5feabb}, {0x5, 0xe, 0xfffffffffffffff2, 0xffffffffffffffc0, 0x1, 0x9}], [[], [], [], [], []]}) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) syz_open_dev$dri(0x0, 0x0, 0x1fffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)=0xffffffffffffffff) ioctl$NBD_SET_TIMEOUT(r1, 0xab09, 0x101) lgetxattr(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)=@known='trusted.syz\x00', &(0x7f0000000700)=""/48, 0x30) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000000540)=0xe8) ustat(0x3f, &(0x7f0000000040)) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000200)={0x0, &(0x7f0000000740)=""/197}) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x101000) ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000080)) r3 = creat(&(0x7f0000000040)='./file1\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000180)={0x0, 0x1, 0x3, 0x8000000000006}) fallocate(r3, 0x0, 0x2000000, 0x3) 21:07:58 executing program 4: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000180)={0x0, 0x9, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "829b3b0b"}, 0x0, 0x0, @fd, 0x4, 0x0, 0x2}) 21:07:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0x837, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffde7, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r1, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) 21:07:58 executing program 0: r0 = mq_open(&(0x7f0000000100)='trusted.syz\x00', 0xc0, 0x0, &(0x7f0000000240)={0x8, 0x1000000000000000, 0x1, 0x80000000, 0x8, 0x5, 0x6, 0x101}) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000840)={0x0, 0x0, 0x5, 0x0, [], [{0xe6c, 0x8, 0x5, 0x7, 0x200, 0x4a5feabb}, {0x5, 0xe, 0xfffffffffffffff2, 0xffffffffffffffc0, 0x1, 0x9}], [[], [], [], [], []]}) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) syz_open_dev$dri(0x0, 0x0, 0x1fffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)=0xffffffffffffffff) ioctl$NBD_SET_TIMEOUT(r1, 0xab09, 0x101) lgetxattr(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)=@known='trusted.syz\x00', &(0x7f0000000700)=""/48, 0x30) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000000540)=0xe8) ustat(0x3f, &(0x7f0000000040)) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000200)={0x0, &(0x7f0000000740)=""/197}) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x101000) ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000080)) r3 = creat(&(0x7f0000000040)='./file1\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000180)={0x0, 0x1, 0x3, 0x8000000000006}) fallocate(r3, 0x0, 0x2000000, 0x3) 21:07:58 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 21:07:58 executing program 4: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000180)={0x0, 0x9, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "829b3b0b"}, 0x0, 0x0, @fd, 0x4, 0x0, 0x2}) 21:07:58 executing program 5: syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@noattr2='noattr2'}, {@noalign='noalign'}]}) 21:07:58 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0xea}}) 21:07:58 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 21:07:58 executing program 0: r0 = gettid() sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="2cc60f34"], 0x4}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)}], 0x3}}], 0x1, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="db78f09eb815051c21ea66fcedd484317f11d634bdefe4e924b263f88fe5808c430cefdad3d1864e8a40d2f506c4f7248d535d60bdc16096b13073532ac5af93e17d0672bae0c70c252ec40fa4a06fb22323fb3cc4744193497b5623b7cd", @ANYRES64, @ANYPTR64, @ANYBLOB="4e13473b89fbc45cf6e43c476c0937d1f72e54cff2ab3e002db95212b9e7236a506d02d973b73c956991d30db9adc280ecc37d8563a314037854942c981f125c9b9cb8333854deac7366a73846ee3cd44315a2c92f4d9ec3f47367c8c650aceccc3e", @ANYRES64, @ANYRES64], 0x0, 0xe0}, 0x20) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:07:58 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x8}}) [ 185.297621][T11460] XFS (loop5): Invalid superblock magic number 21:07:58 executing program 4: ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000180)={0x0, 0x9, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "829b3b0b"}, 0x0, 0x0, @fd, 0x4, 0x0, 0x2}) 21:07:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$inet_udp(0x2, 0x2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000040)=""/148, 0x458}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/dev_mcast\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 21:07:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:07:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0x837, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffde7, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r1, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) 21:07:58 executing program 4: ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000180)={0x0, 0x9, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "829b3b0b"}, 0x0, 0x0, @fd, 0x4, 0x0, 0x2}) 21:07:58 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 21:07:59 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000200)=""/131, &(0x7f0000000000)=0x83) 21:07:59 executing program 5: syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@noattr2='noattr2'}, {@noalign='noalign'}]}) 21:07:59 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 21:07:59 executing program 4: ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000180)={0x0, 0x9, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "829b3b0b"}, 0x0, 0x0, @fd, 0x4, 0x0, 0x2}) 21:07:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:07:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0x837, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffde7, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r1, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) 21:07:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) ftruncate(0xffffffffffffffff, 0x0) clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x38, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = gettid() kcmp(r1, r1, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) [ 186.110151][T11521] XFS (loop5): Invalid superblock magic number 21:07:59 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) 21:07:59 executing program 4: r0 = openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000180)={0x0, 0x9, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "829b3b0b"}, 0x0, 0x0, @fd, 0x4, 0x0, 0x2}) 21:07:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:07:59 executing program 4: r0 = openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000180)={0x0, 0x9, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "829b3b0b"}, 0x0, 0x0, @fd, 0x4, 0x0, 0x2}) 21:07:59 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) 21:07:59 executing program 4: r0 = openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000180)={0x0, 0x9, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "829b3b0b"}, 0x0, 0x0, @fd, 0x4, 0x0, 0x2}) 21:07:59 executing program 5: syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@noattr2='noattr2'}, {@noalign='noalign'}]}) 21:07:59 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) 21:07:59 executing program 4: openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000180)={0x0, 0x9, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "829b3b0b"}, 0x0, 0x0, @fd, 0x4, 0x0, 0x2}) 21:07:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 21:07:59 executing program 1: r0 = gettid() sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000a40)=ANY=[@ANYBLOB="28ce0f34"], 0x4}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000340)}], 0x3}}], 0x0, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="9feb01007300d8000000490927030000000000020000000002004b01fa36d7d1070b41f8a32f95f13bd04551469b0e40c53cb64b66a8439bd175f8f608c9522b08c53d350f52b5122308fbc3b475befd1b75dcb16d42dde1ec9f80212f8c8c58ae5e9e8c"], 0x0, 0x64}, 0x20) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 186.726763][T11567] XFS (loop5): Invalid superblock magic number 21:08:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 21:08:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1, 0x0) io_cancel(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000040)="a0b4a5cebc0417c9dc09dbe30edf8ed083b7f21a306e4eada0597e6a8798ef69ef174ed12926a119033ef8cc67ade45b840139f36062a95815c305b42e4c5193e10d7bf23ebd083c6db45cf9eb2538ed3e8b01ab27d910976d5e4a7d80b9a4d141e9791d0987050b", 0x68}, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_buf(r1, 0x29, 0x80000000000040, &(0x7f0000000080), 0x0) 21:08:00 executing program 4: openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000180)={0x0, 0x9, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "829b3b0b"}, 0x0, 0x0, @fd, 0x4, 0x0, 0x2}) 21:08:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000001080)='net/tcp6\x00') read$FUSE(r2, 0x0, 0x9a) close(r1) read$FUSE(r2, &(0x7f00000010c0), 0x1000) 21:08:00 executing program 4: openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000180)={0x0, 0x9, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "829b3b0b"}, 0x0, 0x0, @fd, 0x4, 0x0, 0x2}) 21:08:00 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@delsa={0x3c, 0x11, 0x101, 0x0, 0x0, {@in=@multicast1, 0x0, 0xa}, [@srcaddr={0x14}]}, 0x3c}, 0x8}, 0x0) 21:08:00 executing program 5: syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@noattr2='noattr2'}, {@noalign='noalign'}]}) 21:08:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:00 executing program 4: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, 0x0) 21:08:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 21:08:00 executing program 2: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x8c}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:00 executing program 4: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, 0x0) 21:08:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 21:08:00 executing program 4: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, 0x0) 21:08:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 187.574953][T11634] XFS (loop5): Invalid superblock magic number 21:08:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:00 executing program 4: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000180)={0x0, 0x0, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "829b3b0b"}, 0x0, 0x0, @fd, 0x4, 0x0, 0x2}) 21:08:01 executing program 5: syz_mount_image$xfs(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@noattr2='noattr2'}, {@noalign='noalign'}]}) 21:08:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:01 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:01 executing program 4: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000180)={0x0, 0x0, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "829b3b0b"}, 0x0, 0x0, @fd, 0x4, 0x0, 0x2}) 21:08:01 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) 21:08:01 executing program 5: syz_mount_image$xfs(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@noattr2='noattr2'}, {@noalign='noalign'}]}) 21:08:01 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$FOU_CMD_GET(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)}, 0x0) 21:08:01 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:01 executing program 4: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000180)={0x0, 0x0, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "829b3b0b"}, 0x0, 0x0, @fd, 0x4, 0x0, 0x2}) 21:08:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:01 executing program 5: syz_mount_image$xfs(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@noattr2='noattr2'}, {@noalign='noalign'}]}) 21:08:01 executing program 4: mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) mmap(&(0x7f00008da000/0x1000)=nil, 0x1000, 0x0, 0xb4972, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x4, &(0x7f00000004c0)=0x0) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) io_submit(r1, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 21:08:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:02 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x0, &(0x7f0000000240)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:02 executing program 5: syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@noattr2='noattr2'}, {@noalign='noalign'}]}) 21:08:02 executing program 4: 21:08:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:02 executing program 4: 21:08:02 executing program 2: 21:08:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:02 executing program 5: syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@noattr2='noattr2'}, {@noalign='noalign'}]}) 21:08:02 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x0, &(0x7f0000000240)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:02 executing program 4: 21:08:02 executing program 2: 21:08:02 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x0, &(0x7f0000000240)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:03 executing program 5: syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@noattr2='noattr2'}, {@noalign='noalign'}]}) 21:08:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:03 executing program 4: 21:08:03 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:03 executing program 2: openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0xfffffffffffffffe, 0x0, 0xfffffffffffffffd, &(0x7f0000000740)) getsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000500)=""/107, &(0x7f00000004c0)=0x6b) sched_rr_get_interval(0x0, &(0x7f0000000140)) 21:08:03 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:03 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d0000000000000000003ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b07988130", 0x4d}], 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000001380), 0x4000056, 0x3a, &(0x7f0000000200)={0x77359400}) clock_gettime(0x0, &(0x7f0000005200)) 21:08:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = dup2(0xffffffffffffffff, r0) sendmsg$netlink(r1, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x4c}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:03 executing program 5: syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:08:03 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 190.121496][T11792] netlink: 'syz-executor.4': attribute type 29 has an invalid length. [ 190.178874][T11792] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 190.227005][T11792] netlink: 'syz-executor.4': attribute type 29 has an invalid length. [ 190.250044][T11792] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 190.272605][T11796] netlink: 'syz-executor.4': attribute type 29 has an invalid length. [ 190.290718][T11796] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 190.314635][T11796] netlink: 'syz-executor.4': attribute type 29 has an invalid length. [ 190.330367][T11796] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 190.358337][T11796] netlink: 'syz-executor.4': attribute type 29 has an invalid length. [ 190.367573][T11799] XFS (loop5): Invalid superblock magic number [ 190.374167][T11796] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 190.385185][T11796] netlink: 'syz-executor.4': attribute type 29 has an invalid length. [ 190.397501][T11796] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 190.408879][T11796] netlink: 'syz-executor.4': attribute type 29 has an invalid length. [ 190.417432][T11796] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 190.433852][T11796] netlink: 'syz-executor.4': attribute type 29 has an invalid length. [ 190.442605][T11796] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 190.454536][T11796] netlink: 'syz-executor.4': attribute type 29 has an invalid length. [ 190.464227][T11796] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 190.475305][T11796] netlink: 'syz-executor.4': attribute type 29 has an invalid length. [ 190.485375][T11796] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 21:08:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = dup2(0xffffffffffffffff, r0) sendmsg$netlink(r1, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:04 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x800000000050000}]}) stat(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r0, 0x0, 0x0) 21:08:04 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:04 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, 0x0) 21:08:04 executing program 5: syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:08:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = dup2(0xffffffffffffffff, r0) sendmsg$netlink(r1, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:04 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:04 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000380)=@updpolicy={0xb8, 0x19, 0x5105d4e5300fc6d1, 0x0, 0x0, {{@in=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) [ 191.040632][T11821] XFS (loop5): Invalid superblock magic number 21:08:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x3, 0x800008800000001) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x6}, 0x2c) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000100)={0x8, 0x0, 0x0, 0x209, 0xe5, 0xa70}) ioctl$KVM_GET_REGS(0xffffffffffffffff, 0x8090ae81, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) listen(r1, 0x5eb857) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) unlink(&(0x7f0000000140)='./file0\x00') msgctl$IPC_STAT(0x0, 0xd, 0x0) 21:08:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, 0xffffffffffffffff) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:04 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x800008800000001) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x6}, 0x2c) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, 0x0) stat(0x0, 0x0) fstat(0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x5eb857) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r3 = accept4(r1, 0x0, 0x0, 0xfffffffffffffffe) unlink(&(0x7f0000000140)='./file0\x00') sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) msgctl$IPC_STAT(0x0, 0xd, 0x0) 21:08:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:04 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, 0xffffffffffffffff) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x3, 0x800008800000001) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x6}, 0x2c) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000100)={0x8, 0x0, 0x0, 0x209, 0xe5, 0xa70}) ioctl$KVM_GET_REGS(0xffffffffffffffff, 0x8090ae81, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) listen(r1, 0x5eb857) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) unlink(&(0x7f0000000140)='./file0\x00') msgctl$IPC_STAT(0x0, 0xd, 0x0) 21:08:04 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x800008800000001) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x6}, 0x2c) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, 0x0) stat(0x0, 0x0) fstat(0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x5eb857) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r3 = accept4(r1, 0x0, 0x0, 0xfffffffffffffffe) unlink(&(0x7f0000000140)='./file0\x00') sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) msgctl$IPC_STAT(0x0, 0xd, 0x0) 21:08:04 executing program 5: syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:08:05 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x10, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf540000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x3, 0x800008800000001) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x6}, 0x2c) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000100)={0x8, 0x0, 0x0, 0x209, 0xe5, 0xa70}) ioctl$KVM_GET_REGS(0xffffffffffffffff, 0x8090ae81, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) listen(r1, 0x5eb857) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) unlink(&(0x7f0000000140)='./file0\x00') msgctl$IPC_STAT(0x0, 0xd, 0x0) 21:08:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, 0xffffffffffffffff) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:05 executing program 2: signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x0) 21:08:05 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) getpid() recvmsg(0xffffffffffffffff, &(0x7f00000014c0)={0x0, 0x0, 0x0}, 0x0) ptrace(0xffffffffffffffff, 0x0) chroot(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000002c0), 0x2a6) read(r1, 0x0, 0x0) [ 191.960012][T11870] XFS (loop5): Invalid superblock magic number 21:08:05 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:05 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x10, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf540000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:05 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:05 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) getpid() recvmsg(0xffffffffffffffff, &(0x7f00000014c0)={0x0, 0x0, 0x0}, 0x0) ptrace(0xffffffffffffffff, 0x0) chroot(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000002c0), 0x2a6) read(r1, 0x0, 0x0) 21:08:05 executing program 5: syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@noattr2='noattr2'}]}) 21:08:05 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x10, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf540000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:06 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) getpid() recvmsg(0xffffffffffffffff, &(0x7f00000014c0)={0x0, 0x0, 0x0}, 0x0) ptrace(0xffffffffffffffff, 0x0) chroot(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000002c0), 0x2a6) read(r1, 0x0, 0x0) 21:08:06 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:06 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad430100000000009500"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 192.864428][T11922] XFS (loop5): Invalid superblock magic number 21:08:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:06 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad430100000000009500"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:06 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:06 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, 0x0) 21:08:06 executing program 5: syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@noattr2='noattr2'}]}) 21:08:06 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad430100000000009500"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:06 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) 21:08:06 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:06 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000200)='/dev/nbd#\x00', 0x0, 0x0) r1 = socket(0x11, 0x400000002, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) [ 193.768250][T11966] XFS (loop5): Invalid superblock magic number 21:08:07 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x14, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000000500000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:07 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 193.852459][T11988] block nbd2: shutting down sockets [ 193.919595][T11988] block nbd2: shutting down sockets 21:08:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:07 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:07 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) 21:08:07 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x14, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000000500000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:07 executing program 2: lstat(&(0x7f0000001ac0)='./bus\x00', &(0x7f0000001b00)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) close(r0) r1 = socket$netlink(0x10, 0x3, 0xa) connect$netlink(r1, &(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x14800008}, 0xc) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x8000fffffffe) 21:08:07 executing program 5: syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@noattr2='noattr2'}]}) 21:08:07 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x14, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000000500000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:07 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) [ 194.655774][T12013] XFS (loop5): Invalid superblock magic number 21:08:07 executing program 2: lstat(&(0x7f0000001ac0)='./bus\x00', &(0x7f0000001b00)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) close(r0) r1 = socket$netlink(0x10, 0x3, 0xa) connect$netlink(r1, &(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x14800008}, 0xc) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x8000fffffffe) 21:08:07 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000000500000000000000950000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:07 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:08 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000000500000000000000950000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:08 executing program 5: syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@noalign='noalign'}]}) 21:08:08 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x64}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x0, 0x0, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:08 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000000500000000000000950000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:08 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x5c}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) [ 195.597887][T12056] XFS (loop5): Invalid superblock magic number 21:08:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x0, 0x0, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:09 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000000500000000000000950000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:09 executing program 2: r0 = socket$inet6(0xa, 0x5, 0xfffffffffffffffd) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_int(r1, 0x0, 0x12, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000380)=[@in={0x2, 0x4e22, @remote}], 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0xffffffffffffff7b) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) socket(0x0, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000040), 0x4) syz_extract_tcp_res(0x0, 0x0, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_netdev_private(r0, 0x89ff, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) getpeername$netrom(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) recvmsg(r2, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 21:08:09 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x0, 0x0, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:09 executing program 5: syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@noalign='noalign'}]}) 21:08:09 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000000500000000000000950000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:09 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) [ 196.481391][T12101] XFS (loop5): Invalid superblock magic number 21:08:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:09 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000000500000000000000950000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:09 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:10 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:10 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad430100000000009500000000000000050000000000000095000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:10 executing program 5: syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@noalign='noalign'}]}) 21:08:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) accept$alg(r0, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000200), 0xffffff77) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x70}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:10 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x0, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:10 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad430100000000009500000000000000050000000000000095000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) accept$alg(r0, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000200), 0xffffff77) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) [ 197.299337][T12164] XFS (loop5): Invalid superblock magic number 21:08:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:10 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad430100000000009500000000000000050000000000000095000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:10 executing program 2: 21:08:10 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x0, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) accept$alg(r0, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000200), 0xffffff77) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = dup(0xffffffffffffffff) write$UHID_DESTROY(r1, &(0x7f0000000200), 0xffffff77) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:10 executing program 2: 21:08:10 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:10 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x0, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:11 executing program 2: 21:08:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:11 executing program 5: 21:08:11 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:11 executing program 5: 21:08:11 executing program 2: 21:08:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = dup(0xffffffffffffffff) write$UHID_DESTROY(r1, &(0x7f0000000200), 0xffffff77) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:11 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:11 executing program 2: 21:08:11 executing program 5: 21:08:11 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:11 executing program 5: 21:08:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = dup(0xffffffffffffffff) write$UHID_DESTROY(r1, &(0x7f0000000200), 0xffffff77) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) sendmsg$netlink(r1, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:11 executing program 2: 21:08:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:11 executing program 5: 21:08:11 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) sendmsg$netlink(r1, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:11 executing program 2: 21:08:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) sendmsg$netlink(r1, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:11 executing program 5: 21:08:11 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:11 executing program 2: 21:08:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x0, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = dup2(0xffffffffffffffff, r0) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:12 executing program 5: 21:08:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:12 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) 21:08:12 executing program 2: 21:08:12 executing program 5: 21:08:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = dup2(0xffffffffffffffff, r0) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:12 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) 21:08:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x0, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:12 executing program 2: 21:08:12 executing program 5: 21:08:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = dup2(0xffffffffffffffff, r0) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:12 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) 21:08:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:12 executing program 2: 21:08:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x0, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:12 executing program 5: 21:08:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, 0xffffffffffffffff) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:12 executing program 3: 21:08:12 executing program 5: 21:08:12 executing program 2: 21:08:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, 0xffffffffffffffff) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:12 executing program 3: 21:08:12 executing program 5: 21:08:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:13 executing program 2: 21:08:13 executing program 3: 21:08:13 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = dup(r0) write$UHID_DESTROY(r1, &(0x7f0000000200), 0xffffff77) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, 0xffffffffffffffff) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:13 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:13 executing program 5: 21:08:13 executing program 2: 21:08:13 executing program 3: 21:08:13 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = dup(r0) write$UHID_DESTROY(r1, &(0x7f0000000200), 0xffffff77) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:13 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:13 executing program 3: 21:08:13 executing program 2: 21:08:13 executing program 5: 21:08:13 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:13 executing program 2: 21:08:13 executing program 3: 21:08:13 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = dup(r0) write$UHID_DESTROY(r1, &(0x7f0000000200), 0xffffff77) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:13 executing program 5: 21:08:13 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:13 executing program 2: 21:08:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:13 executing program 3: 21:08:13 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:13 executing program 2: 21:08:13 executing program 3: 21:08:13 executing program 5: 21:08:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, 0x0, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:14 executing program 3: 21:08:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:14 executing program 5: 21:08:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:14 executing program 2: 21:08:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:14 executing program 5: 21:08:14 executing program 3: 21:08:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, 0x0, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:14 executing program 2: 21:08:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:08:14 executing program 5: 21:08:14 executing program 3: 21:08:14 executing program 2: 21:08:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, 0x0, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:14 executing program 5: 21:08:14 executing program 3: 21:08:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) 21:08:14 executing program 2: 21:08:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:14 executing program 5: 21:08:14 executing program 3: 21:08:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) 21:08:14 executing program 2: 21:08:14 executing program 5: 21:08:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:15 executing program 3: 21:08:15 executing program 2: 21:08:15 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) 21:08:15 executing program 5: poll(&(0x7f0000000140), 0x2, 0x8000000000049) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x30e, 0x0, 0x0, 0x800e006af) poll(&(0x7f0000000000)=[{r0, 0x2001}], 0x1, 0x0) shutdown(r0, 0x0) 21:08:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) poll(&(0x7f0000000140), 0x2, 0x8000000000049) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x30e, 0x0, 0x0, 0x800e006af) r2 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f0000000000)=[{r1, 0x2001}], 0x1, 0x0) poll(&(0x7f0000000200)=[{}, {r2}], 0x2, 0x82) shutdown(r1, 0x0) recvfrom$inet(r0, 0x0, 0x187bd01f, 0x0, 0x0, 0x800e00567) 21:08:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000140)=""/101, 0x65}, {0x0}, {0x0}], 0x3) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x896e, 0x0, 0x0, 0x800e00519) shutdown(r1, 0x0) dup(r0) recvfrom$inet(r2, 0x0, 0x10201, 0x2, 0x0, 0x800e0051d) shutdown(r2, 0x0) 21:08:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000780)=[{&(0x7f0000000100)=""/250, 0xfa}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x1008d, 0x0, 0x0, 0x800e00527) shutdown(r1, 0x0) getpeername(r1, 0x0, &(0x7f0000000040)) recvfrom$inet(r2, 0x0, 0xfffffdc4, 0x0, 0x0, 0x800e00525) shutdown(r2, 0x0) 21:08:16 executing program 5: 21:08:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:16 executing program 3: 21:08:16 executing program 5: 21:08:16 executing program 3: 21:08:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:16 executing program 5: 21:08:16 executing program 2: 21:08:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb01b0df1dcda5634f2db38a7f780018000000000000003400000034000000040000000211c59524b9036bb60000000200000000000007000000000000000002000000000000000c00000000000000"], 0x0, 0x50}, 0x20) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x0, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0xd8, 0x0}, 0x20) r6 = openat$cgroup_int(r2, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x322) socket$kcm(0xa, 0x6, 0x0) close(r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x0, 0x0, 0x0, 0x0) write$cgroup_int(r6, 0x0, 0x3f8b7cdf8934ee9b) socketpair(0xb, 0x6, 0x3, &(0x7f0000000340)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f00000018c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000002940), 0x0, &(0x7f0000002980)=""/6, 0x6}, 0x12040) 21:08:16 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x800000000050000}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) lchown(0x0, 0x0, r0) 21:08:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:17 executing program 5: 21:08:17 executing program 2: 21:08:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:17 executing program 4: 21:08:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb01b0df1dcda5634f2db38a7f780018000000000000003400000034000000040000000211c59524b9036bb60000000200000000000007000000000000000002000000000000000c00000000000000"], 0x0, 0x50}, 0x20) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x0, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0xd8, 0x0}, 0x20) r6 = openat$cgroup_int(r2, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x322) socket$kcm(0xa, 0x6, 0x0) close(r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x0, 0x0, 0x0, 0x0) write$cgroup_int(r6, 0x0, 0x3f8b7cdf8934ee9b) socketpair(0xb, 0x6, 0x3, &(0x7f0000000340)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f00000018c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000002940), 0x0, &(0x7f0000002980)=""/6, 0x6}, 0x12040) 21:08:17 executing program 2: 21:08:17 executing program 5: 21:08:17 executing program 4: 21:08:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:17 executing program 2: 21:08:17 executing program 5: 21:08:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:18 executing program 4: 21:08:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb01b0df1dcda5634f2db38a7f780018000000000000003400000034000000040000000211c59524b9036bb60000000200000000000007000000000000000002000000000000000c00000000000000"], 0x0, 0x50}, 0x20) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x0, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0xd8, 0x0}, 0x20) r6 = openat$cgroup_int(r2, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x322) socket$kcm(0xa, 0x6, 0x0) close(r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x0, 0x0, 0x0, 0x0) write$cgroup_int(r6, 0x0, 0x3f8b7cdf8934ee9b) socketpair(0xb, 0x6, 0x3, &(0x7f0000000340)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f00000018c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000002940), 0x0, &(0x7f0000002980)=""/6, 0x6}, 0x12040) 21:08:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:18 executing program 2: 21:08:18 executing program 5: 21:08:18 executing program 4: 21:08:18 executing program 2: 21:08:18 executing program 5: 21:08:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:18 executing program 4: 21:08:18 executing program 2: 21:08:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:18 executing program 5: 21:08:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb01b0df1dcda5634f2db38a7f780018000000000000003400000034000000040000000211c59524b9036bb60000000200000000000007000000000000000002000000000000000c00000000000000"], 0x0, 0x50}, 0x20) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x0, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x0, 0x1, 0xd8, 0x0}, 0x20) r6 = openat$cgroup_int(r2, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x322) socket$kcm(0xa, 0x6, 0x0) close(r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x0, 0x0, 0x0, 0x0) write$cgroup_int(r6, 0x0, 0x3f8b7cdf8934ee9b) socketpair(0xb, 0x6, 0x3, &(0x7f0000000340)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f00000018c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000002940), 0x0, &(0x7f0000002980)=""/6, 0x6}, 0x12040) 21:08:18 executing program 2: 21:08:18 executing program 4: 21:08:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:18 executing program 4: 21:08:18 executing program 2: 21:08:18 executing program 5: 21:08:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:18 executing program 4: 21:08:18 executing program 3: 21:08:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:19 executing program 2: 21:08:19 executing program 3: 21:08:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:19 executing program 5: 21:08:19 executing program 4: 21:08:19 executing program 2: 21:08:19 executing program 3: 21:08:19 executing program 4: poll(&(0x7f0000000040), 0x2000000000000014, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xfffffff0, 0x0, 0x0, 0x800e00810) poll(&(0x7f0000000140)=[{r0}, {r0}, {r0}], 0x3, 0xec8) shutdown(r0, 0x0) 21:08:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:19 executing program 5: dup(0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) shutdown(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffdc4, 0x2, 0x0, 0x800e00525) shutdown(r0, 0x0) 21:08:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) poll(&(0x7f0000000140), 0x2, 0x8000000000049) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x30e, 0x0, 0x0, 0x800e006af) r2 = socket$inet_sctp(0x2, 0x1, 0x84) poll(&(0x7f0000000200)=[{}, {r2}], 0x2, 0x82) shutdown(r1, 0x0) recvfrom$inet(r0, 0x0, 0x187bd01f, 0x0, 0x0, 0x800e00567) 21:08:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000001840)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000001c0)=""/118, 0x76}, {0x0}, {0x0, 0x75}, {0x0, 0x30a}, {0x0, 0xffffffffffffff02}, {0x0}], 0xd, 0x0, 0xffffffffffffffc9}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xa1720495f3f7f40, 0x0, 0x0, 0x800e00516) shutdown(r1, 0x0) setsockopt$inet_int(r0, 0x0, 0x44, &(0x7f00000000c0), 0x4) recvfrom$inet(r2, 0x0, 0xfefc, 0x2, 0x0, 0x800e00510) shutdown(r2, 0x0) 21:08:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000780)=[{&(0x7f0000000100)=""/250, 0xfa}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x1008d, 0x0, 0x0, 0x800e00527) shutdown(r1, 0x0) getpeername(r1, 0x0, &(0x7f0000000040)) recvfrom$inet(r2, 0x0, 0xfffffdc4, 0x2, 0x0, 0x800e00525) shutdown(r2, 0x0) 21:08:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) accept$alg(r0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) write$UHID_DESTROY(r1, &(0x7f0000000200), 0xffffff77) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:20 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:08:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) accept$alg(r0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) write$UHID_DESTROY(r1, &(0x7f0000000200), 0xffffff77) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[]}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:20 executing program 2: syz_mount_image$xfs(&(0x7f0000000240)='xfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)={[{@noalign='noalign'}]}) 21:08:20 executing program 3: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 21:08:20 executing program 3: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 21:08:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) accept$alg(r0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) write$UHID_DESTROY(r1, &(0x7f0000000200), 0xffffff77) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) [ 207.248143][T12750] XFS (loop2): Invalid superblock magic number [ 207.310150][T12763] libceph: resolve 'LÄ.Ú]' (ret=-3): failed 21:08:20 executing program 3: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 21:08:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) [ 207.359950][T12763] libceph: parse_ips bad ip 'LÄ.Ú],0:E0' [ 207.399529][T12763] source parameter not specified 21:08:20 executing program 4: set_mempolicy(0x1, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x73, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, 0x0, &(0x7f0000000080)) preadv(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, 0x8) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'ip6tnl0\x00', r2}) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000380)={r0, @in6={{0xa, 0x0, 0x80, @mcast1}}, 0x6, 0xfffd, 0x200, 0xd03, 0x40}, 0x98) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r3, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r3, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r3, 0x0, 0x4, &(0x7f00000000c0), 0x0) setsockopt$inet_mtu(r3, 0x0, 0xa, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 21:08:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[]}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:20 executing program 3: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 21:08:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:21 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:08:21 executing program 3: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 21:08:21 executing program 2: set_mempolicy(0x1, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x73, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, 0x0, &(0x7f0000000080)) preadv(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, 0x8) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'ip6tnl0\x00', r2}) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000380)={r0, @in6={{0xa, 0x0, 0x80, @mcast1}}, 0x6, 0xfffd, 0x200, 0xd03, 0x40}, 0x98) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r3, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r3, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r3, 0x0, 0x4, &(0x7f00000000c0), 0x0) setsockopt$inet_mtu(r3, 0x0, 0xa, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 21:08:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:21 executing program 4: set_mempolicy(0x1, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x73, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, 0x0, &(0x7f0000000080)) preadv(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, 0x8) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'ip6tnl0\x00', r2}) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000380)={r0, @in6={{0xa, 0x0, 0x80, @mcast1}}, 0x6, 0xfffd, 0x200, 0xd03, 0x40}, 0x98) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r3, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r3, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r3, 0x0, 0x4, &(0x7f00000000c0), 0x0) setsockopt$inet_mtu(r3, 0x0, 0xa, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 21:08:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[]}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:21 executing program 3: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 21:08:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:21 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) [ 208.766377][T12814] libceph: resolve 'LÄ.Ú]' (ret=-3): failed 21:08:22 executing program 4 (fault-call:0 fault-nth:0): bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:22 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) [ 208.828020][T12814] libceph: parse_ips bad ip 'LÄ.Ú],0:E0' [ 208.866793][T12814] source parameter not specified 21:08:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:22 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:08:22 executing program 2 (fault-call:0 fault-nth:0): bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 21:08:22 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) [ 209.028494][T12829] FAULT_INJECTION: forcing a failure. [ 209.028494][T12829] name failslab, interval 1, probability 0, space 0, times 1 [ 209.058265][T12832] FAULT_INJECTION: forcing a failure. [ 209.058265][T12832] name failslab, interval 1, probability 0, space 0, times 1 [ 209.101181][T12829] CPU: 1 PID: 12829 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190801 #57 [ 209.110332][T12829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.120401][T12829] Call Trace: [ 209.120440][T12829] dump_stack+0x172/0x1f0 [ 209.120460][T12829] should_fail.cold+0xa/0x15 [ 209.120477][T12829] ? fault_create_debugfs_attr+0x180/0x180 [ 209.120495][T12829] ? page_to_nid.part.0+0x20/0x20 [ 209.120522][T12829] ? ___might_sleep+0x163/0x280 [ 209.138610][T12829] __should_failslab+0x121/0x190 [ 209.153414][T12829] should_failslab+0x9/0x14 [ 209.157931][T12829] kmem_cache_alloc_node_trace+0x274/0x750 [ 209.160685][T12837] libceph: resolve 'LÄ.Ú]' (ret=-3): failed [ 209.163746][T12829] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 209.163763][T12829] ? bpf_prog_kallsyms_find+0x50/0x2c0 [ 209.163783][T12829] __get_vm_area_node+0x12b/0x370 [ 209.163806][T12829] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 209.178893][T12837] libceph: parse_ips bad ip 'LÄ.Ú],0:E0' [ 209.180904][T12829] __vmalloc_node_range+0xd4/0x7d0 [ 209.180922][T12829] ? bpf_prog_alloc_no_stats+0x6b/0x2b0 [ 209.180944][T12829] __vmalloc+0x44/0x50 [ 209.195971][T12837] source parameter not specified [ 209.198034][T12829] ? bpf_prog_alloc_no_stats+0x6b/0x2b0 [ 209.198049][T12829] bpf_prog_alloc_no_stats+0x6b/0x2b0 [ 209.198062][T12829] bpf_prog_alloc+0x31/0x230 [ 209.198079][T12829] ? ns_capable_common+0x93/0x100 [ 209.198096][T12829] bpf_prog_load+0x400/0x1670 [ 209.198111][T12829] ? bpf_prog_new_fd+0x60/0x60 [ 209.198133][T12829] ? _kstrtoul+0x170/0x170 [ 209.253056][T12829] ? lock_downgrade+0x920/0x920 [ 209.258023][T12829] ? __might_fault+0xfb/0x1e0 [ 209.258047][T12829] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 209.258060][T12829] ? security_bpf+0x8b/0xc0 [ 209.258086][T12829] __do_sys_bpf+0xc43/0x3460 [ 209.278469][T12829] ? bpf_prog_load+0x1670/0x1670 [ 209.278487][T12829] ? __kasan_check_write+0x14/0x20 [ 209.278505][T12829] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 209.278528][T12829] ? wait_for_completion+0x440/0x440 [ 209.299560][T12829] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 209.305828][T12829] ? fput_many+0x12c/0x1a0 [ 209.305862][T12829] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 209.305883][T12829] __x64_sys_bpf+0x73/0xb0 [ 209.305902][T12829] do_syscall_64+0xfa/0x760 [ 209.305917][T12829] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 209.305951][T12829] RIP: 0033:0x459829 [ 209.320881][T12829] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 209.355174][T12829] RSP: 002b:00007f9ef7188c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 209.363606][T12829] RAX: ffffffffffffffda RBX: 00007f9ef7188c90 RCX: 0000000000459829 [ 209.371587][T12829] RDX: 0000000000000048 RSI: 0000000020b7a000 RDI: 0000000000000005 [ 209.379590][T12829] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 209.387590][T12829] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9ef71896d4 21:08:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:22 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 209.396018][T12829] R13: 00000000004bfc7c R14: 00000000004d1878 R15: 0000000000000003 [ 209.404123][T12832] CPU: 0 PID: 12832 Comm: syz-executor.2 Not tainted 5.3.0-rc2-next-20190801 #57 [ 209.413255][T12832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.423326][T12832] Call Trace: [ 209.426644][T12832] dump_stack+0x172/0x1f0 [ 209.430985][T12832] should_fail.cold+0xa/0x15 [ 209.435600][T12832] ? fault_create_debugfs_attr+0x180/0x180 [ 209.441432][T12832] ? page_to_nid.part.0+0x20/0x20 [ 209.446481][T12832] ? ___might_sleep+0x163/0x280 [ 209.451369][T12832] __should_failslab+0x121/0x190 [ 209.457970][T12832] should_failslab+0x9/0x14 [ 209.462683][T12832] kmem_cache_alloc_node_trace+0x274/0x750 [ 209.468504][T12832] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 209.474268][T12832] ? bpf_prog_kallsyms_find+0x50/0x2c0 [ 209.479835][T12832] __get_vm_area_node+0x12b/0x370 [ 209.485322][T12832] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 209.491788][T12832] __vmalloc_node_range+0xd4/0x7d0 [ 209.496933][T12832] ? bpf_prog_alloc_no_stats+0x6b/0x2b0 [ 209.502544][T12832] __vmalloc+0x44/0x50 [ 209.506648][T12832] ? bpf_prog_alloc_no_stats+0x6b/0x2b0 [ 209.512479][T12832] bpf_prog_alloc_no_stats+0x6b/0x2b0 [ 209.517867][T12832] bpf_prog_alloc+0x31/0x230 [ 209.522469][T12832] ? ns_capable_common+0x93/0x100 [ 209.527509][T12832] bpf_prog_load+0x400/0x1670 [ 209.532210][T12832] ? bpf_prog_new_fd+0x60/0x60 [ 209.536982][T12832] ? _kstrtoul+0x170/0x170 [ 209.541423][T12832] ? lock_downgrade+0x920/0x920 [ 209.546288][T12832] ? __might_fault+0xfb/0x1e0 [ 209.550994][T12832] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 209.557251][T12832] ? security_bpf+0x8b/0xc0 [ 209.561778][T12832] __do_sys_bpf+0xc43/0x3460 [ 209.566414][T12832] ? bpf_prog_load+0x1670/0x1670 [ 209.571655][T12832] ? __kasan_check_write+0x14/0x20 [ 209.576879][T12832] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 209.582501][T12832] ? wait_for_completion+0x440/0x440 [ 209.587913][T12832] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 209.594268][T12832] ? fput_many+0x12c/0x1a0 [ 209.599005][T12832] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 209.605140][T12832] __x64_sys_bpf+0x73/0xb0 [ 209.609638][T12832] do_syscall_64+0xfa/0x760 [ 209.614323][T12832] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 209.620621][T12832] RIP: 0033:0x459829 [ 209.624735][T12832] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 209.651821][T12832] RSP: 002b:00007fd167eb4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 209.660277][T12832] RAX: ffffffffffffffda RBX: 00007fd167eb4c90 RCX: 0000000000459829 [ 209.669957][T12832] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005 [ 209.679527][T12832] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 209.688769][T12832] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd167eb56d4 [ 209.696755][T12832] R13: 00000000004bfc7c R14: 00000000004d1878 R15: 0000000000000003 [ 209.707676][T12832] syz-executor.2: vmalloc: allocation failure: 4096 bytes, mode:0x100dc0(GFP_USER|__GFP_ZERO), nodemask=(null),cpuset=syz2,mems_allowed=0-1 [ 209.736790][T12832] CPU: 0 PID: 12832 Comm: syz-executor.2 Not tainted 5.3.0-rc2-next-20190801 #57 [ 209.742539][T12829] syz-executor.4: vmalloc: allocation failure: 4096 bytes, mode:0x100dc0(GFP_USER|__GFP_ZERO), nodemask=(null),cpuset=syz4,mems_allowed=0-1 [ 209.745964][T12832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.745970][T12832] Call Trace: [ 209.745999][T12832] dump_stack+0x172/0x1f0 [ 209.746017][T12832] warn_alloc.cold+0x87/0x17f [ 209.746032][T12832] ? zone_watermark_ok_safe+0x260/0x260 [ 209.746065][T12832] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 209.786898][T12842] libceph: resolve 'LÄ.Ú]' (ret=-3): failed 21:08:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:23 executing program 3: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) [ 209.788200][T12832] ? __get_vm_area_node+0x2bb/0x370 [ 209.788230][T12832] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 209.788253][T12832] __vmalloc_node_range+0x483/0x7d0 [ 209.802357][T12842] libceph: parse_ips bad ip 'LÄ.Ú],0:E0' [ 209.805237][T12832] __vmalloc+0x44/0x50 [ 209.805268][T12832] ? bpf_prog_alloc_no_stats+0x6b/0x2b0 [ 209.832599][T12832] bpf_prog_alloc_no_stats+0x6b/0x2b0 [ 209.838025][T12832] bpf_prog_alloc+0x31/0x230 [ 209.842633][T12832] ? ns_capable_common+0x93/0x100 [ 209.847741][T12832] bpf_prog_load+0x400/0x1670 [ 209.852545][T12832] ? bpf_prog_new_fd+0x60/0x60 [ 209.857328][T12832] ? _kstrtoul+0x170/0x170 [ 209.857352][T12832] ? lock_downgrade+0x920/0x920 [ 209.857370][T12832] ? __might_fault+0xfb/0x1e0 [ 209.857398][T12832] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 209.857423][T12832] ? security_bpf+0x8b/0xc0 [ 209.882126][T12832] __do_sys_bpf+0xc43/0x3460 [ 209.886736][T12832] ? bpf_prog_load+0x1670/0x1670 [ 209.891704][T12832] ? __kasan_check_write+0x14/0x20 [ 209.896821][T12832] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 209.902377][T12832] ? wait_for_completion+0x440/0x440 [ 209.907673][T12832] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 209.913924][T12832] ? fput_many+0x12c/0x1a0 [ 209.918574][T12832] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 209.924675][T12832] __x64_sys_bpf+0x73/0xb0 [ 209.929158][T12832] do_syscall_64+0xfa/0x760 [ 209.933673][T12832] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 209.939567][T12832] RIP: 0033:0x459829 [ 209.943548][T12832] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 209.963162][T12832] RSP: 002b:00007fd167eb4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 209.971585][T12832] RAX: ffffffffffffffda RBX: 00007fd167eb4c90 RCX: 0000000000459829 [ 209.979571][T12832] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005 [ 209.987561][T12832] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 209.995550][T12832] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd167eb56d4 [ 210.003539][T12832] R13: 00000000004bfc7c R14: 00000000004d1878 R15: 0000000000000003 [ 210.017171][T12829] CPU: 0 PID: 12829 Comm: syz-executor.4 Not tainted 5.3.0-rc2-next-20190801 #57 [ 210.026298][T12829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 210.026304][T12829] Call Trace: [ 210.026338][T12829] dump_stack+0x172/0x1f0 [ 210.026363][T12829] warn_alloc.cold+0x87/0x17f [ 210.048746][T12829] ? zone_watermark_ok_safe+0x260/0x260 21:08:23 executing program 3: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) [ 210.054340][T12829] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 210.060177][T12829] ? __get_vm_area_node+0x2bb/0x370 [ 210.065392][T12829] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 210.071931][T12829] __vmalloc_node_range+0x483/0x7d0 [ 210.077276][T12829] __vmalloc+0x44/0x50 [ 210.081632][T12829] ? bpf_prog_alloc_no_stats+0x6b/0x2b0 [ 210.087217][T12829] bpf_prog_alloc_no_stats+0x6b/0x2b0 [ 210.092827][T12829] bpf_prog_alloc+0x31/0x230 [ 210.097440][T12829] ? ns_capable_common+0x93/0x100 [ 210.102488][T12829] bpf_prog_load+0x400/0x1670 [ 210.107171][T12829] ? bpf_prog_new_fd+0x60/0x60 [ 210.107185][T12829] ? _kstrtoul+0x170/0x170 [ 210.107203][T12829] ? lock_downgrade+0x920/0x920 [ 210.107217][T12829] ? __might_fault+0xfb/0x1e0 [ 210.107237][T12829] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 210.107248][T12829] ? security_bpf+0x8b/0xc0 [ 210.107262][T12829] __do_sys_bpf+0xc43/0x3460 [ 210.107282][T12829] ? bpf_prog_load+0x1670/0x1670 [ 210.116469][T12829] ? __kasan_check_write+0x14/0x20 [ 210.116488][T12829] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 210.116515][T12829] ? wait_for_completion+0x440/0x440 [ 210.162682][T12829] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 210.169504][T12829] ? fput_many+0x12c/0x1a0 [ 210.173945][T12829] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 210.180065][T12829] __x64_sys_bpf+0x73/0xb0 [ 210.182990][T12842] source parameter not specified [ 210.184600][T12829] do_syscall_64+0xfa/0x760 [ 210.184623][T12829] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 210.184635][T12829] RIP: 0033:0x459829 21:08:23 executing program 3: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) [ 210.184651][T12829] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 210.184667][T12829] RSP: 002b:00007f9ef7188c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 210.232284][T12829] RAX: ffffffffffffffda RBX: 00007f9ef7188c90 RCX: 0000000000459829 [ 210.240264][T12829] RDX: 0000000000000048 RSI: 0000000020b7a000 RDI: 0000000000000005 [ 210.248245][T12829] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 210.248253][T12829] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9ef71896d4 [ 210.248260][T12829] R13: 00000000004bfc7c R14: 00000000004d1878 R15: 0000000000000003 [ 210.274104][T12829] Mem-Info: [ 210.278366][T12829] active_anon:83748 inactive_anon:179 isolated_anon:0 [ 210.278366][T12829] active_file:7800 inactive_file:36661 isolated_file:0 [ 210.278366][T12829] unevictable:0 dirty:141 writeback:0 unstable:0 [ 210.278366][T12829] slab_reclaimable:12222 slab_unreclaimable:114320 [ 210.278366][T12829] mapped:58968 shmem:245 pagetables:985 bounce:0 [ 210.278366][T12829] free:1277666 free_pcp:663 free_cma:0 [ 210.322792][T12829] Node 0 active_anon:334992kB inactive_anon:716kB active_file:31060kB inactive_file:146644kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:235872kB dirty:560kB writeback:0kB shmem:980kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 239616kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 210.366727][T12829] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 210.405086][T12829] Node 0 DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 210.432513][T12829] lowmem_reserve[]: 0 2549 2550 2550 [ 210.438035][T12829] Node 0 DMA32 free:1312568kB min:36200kB low:45248kB high:54296kB active_anon:332864kB inactive_anon:716kB active_file:29776kB inactive_file:146552kB unevictable:0kB writepending:552kB present:3129332kB managed:2613912kB mlocked:0kB kernel_stack:7296kB pagetables:3792kB bounce:0kB free_pcp:2560kB local_pcp:1356kB free_cma:0kB [ 210.470940][T12829] lowmem_reserve[]: 0 0 1 1 [ 210.475577][T12829] Node 0 Normal free:16kB min:16kB low:20kB high:24kB active_anon:36kB inactive_anon:0kB active_file:1284kB inactive_file:92kB unevictable:0kB writepending:8kB present:786432kB managed:1428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 210.503411][T12829] lowmem_reserve[]: 0 0 0 0 [ 210.508462][T12829] Node 1 Normal free:3783808kB min:53668kB low:67084kB high:80500kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870244kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 210.537417][T12829] lowmem_reserve[]: 0 0 0 0 [ 210.541960][T12829] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 210.556407][T12829] Node 0 DMA32: 7936*4kB (UME) 1369*8kB (UME) 710*16kB (UME) 310*32kB (UME) 103*64kB (UME) 33*128kB (UM) 10*256kB (UME) 2*512kB (UM) 1*1024kB (M) 4*2048kB (UME) 300*4096kB (M) = 1316392kB [ 210.575041][T12829] Node 0 Normal: 2*4kB (M) 1*8kB (M) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 16kB [ 210.587364][T12829] Node 1 Normal: 60*4kB (UME) 276*8kB (UME) 271*16kB (UME) 62*32kB (UE) 21*64kB (U) 8*128kB (UM) 7*256kB (UM) 3*512kB (UE) 3*1024kB (UME) 1*2048kB (M) 919*4096kB (M) = 3783808kB [ 210.606585][T12829] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 210.616329][T12829] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 210.626087][T12829] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 210.635791][T12829] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 210.645394][T12829] 44720 total pagecache pages [ 210.650132][T12829] 0 pages in swap cache [ 210.654384][T12829] Swap cache stats: add 0, delete 0, find 0/0 [ 210.660524][T12829] Free swap = 0kB 21:08:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:23 executing program 5: mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:08:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:23 executing program 3: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 21:08:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 21:08:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) [ 210.664811][T12829] Total swap = 0kB [ 210.670578][T12829] 1965979 pages RAM [ 210.675323][T12829] 0 pages HighMem/MovableOnly [ 210.681685][T12829] 340606 pages reserved [ 210.685951][T12829] 0 pages cma reserved 21:08:23 executing program 3: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 21:08:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:24 executing program 5: mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:08:24 executing program 3: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 21:08:24 executing program 2: bpf$PROG_LOAD(0x2, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 21:08:24 executing program 4: bpf$PROG_LOAD(0x2, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:24 executing program 5: mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:08:24 executing program 3: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 21:08:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, 0x0, 0x0, 0x62, 0x0) 21:08:24 executing program 5: mknod$loop(0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:08:24 executing program 4: bpf$PROG_LOAD(0x3, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:24 executing program 3: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 21:08:24 executing program 2: bpf$PROG_LOAD(0x3, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 21:08:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, 0x0, 0x0, 0x62, 0x0) 21:08:24 executing program 5: mknod$loop(0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:08:24 executing program 4: bpf$PROG_LOAD(0x4, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:24 executing program 3: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 21:08:24 executing program 5: mknod$loop(0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:08:24 executing program 2: bpf$PROG_LOAD(0x4, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 21:08:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, 0x0, 0x0, 0x62, 0x0) 21:08:24 executing program 4: bpf$PROG_LOAD(0x6, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:24 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:08:25 executing program 3 (fault-call:2 fault-nth:0): madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 21:08:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x0, 0x0) [ 211.891097][T12947] source parameter not specified [ 211.930027][T12953] FAULT_INJECTION: forcing a failure. [ 211.930027][T12953] name failslab, interval 1, probability 0, space 0, times 0 [ 211.956466][T12953] CPU: 1 PID: 12953 Comm: syz-executor.3 Not tainted 5.3.0-rc2-next-20190801 #57 [ 211.965623][T12953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.975775][T12953] Call Trace: [ 211.979093][T12953] dump_stack+0x172/0x1f0 [ 211.983475][T12953] should_fail.cold+0xa/0x15 [ 211.988093][T12953] ? fault_create_debugfs_attr+0x180/0x180 [ 211.993905][T12953] ? page_to_nid.part.0+0x20/0x20 [ 211.998926][T12953] ? ___might_sleep+0x163/0x280 [ 212.003878][T12953] __should_failslab+0x121/0x190 [ 212.008918][T12953] should_failslab+0x9/0x14 [ 212.014088][T12953] kmem_cache_alloc+0x2aa/0x710 [ 212.019067][T12953] ? __vma_adjust+0xc73/0x1e30 [ 212.023852][T12953] __khugepaged_enter+0x3b/0x3a0 [ 212.028794][T12953] khugepaged_enter_vma_merge+0x230/0x300 [ 212.034523][T12953] vma_merge+0x8f2/0xe60 [ 212.038969][T12953] ? __vma_adjust+0x1e30/0x1e30 [ 212.043822][T12953] ? vmacache_update+0x114/0x140 [ 212.048877][T12953] ? find_vma+0x30/0x170 [ 212.053257][T12953] __x64_sys_madvise+0xa68/0x1500 [ 212.058558][T12953] ? madvise_free_pte_range+0x2580/0x2580 [ 212.064287][T12953] ? fput+0x1b/0x20 [ 212.068113][T12953] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 212.075347][T12953] ? trace_hardirqs_off_caller+0x65/0x230 [ 212.081087][T12953] do_syscall_64+0xfa/0x760 [ 212.085613][T12953] ? do_syscall_64+0xfa/0x760 [ 212.090294][T12953] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 212.096181][T12953] RIP: 0033:0x459829 [ 212.100094][T12953] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 212.120323][T12953] RSP: 002b:00007fb55bb71c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 212.130018][T12953] RAX: ffffffffffffffda RBX: 00007fb55bb71c90 RCX: 0000000000459829 [ 212.137986][T12953] RDX: 0000000000000000 RSI: 0000000000600003 RDI: 0000000020000000 [ 212.145966][T12953] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 212.154120][T12953] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb55bb726d4 [ 212.162086][T12953] R13: 00000000004c5c85 R14: 00000000004da530 R15: 0000000000000003 21:08:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x0, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:25 executing program 4: bpf$PROG_LOAD(0x7, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:25 executing program 2: bpf$PROG_LOAD(0x6, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 21:08:25 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:08:25 executing program 3 (fault-call:2 fault-nth:1): madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 21:08:25 executing program 3: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) [ 212.500305][T12962] source parameter not specified 21:08:25 executing program 2: bpf$PROG_LOAD(0x7, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 21:08:25 executing program 4: bpf$PROG_LOAD(0x8, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:25 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:08:25 executing program 3: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600004, 0x0) [ 212.665412][T12976] source parameter not specified 21:08:25 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:08:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x0, 0x0) [ 212.797752][T12989] ceph: Bad value for 'source' 21:08:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x0, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:26 executing program 2: bpf$PROG_LOAD(0x8, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 21:08:26 executing program 4: bpf$PROG_LOAD(0x9, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:26 executing program 3: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x2) 21:08:26 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:08:26 executing program 2: bpf$PROG_LOAD(0x9, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 213.383137][T13000] ceph: Bad value for 'source' 21:08:26 executing program 3: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 21:08:26 executing program 4: bpf$PROG_LOAD(0xa, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:26 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:08:26 executing program 3: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x4) [ 213.560241][T13016] ceph: Bad value for 'source' 21:08:26 executing program 2: bpf$PROG_LOAD(0xa, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 21:08:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x0, 0x0) 21:08:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x0, &(0x7f0000000080)="11dca5055e0bcfe47bf070") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:27 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:08:27 executing program 4: bpf$PROG_LOAD(0xb, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:27 executing program 3: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x8) 21:08:27 executing program 2: bpf$PROG_LOAD(0xb, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 21:08:27 executing program 2: bpf$PROG_LOAD(0xc, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 21:08:27 executing program 3: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) [ 214.296076][T13042] ceph: Bad value for 'source' 21:08:27 executing program 4: bpf$PROG_LOAD(0xc, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:27 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:08:27 executing program 3: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0xa) 21:08:27 executing program 2: bpf$PROG_LOAD(0xd, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 214.452369][T13059] ceph: Bad value for 'source' 21:08:27 executing program 2: bpf$PROG_LOAD(0xe, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 21:08:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:28 executing program 4: bpf$PROG_LOAD(0xd, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:28 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:08:28 executing program 3: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0xb) 21:08:28 executing program 0: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x8) 21:08:28 executing program 2: bpf$PROG_LOAD(0xf, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 21:08:28 executing program 2: bpf$PROG_LOAD(0x10, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 21:08:28 executing program 4: bpf$PROG_LOAD(0xe, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:28 executing program 0 (fault-call:5 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) [ 215.172280][T13087] ceph: Bad value for 'source' 21:08:28 executing program 3: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0xc) 21:08:28 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:08:28 executing program 2: bpf$PROG_LOAD(0x11, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 215.368462][T13105] device name is missing path (no : separator in LÄ.Ú],) [ 215.368462][T13105] 21:08:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:29 executing program 4: bpf$PROG_LOAD(0xf, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:29 executing program 3: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0xd) 21:08:29 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:08:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 21:08:29 executing program 2: bpf$PROG_LOAD(0x12, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 215.994674][T13116] device name is missing path (no : separator in LÄ.Ú],) [ 215.994674][T13116] 21:08:29 executing program 4: bpf$PROG_LOAD(0x10, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:29 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:08:29 executing program 2: bpf$PROG_LOAD(0x13, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 21:08:29 executing program 3: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0xe) 21:08:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3ffffff00000002, 0x62, 0x0) [ 216.131814][T13130] device name is missing path (no : separator in LÄ.Ú],) [ 216.131814][T13130] 21:08:29 executing program 4: bpf$PROG_LOAD(0x11, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:30 executing program 2: bpf$PROG_LOAD(0x14, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 21:08:30 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:08:30 executing program 4: bpf$PROG_LOAD(0x12, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:30 executing program 3: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0xf) 21:08:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3ffffff00000003, 0x62, 0x0) 21:08:30 executing program 3: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x10) [ 216.913163][T13163] device name is missing path (no : separator in LÄ.Ú],0:E) [ 216.913163][T13163] 21:08:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3ffffff00000004, 0x62, 0x0) 21:08:30 executing program 2: bpf$PROG_LOAD(0x15, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 21:08:30 executing program 4: bpf$PROG_LOAD(0x13, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:30 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:08:30 executing program 2: bpf$PROG_LOAD(0x16, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 217.113837][T13187] device name is missing path (no : separator in LÄ.Ú],0:E) [ 217.113837][T13187] 21:08:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:30 executing program 3: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x11) 21:08:30 executing program 2: bpf$PROG_LOAD(0x18, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 21:08:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3ffffff00000005, 0x62, 0x0) 21:08:30 executing program 4: bpf$PROG_LOAD(0x14, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:30 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:08:31 executing program 3: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x12) 21:08:31 executing program 4: bpf$PROG_LOAD(0x15, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) [ 217.793143][T13199] device name is missing path (no : separator in LÄ.Ú],0:E) [ 217.793143][T13199] 21:08:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3ffffff00000006, 0x62, 0x0) 21:08:31 executing program 2: bpf$PROG_LOAD(0xc0, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 21:08:31 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a4530"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:08:31 executing program 3: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x13) [ 218.021096][T13224] device name is missing path (no : separator in LÄ.Ú],0:E0) [ 218.021096][T13224] 21:08:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:31 executing program 2: bpf$PROG_LOAD(0xf4240, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 21:08:31 executing program 4: bpf$PROG_LOAD(0x16, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3ffffff00000007, 0x62, 0x0) 21:08:31 executing program 3: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x14) 21:08:31 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a4530"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:08:31 executing program 2: bpf$PROG_LOAD(0xffffff85, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 21:08:31 executing program 3: madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="11") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 218.670332][T13242] device name is missing path (no : separator in LÄ.Ú],0:E0) [ 218.670332][T13242] 21:08:31 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3ffffff00000008, 0x62, 0x0) 21:08:32 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a4530"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 218.815760][T13257] page:ffffea0002173ec0 refcount:2 mapcount:1 mapping:ffff8880a642e699 index:0x20000 21:08:32 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 218.884769][T13257] anon [ 218.884790][T13257] flags: 0x1fffc0000080025(locked|uptodate|active|swapbacked) [ 218.909950][T13257] raw: 01fffc0000080025 dead000000000100 dead000000000122 ffff8880a642e699 [ 218.910370][T13269] device name is missing path (no : separator in LÄ.Ú],0:E0) [ 218.910370][T13269] [ 218.934079][T13257] raw: 0000000000020000 0000000000000000 0000000200000000 ffff888094b6ee40 [ 218.964667][T13257] page dumped because: VM_BUG_ON_PAGE(PageActive(page)) [ 218.985320][T13257] page->mem_cgroup:ffff888094b6ee40 [ 219.027977][T13257] ------------[ cut here ]------------ [ 219.033476][T13257] kernel BUG at mm/vmscan.c:1156! [ 219.060212][T13257] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 219.066365][T13257] CPU: 0 PID: 13257 Comm: syz-executor.3 Not tainted 5.3.0-rc2-next-20190801 #57 [ 219.075503][T13257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.078167][ T3879] kobject: 'loop5' (000000007e669df3): kobject_uevent_env [ 219.085691][T13257] RIP: 0010:shrink_page_list+0x2872/0x5430 [ 219.098604][T13257] Code: d9 ea ff ff e8 df 25 dd ff 4c 8d 6b ff e9 1c db ff ff e8 d1 25 dd ff 48 8b bd 10 ff ff ff 48 c7 c6 40 88 93 87 e8 0e 12 07 00 <0f> 0b e8 b7 25 dd ff be 08 00 00 00 4c 89 ef e8 fa f3 17 00 4c 89 [ 219.099862][ T3879] kobject: 'loop5' (000000007e669df3): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 219.118237][T13257] RSP: 0018:ffff88805afa7598 EFLAGS: 00010246 [ 219.118250][T13257] RAX: 0000000000040000 RBX: 0000000000000020 RCX: ffffc9000c594000 [ 219.118256][T13257] RDX: 0000000000040000 RSI: ffffffff819c1df7 RDI: ffffed100b5f4e97 [ 219.118263][T13257] RBP: ffff88805afa7730 R08: 0000000000000021 R09: ffffed1015d060d1 [ 219.118270][T13257] R10: ffffed1015d060d0 R11: ffff8880ae830687 R12: dffffc0000000000 [ 219.118280][T13257] R13: ffffea0002173ec0 R14: 0000000000000000 R15: ffffea0002173ec8 [ 219.118294][T13257] FS: 00007fb55bb72700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 219.118302][T13257] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 219.118309][T13257] CR2: 00000000024fae80 CR3: 000000009840e000 CR4: 00000000001406f0 [ 219.118318][T13257] Call Trace: [ 219.118347][T13257] ? lock_downgrade+0x920/0x920 [ 219.118369][T13257] ? page_evictable+0x3b0/0x3b0 [ 219.118389][T13257] ? update_curr+0x3de/0x8d0 [ 219.118416][T13257] ? __kasan_check_read+0x11/0x20 [ 219.220823][T13257] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 219.227078][T13257] reclaim_pages+0x3b8/0x8f0 [ 219.231739][T13257] ? finish_task_switch+0x147/0x720 [ 219.236956][T13257] ? reclaim_clean_pages_from_list+0xc80/0xc80 [ 219.243131][T13257] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 219.249400][T13257] ? lock_downgrade+0x920/0x920 [ 219.254281][T13257] ? __kasan_check_read+0x11/0x20 [ 219.259328][T13257] ? _raw_spin_unlock_irq+0x5e/0x90 [ 219.264564][T13257] ? __kasan_check_read+0x11/0x20 [ 219.269598][T13257] ? do_raw_spin_unlock+0x57/0x270 [ 219.274720][T13257] madvise_cold_or_pageout_pte_range+0x2264/0x2e20 [ 219.281243][T13257] ? swapin_walk_pmd_entry+0x670/0x670 [ 219.286706][T13257] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 219.292960][T13257] ? futex_wait_queue_me+0x3cc/0x590 [ 219.298262][T13257] ? swapin_walk_pmd_entry+0x670/0x670 [ 219.303731][T13257] __walk_page_range+0xd2a/0x1680 [ 219.308813][T13257] walk_page_range+0x1a6/0x3e0 [ 219.313631][T13257] madvise_pageout_page_range.isra.0+0xdd/0x120 [ 219.319919][T13257] ? madvise_cold+0x210/0x210 [ 219.324714][T13257] ? swapin_walk_pmd_entry+0x670/0x670 [ 219.330195][T13257] ? __kasan_check_write+0x14/0x20 [ 219.335345][T13257] madvise_pageout+0x227/0x3a0 [ 219.340207][T13257] ? madvise_pageout_page_range.isra.0+0x120/0x120 [ 219.346726][T13257] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 219.352979][T13257] ? vmacache_update+0x114/0x140 [ 219.357917][T13257] ? find_vma+0x30/0x170 [ 219.362276][T13257] __x64_sys_madvise+0x719/0x1500 [ 219.367418][T13257] ? madvise_free_pte_range+0x2580/0x2580 [ 219.373158][T13257] ? 0xffffffff81000000 [ 219.377341][T13257] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 219.383416][T13257] ? trace_hardirqs_off_caller+0x65/0x230 [ 219.389193][T13257] do_syscall_64+0xfa/0x760 [ 219.393718][T13257] ? do_syscall_64+0xfa/0x760 [ 219.398414][T13257] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 219.404712][T13257] RIP: 0033:0x459829 [ 219.408614][T13257] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 219.428687][T13257] RSP: 002b:00007fb55bb71c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 219.437117][T13257] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 219.445270][T13257] RDX: 0000000000000015 RSI: 0000000000600003 RDI: 0000000020000000 [ 219.453246][T13257] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 219.461321][T13257] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb55bb726d4 [ 219.469310][T13257] R13: 00000000004c5c85 R14: 00000000004da530 R15: 00000000ffffffff [ 219.477302][T13257] Modules linked in: [ 219.482691][T13257] ---[ end trace ea647097e6531d1f ]--- [ 219.488278][T13257] RIP: 0010:shrink_page_list+0x2872/0x5430 [ 219.494149][T13257] Code: d9 ea ff ff e8 df 25 dd ff 4c 8d 6b ff e9 1c db ff ff e8 d1 25 dd ff 48 8b bd 10 ff ff ff 48 c7 c6 40 88 93 87 e8 0e 12 07 00 <0f> 0b e8 b7 25 dd ff be 08 00 00 00 4c 89 ef e8 fa f3 17 00 4c 89 [ 219.514176][T13257] RSP: 0018:ffff88805afa7598 EFLAGS: 00010246 [ 219.520312][T13257] RAX: 0000000000040000 RBX: 0000000000000020 RCX: ffffc9000c594000 21:08:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)='\n', 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 21:08:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3ffffff00000009, 0x62, 0x0) 21:08:32 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x5, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 21:08:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x5, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 21:08:32 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], 0x0, &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 219.528349][T13257] RDX: 0000000000040000 RSI: ffffffff819c1df7 RDI: ffffed100b5f4e97 [ 219.536568][T13257] RBP: ffff88805afa7730 R08: 0000000000000021 R09: ffffed1015d060d1 21:08:32 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x7, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000070600000ee60000bf050000000000001f630000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 21:08:32 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="4cc42eda5d2c303a45303a"], 0x0, &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 219.576030][T13257] R10: ffffed1015d060d0 R11: ffff8880ae830687 R12: dffffc0000000000 [ 219.584164][ T3879] kobject: 'loop2' (00000000c5c47fac): kobject_uevent_env [ 219.584211][ T3879] kobject: 'loop2' (00000000c5c47fac): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 219.636713][T13257] R13: ffffea0002173ec0 R14: 0000000000000000 R15: ffffea0002173ec8 [ 219.663121][ T3879] kobject: 'loop1' (00000000a9d881ee): kobject_uevent_env [ 219.672483][T13257] FS: 00007fb55bb72700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 219.688273][T13257] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 219.705660][ T3879] kobject: 'loop1' (00000000a9d881ee): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 219.716229][T13257] CR2: 0000000000625208 CR3: 000000009840e000 CR4: 00000000001406f0 [ 219.726012][ T3879] kobject: 'loop5' (000000007e669df3): kobject_uevent_env [ 219.733279][T13257] Kernel panic - not syncing: Fatal exception [ 219.740420][T13257] Kernel Offset: disabled [ 219.744762][T13257] Rebooting in 86400 seconds..