324f794a40177ca3c3dbf687d311a40490e800ee93a73ad4377eacefdb0d448692310d81e8ccf414ece50314b5cf11f9f95a10b683ca6e59ec90aee5b042e8a1e59dad5b7763219dc44fd2d27dd63babd9806b7500c40d45f077b1c9f70d6d2e0025dceab8430e8782fb4b75e997c6224a2e8eff466705d0da6a93a2275b0e4cf1ffe6e760a7328f51d41aa1fdf161a27dae2cadf5c00631368918c3d34a97d0b9f262a6bb026806b6a17d29103b1493ba9fe35d4ad32fb5c76f848b6d44f46c75702395eda67468544120553a1ba7e3c096d9d460ce085fee535bc5e9201f9526f84d34cf9c1fc30232e11b226ddfbef3bdd7c38feb3c9668d03d586d6361bcf43b9bf1ef7cafaa2c77ec587a4568de8a70fa9134d9436172efbda1144e40a45defa12c753aa64baa7b2530c3431954da81327433d89e874c26969ab6f5b34ff227039373b81b1d736ddcdaa6384118b72eb52b0b21c14652eae8c0e99e066e3f566c0f55d8099456e5303d303654f298d702985ceeb8d44f445b9dfb0b86708aade8640830d940d1f1974d26bd5815e4b21983bbf81345ff41c60b74d12fc92b93db84d0ea62bb1edb93d48db1f48f9af15188a49a3bc6464f3264a93186f6caef0ea3f7fd8a9d88e1c419612c18479619aed67aff0f537acff6e76fcb9939fe39fc072a7e008fd2f3aa88bf08bfbbaeb7d9b10964b284e9226565c57d533b6a37c55247902b95198c0550e95f5cb124b240f395a1b811fff11b2a1f91cc1b82bd5e0c7f1dc83887b606a558144f0839ee0960f793941e0626034ac77bec58e7e1ba82c37840d45a3f86e0c9fa4fb0c5f5f25eb95304d50060725f2e95a283682079054287c595124972bbd29d92975630450fb690ac411303d50b4a84bce7339658fb5540f3a5c95259115d0cf58fdaab547c3e669ab5e170d757800f5f3da3820d90e6dd95d785c22433e1b07d09599708ec58ee205322d0a59ae1fad004b567ec09cbb321cec181c51c0c6f63c12559de450b0dde64f81c83eb747f791a478d010f7dbd7e61378561e4d8c17e06d81ad7e1c720af3708ebb77dd356e969ae115e94c3617b7936565b85a0da011ddb4d8510357745e2f49e177295ddcbc22148483eaa0a0a0c6320465535c7858ca25c81ceda877db68be37bffc577b966007722c90d17569650e74135a8972ad016bfb53a6e000eb9a48797f4442ba743fc61f7e1db58fd214cfcb8ec9487742d0462c1bdde95e93884dfea970a1331e077076cba3a5cec46cc4844a85e53d99778661a9cc3f3d84fcc5fed0017004cf7a6de3ed83449740e13ce5b8d9fd128166c68bd18c2a823e8c27e830dc1e82ebc5fc5966ec462728748530dd5d136ed78dbc7f038f8849761032d1fb02792effe7f0dbdd675d44ea0569f59ba98dc855dcc5100cd0790f36db30d80d6c6089aa9aab3afb8cc39dbce12acb0453fc7d6746b0f9a032eff37b1c868caf4b727d0cbfcd9e18d0db004cec4c8b788aebe1561ebd01ec32db96d74cc5a07a620cef173c69e53ac4cdb0740aa367c3b088533681dea382c3dcf9c4fc8c65d06a30bc29507ec11fcca99a51845a9d87143a0dcdbf64d558d93837afd126816d88e50a2f6ea626f30db96ce70fe8b8542bb492b7bde8068545dde7ae27cdf830c143abcb18922f8ee0514d8327f5340b70a56c112eda93ce82b391e847e961d7a1332648036e56e0f90884d3632453a659b648f74fc94c54d0f60a3959b1d6e485a9e2e211f34b35589ec2a50c35c3e6ccd2d12ba99d379ec4d109a30212df6d9b9f81a28efd9f1f7aa9d78893fd73172973301e430b3aff8a6fc8d0e9eb847a2301fdc9bec570955c640bdf9438d84c7642ae8f615db2efc8adc150cdb58b43bf817d86ceeecdf9c80ac1aa50a3e4ed0679ed5d98e9e702adcfc12103c61b44f81e1fed1797c7f0b9da938c296144bfde0a4199dd29cfc4764107c99b65d2c7e4f1f730e144e7c0f979d8fde1d68cd5c9003ed45437c3149b8494d5a546a8b5aca64bf3bf30149757bb464cbd9be053ba34f0ad3713e6d66ee13ce7cba074784d2a19abd74d59b0841286a6b813772a1f1976f78e308934c9589c0c2062cdc3488dd55067c595f0fa9ebb76fddefb5bcac3425969729d18759623be6b0a06c457d1a14c998d8abbe35c11eadfe7cab86bae20e8691ace2b4afce863af7c2e5035ab5ff51a9d712645b2983c5519c9e18e92d88a853dc9ff1da5db1c116534dbc6a54196803d3b1a4d0d98c7b9c25034d187d7594bdffa9e72d8409dda29b1504e90238708d3e574c54a8ba34cceca6e407686669e1038fae0ac56af13b51190315c1601677c41a0a0778df41627dd5cb3c64715ede330199b905125c38250eee2b9187a3e397187e24cf99f780c0a583dffddccd162b2d773507f43d8226c4a84775d412cf833b37f0933c142692889b35af8d80fada632e9bcc158cc3a8000102948e49db52396ee363facf4d9b7f877db4492386e4bdacde14de343f60fbd9e758e5bec98007d69c2194bb39f15766ac4e2cf262d5c0c6e744558d440be6cec91f62456c0fbc734cecf4b88022288077ea2aebf67f2411d50ebf1ee2cfd4f8b7075e97ed072229ee04ae751d54c01ad97d1ea33b8dcffeb57b09bda9930ecd4522a6556ebff75484960d49b4e40dac47eae679342d26fe48d1a758fd048ee703e3f442b0ea6945eec8beae8ec0288d2dfeb785e1a6c094e62c75aa9a16a9cdd304c1504bbdcf8245d3aa1c8a7705767cf16b164263c1e56a36dfc65935102775cedf46499536bb207dda8a51ce14b55c5113a", 0x1000}, {&(0x7f00000010c0)="14310d7aaa8ad91cf66d9fabc1baa32e59104a014ffe9d1b60cabf1b830be5f29c8e639fc3ce", 0x26, 0xffffffffffff0000}, {&(0x7f0000001100)="244ac9f18f23c56ed36e6f5fa6a9e5ec271763a1836fb91d7fdee01ff41afe6c4b6bde8563888555e0f4c41fd1daf0ad55c66b15dcce0a735457ece0d8c7e8d0e987c812cecade5c1be8e8b8c29fb5f2589aa4d24ee46a77bd73bf5cfc429082a5529b9af53b93802516497130ad1050c99e76852373c904046918217cca", 0x7e, 0xc9}], 0x100488, 0x0) [ 1124.758358] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 19:48:14 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) [ 1124.838274] Error parsing options; rc = [-22] 19:48:14 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r0) dup(r0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 1124.879947] ptrace attach of "/root/syz-executor.4"[28886] was attempted by "/root/syz-executor.4"[28887] 19:48:15 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c08e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:48:15 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:15 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = getpid() ptrace(0x1d, r0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='ecryptfs\x00', 0x0, &(0x7f000000a000)) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x1}], 0x100488, 0x0) [ 1125.235368] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1125.302012] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1125.304819] Error parsing options; rc = [-22] [ 1125.363618] Error parsing options; rc = [-22] 19:48:15 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0x0) recvfrom(r1, &(0x7f0000000000)=""/42, 0x2a, 0x2, &(0x7f0000000040)=@generic={0x28, "c32f7d3ba3fc7aefab227b4b4e04c2164842c78249acf3b49cce804280d81b2d3fc432e586af0a00ea6a4da2222df66beb2ddbc6bdf5763362348a667eebfbde02c65b4c8a7720bc00dd33a222ee1105d6112f5124110eda7a0e7ca0220e804809e238b761df1ec8e4bccd9a13ee2442028b4ddbebd1f3f70a50d361e68b"}, 0x80) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='ecryptfs\x00', 0x0, &(0x7f000000a000)) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r2) r3 = dup(0xffffffffffffffff) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0x0) 19:48:15 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:48:15 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r0) dup(r0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 19:48:15 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) socket$inet6(0xa, 0x2, 0x0) ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:15 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000000)=[@in6={0xa, 0x4e20, 0x3ff, @private2, 0x77}, @in={0x2, 0x4e24, @rand_addr=0x64010102}, @in6={0xa, 0x4e22, 0x80000001, @private0={0xfc, 0x0, [], 0x1}, 0x96}, @in6={0xa, 0x4e23, 0xfffffffe, @mcast1, 0x1}, @in6={0xa, 0x4e21, 0x9, @remote, 0x6}, @in={0x2, 0x4e21, @empty}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x33}}, @in6={0xa, 0x4e21, 0x3, @private2={0xfc, 0x2, [], 0x1}, 0x6e7}], 0xbc) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='ecryptfs\x00', 0x0, &(0x7f000000a000)) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) [ 1125.488637] ptrace attach of "/root/syz-executor.4"[28938] was attempted by "/root/syz-executor.4"[28940] [ 1125.524903] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 19:48:15 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1125.536816] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 19:48:15 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) socket$inet6(0xa, 0x2, 0x0) ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) [ 1125.598678] Error parsing options; rc = [-22] [ 1125.628157] Error parsing options; rc = [-22] 19:48:15 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x111000, 0x0) ioctl$KVM_GET_IRQCHIP(r0, 0xc208ae62, &(0x7f0000000800)) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ecryptfs\x00', 0x0, &(0x7f000000a000)) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 19:48:15 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r0) dup(r0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 1125.789282] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1125.869831] Error parsing options; rc = [-22] 19:48:15 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c0be7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:48:15 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) socket$inet6(0xa, 0x2, 0x0) ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:15 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:48:16 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0x0) recvfrom(r1, &(0x7f0000000000)=""/42, 0x2a, 0x2, &(0x7f0000000040)=@generic={0x28, "c32f7d3ba3fc7aefab227b4b4e04c2164842c78249acf3b49cce804280d81b2d3fc432e586af0a00ea6a4da2222df66beb2ddbc6bdf5763362348a667eebfbde02c65b4c8a7720bc00dd33a222ee1105d6112f5124110eda7a0e7ca0220e804809e238b761df1ec8e4bccd9a13ee2442028b4ddbebd1f3f70a50d361e68b"}, 0x80) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='ecryptfs\x00', 0x0, &(0x7f000000a000)) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r2) dup(0xffffffffffffffff) 19:48:16 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) ioctl$DRM_IOCTL_INFO_BUFS(r1, 0xc0106418, &(0x7f0000000100)={0x3, 0xb8, 0x81, 0x22f7, 0x1, 0x1ff}) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='ecryptfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000000)=@nullb='/dev/nullb0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='v7\x00', 0x108080, &(0x7f00000000c0)='ecryptfs\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 19:48:16 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:16 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r0) dup(r0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 19:48:16 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1126.248478] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 19:48:16 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) [ 1126.307584] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1126.307591] Error parsing options; rc = [-22] [ 1126.320887] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 19:48:16 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000040)='ecryptfs\x00', 0x4000, &(0x7f0000000000)='\t\x00\x00\x00\x9f\'ji\xb0\xc1\xeb\xd7\xe7OLK\xdb\xc4\x91G\xba_\xcc\xca\x1f\a\xf4 \x14\f0\x04[\xfd\xfe\x8a@\xa8F\x8e\xdbX\b\b\xbd\xbf\xca\x9c\xa1\xfdSV\x00\x00\x00\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000800)="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", 0x29b, 0x1}], 0x100488, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0x0) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x0, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={'rose', 0x0}, 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5, 0x7, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) [ 1126.377450] Error parsing options; rc = [-22] [ 1126.424477] Error parsing options; rc = [-22] 19:48:16 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r0) dup(r0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:48:16 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1126.547090] ecryptfs_parse_options: eCryptfs: unrecognized option [ ] [ 1126.586548] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1126.617650] ecryptfs_parse_options: eCryptfs: unrecognized option [ ] [ 1126.642246] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 19:48:16 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c0ee7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:48:16 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:16 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1126.663775] Error parsing options; rc = [-22] [ 1126.707119] Error parsing options; rc = [-22] 19:48:16 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0x0) recvfrom(r1, &(0x7f0000000000)=""/42, 0x2a, 0x2, &(0x7f0000000040)=@generic={0x28, "c32f7d3ba3fc7aefab227b4b4e04c2164842c78249acf3b49cce804280d81b2d3fc432e586af0a00ea6a4da2222df66beb2ddbc6bdf5763362348a667eebfbde02c65b4c8a7720bc00dd33a222ee1105d6112f5124110eda7a0e7ca0220e804809e238b761df1ec8e4bccd9a13ee2442028b4ddbebd1f3f70a50d361e68b"}, 0x80) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='ecryptfs\x00', 0x0, &(0x7f000000a000)) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r2) 19:48:16 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r0) dup(r0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:48:16 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:48:16 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='ecryptfs\x00', 0x0, &(0x7f000000a000)) syz_mount_image$ext4(0x0, 0x0, 0x400, 0x0, &(0x7f00000007c0), 0x1004c8, 0x0) 19:48:16 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:16 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:48:16 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) [ 1126.974443] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1126.997975] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 19:48:16 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r0) dup(r0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 1127.023362] Error parsing options; rc = [-22] [ 1127.054871] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1127.075198] Error parsing options; rc = [-22] [ 1127.095752] Error parsing options; rc = [-22] 19:48:17 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:17 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c0fe7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:48:17 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 19:48:17 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='ecryptfs\x00', 0x0, &(0x7f000000a000)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0xfff7, 0x6, 0x4, 0x5}, {0xc991, 0x7, 0x2, 0x10000}, {0x257d, 0x5, 0xf9, 0x400}, {0xffff, 0x0, 0x1f, 0x4}]}, 0x10) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x4000, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@debug={'debug', 0x3d, 0x5}}, {@cachetag={'cachetag', 0x3d, '&ppp0vmnet1}'}}, {@nodevmap='nodevmap'}, {@noextend='noextend'}, {@cache_loose='cache=loose'}, {@afid={'afid', 0x3d, 0x3}}, {@cache_fscache='cache=fscache'}, {@afid={'afid', 0x3d, 0x200}}], [{@fowner_eq={'fowner', 0x3d, r4}}, {@obj_user={'obj_user', 0x3d, 'ecryptfs\x00'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@smackfsdef={'smackfsdef', 0x3d, 'procvmnet1'}}, {@appraise_type='appraise_type=imasig'}, {@subj_role={'subj_role'}}, {@obj_role={'obj_role', 0x3d, 'ecryptfs\x00'}}, {@permit_directio='permit_directio'}]}}) r5 = dup(r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r5, 0x10e, 0x1, 0x0, 0x0) ftruncate(r5, 0x9) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f00000001c0)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x3}], 0x180488, 0x0) [ 1127.305686] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1127.331272] Error parsing options; rc = [-22] 19:48:17 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0x0) recvfrom(r1, &(0x7f0000000000)=""/42, 0x2a, 0x2, &(0x7f0000000040)=@generic={0x28, "c32f7d3ba3fc7aefab227b4b4e04c2164842c78249acf3b49cce804280d81b2d3fc432e586af0a00ea6a4da2222df66beb2ddbc6bdf5763362348a667eebfbde02c65b4c8a7720bc00dd33a222ee1105d6112f5124110eda7a0e7ca0220e804809e238b761df1ec8e4bccd9a13ee2442028b4ddbebd1f3f70a50d361e68b"}, 0x80) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='ecryptfs\x00', 0x0, &(0x7f000000a000)) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) syz_init_net_socket$ax25(0x3, 0x2, 0x0) 19:48:17 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000380)=""/230) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:17 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='ecryptfs\x00', 0x0, &(0x7f000000a000)) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="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", 0xff, 0x76c}], 0x12008b5, &(0x7f00000000c0)=ANY=[@ANYBLOB="7374617466a85f7175616e74756d3d30783030303030303030301b3030303034302c6e6f646973636172642c736d61636b66736861743d6563727970746673002c00"]) syz_mount_image$ext4(0x0, 0x0, 0x40000000000000, 0x1, &(0x7f00000004c0)=[{&(0x7f0000000400)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x9f, 0x8}, {&(0x7f00000002c0)="ffb90c20da5de4370d989995ac84c351599f596eb0a400c76cf1f539f5b66ae8c3357b985ea955794de52ddee28987cbca3c8b9d2cd56823249967423be4e3872f44175cef701e7184a9c928c840f50c38ccfc878b4984a09b8627ce8fe79ae22f9f23dc2f8de8514f1679a872263daade84ea7c7f688ebf"}, {&(0x7f0000000340)="440c37a941890be94a1408843f676742050000001b655da96bde5ef52ee27e0b6e2d11f0cfec8b25c94d844a9a06b860702353c9b364ae34045bb3c3eda2c444fdb3c260cc22f617befb5c1e23b8473bf5d88901c9", 0x0, 0x100}], 0x211e488, 0x0) 19:48:17 executing program 5: syz_init_net_socket$ax25(0x3, 0x2, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 1127.475415] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1127.486001] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 19:48:17 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000380)=""/230) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) [ 1127.537197] Error parsing options; rc = [-22] [ 1127.555909] Error parsing options; rc = [-22] 19:48:19 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:48:19 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000380)=""/230) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:19 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:48:19 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c10e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:48:19 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') geteuid() sendmsg$NL80211_CMD_REQ_SET_REG(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000140)=ANY=[@ANYBLOB, @ANYRES16=r3, @ANYBLOB="010000000000151300001b00000008009a000000f486440c100631084f26420000"], 0x3}}, 0x0) sendmsg$NL80211_CMD_DEL_INTERFACE(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="08002dbd7000fcdbdf25080000008787b4080005000a0000000c0099006c00000000000000080005f70200000008001f00080000005538422b388dd01ea925c4b986b9bea10d1867e46f421cec7d7ef8982c2d07de71d61741a54c3a40000000000000004f72496b6b715061f049f07cf17216dfd8308f0fb70da9a9fbd9b71f4f2d7683da12"], 0x38}, 0x1, 0x0, 0x0, 0x4000881}, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ATOMIC(r1, 0xc03864bc, &(0x7f00000001c0)={0x201, 0x5, &(0x7f0000000040)=[0x7fff, 0x3ff, 0x2, 0xf8000000, 0x8], &(0x7f0000000080)=[0x3000, 0x4, 0x6], &(0x7f00000000c0)=[0x7, 0x4], &(0x7f0000000100), 0x0, 0x9}) ioctl$SG_SET_RESERVED_SIZE(r1, 0x2275, &(0x7f0000000000)=0x80000000) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x80000001) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='ecryptfs\x00', 0x0, &(0x7f000000a000)) r4 = dup(0xffffffffffffffff) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)={0x34, r6, 0x1, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}}, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r4, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x30, r6, 0x200, 0x70bd2d, 0x25dfdbfb, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x2090}, 0x8000) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 19:48:19 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0x0) recvfrom(r1, &(0x7f0000000000)=""/42, 0x2a, 0x2, &(0x7f0000000040)=@generic={0x28, "c32f7d3ba3fc7aefab227b4b4e04c2164842c78249acf3b49cce804280d81b2d3fc432e586af0a00ea6a4da2222df66beb2ddbc6bdf5763362348a667eebfbde02c65b4c8a7720bc00dd33a222ee1105d6112f5124110eda7a0e7ca0220e804809e238b761df1ec8e4bccd9a13ee2442028b4ddbebd1f3f70a50d361e68b"}, 0x80) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='ecryptfs\x00', 0x0, &(0x7f000000a000)) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 19:48:20 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/230) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) [ 1130.062260] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1130.073303] Enabling of bearer rejected, failed to enable media [ 1130.091082] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1130.099877] Error parsing options; rc = [-22] 19:48:20 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 1130.161600] Error parsing options; rc = [-22] 19:48:20 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/230) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) [ 1130.184919] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1130.212697] Error parsing options; rc = [-22] 19:48:20 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:48:20 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='ecryptfs\x00', 0x0, &(0x7f0000000000)='\xb1\x1f\\I%\x80imw\x94\x100r\'\xf8\x9dg\xbe\xa7\xed\xa9\xe6\xa5c\x82K\xaci76\xa9y?+\x91*\xe9\xf7 \x9f\x1b\xaf\xdc^\xdc?\xd2\xbf\xf5<\xed\x7f\xcbz\x9e\xaf\x01\x1f\xb9\x8801\xabYr\x10\xf6\b6\xfb\x9c\xa3\x87\xf4\xbe{\xee/f]\xa1\xa1\xe1\xeb\xc4x\x00\xeda\\\x9f{R\x10\x1c\xb5\x19U\xd2\xf2\x961\xaaT\xad\x89m\xbd\x19\xfc\xc1\xf3\x83\x13r\xc2\a\xadn\x84\xf2{\n\xa9\x9a1N\xe4B[\xf3hnQq\xdaa\x16\xef\xaa\x81/W_\x8b\x9d\x82t\x8aY\xfa\xe8p\xde\xec\xad{\x1a\x106_\x1b_\x11.o\x92w}\xe6\xdb\xd6\xeb') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 19:48:20 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/230) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) [ 1130.392038] ecryptfs_parse_options: eCryptfs: unrecognized option [±\I%€imw”0r'øg¾§í©æ¥c‚K¬i76©y?+‘*é÷ Ÿ¯Ü^Ü?Ò¿õ<íËzž¯¹ˆ01«Yrö6ûœ£‡ô¾{î/f]¡¡áëÄx] [ 1130.448168] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1130.496795] Error parsing options; rc = [-22] 19:48:22 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:48:22 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:48:22 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:22 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='ecryptfs\x00', 0x0, &(0x7f000000a000)) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x2, 0x3, &(0x7f0000000200)=[{&(0x7f0000000800)="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", 0x1000, 0xd8}, {&(0x7f0000000080)="a71a2e2554111a5d31c9d60d1af7d650a52d35f87e3d71ff26fc65eed570ac0ae90c08b372d274d523d14685114990173f2cef4009c2ecd35e32f8cf3388acf4441e5dcdac65727f7459cdcebed6ac695a6a329f7216b3de8f29d4fd2707ad4e3ed39e19995493609af0f18aa31f635d578d4e7f6c23253ceb91c2f85beaaa1507d446023114b57bb6a74769c3d7b3eedd79275d4ed58d9e9fe6a112235d311c6c8f79d35906936d61d89478a6f6261efab36170b731fac1f93ee16b0dafb4", 0xbf, 0xb9a}, {&(0x7f00000001c0)="b98c32fcfc32fea9aeb9658a7152593c4af1e219aecb431bd33c36c790f928e5433191869877e0", 0x27, 0x20}], 0x211800, &(0x7f0000000280)={[{@lazytime='lazytime'}, {@errors_continue='errors=continue'}, {@auto_da_alloc='auto_da_alloc'}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@dont_measure='dont_measure'}]}) 19:48:22 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c14e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:48:22 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0x0) recvfrom(r1, &(0x7f0000000000)=""/42, 0x2a, 0x2, &(0x7f0000000040)=@generic={0x28, "c32f7d3ba3fc7aefab227b4b4e04c2164842c78249acf3b49cce804280d81b2d3fc432e586af0a00ea6a4da2222df66beb2ddbc6bdf5763362348a667eebfbde02c65b4c8a7720bc00dd33a222ee1105d6112f5124110eda7a0e7ca0220e804809e238b761df1ec8e4bccd9a13ee2442028b4ddbebd1f3f70a50d361e68b"}, 0x80) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='ecryptfs\x00', 0x0, &(0x7f000000a000)) 19:48:23 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) [ 1133.085769] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 19:48:23 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 1133.131843] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1133.137592] Error parsing options; rc = [-22] 19:48:23 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0x0) recvfrom(r1, &(0x7f0000000000)=""/42, 0x2a, 0x2, &(0x7f0000000040)=@generic={0x28, "c32f7d3ba3fc7aefab227b4b4e04c2164842c78249acf3b49cce804280d81b2d3fc432e586af0a00ea6a4da2222df66beb2ddbc6bdf5763362348a667eebfbde02c65b4c8a7720bc00dd33a222ee1105d6112f5124110eda7a0e7ca0220e804809e238b761df1ec8e4bccd9a13ee2442028b4ddbebd1f3f70a50d361e68b"}, 0x80) [ 1133.197946] Error parsing options; rc = [-22] [ 1133.212343] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 19:48:23 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 1133.266731] Error parsing options; rc = [-22] 19:48:23 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:23 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x195005505, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='ecryptfs\x00', 0x0, &(0x7f000000a000)) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c5431e000087442754e6c815", 0x94, 0x1}], 0x100488, 0x0) [ 1133.499929] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1133.524418] Error parsing options; rc = [-22] 19:48:25 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:48:25 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, &(0x7f0000000000)=""/42, 0x2a, 0x2, &(0x7f0000000040)=@generic={0x28, "c32f7d3ba3fc7aefab227b4b4e04c2164842c78249acf3b49cce804280d81b2d3fc432e586af0a00ea6a4da2222df66beb2ddbc6bdf5763362348a667eebfbde02c65b4c8a7720bc00dd33a222ee1105d6112f5124110eda7a0e7ca0220e804809e238b761df1ec8e4bccd9a13ee2442028b4ddbebd1f3f70a50d361e68b"}, 0x80) 19:48:25 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:25 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:48:25 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c25e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:48:25 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='ecryptfs\x00', 0x0, &(0x7f000000a000)) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0x0) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0x0) setsockopt$inet_mreq(r1, 0x0, 0x23, &(0x7f0000000080)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) getsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000000), &(0x7f0000000040)=0x4) 19:48:26 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 1136.127179] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 19:48:26 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_init_net_socket$ax25(0x3, 0x2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000000)=""/42, 0x2a, 0x2, &(0x7f0000000040)=@generic={0x28, "c32f7d3ba3fc7aefab227b4b4e04c2164842c78249acf3b49cce804280d81b2d3fc432e586af0a00ea6a4da2222df66beb2ddbc6bdf5763362348a667eebfbde02c65b4c8a7720bc00dd33a222ee1105d6112f5124110eda7a0e7ca0220e804809e238b761df1ec8e4bccd9a13ee2442028b4ddbebd1f3f70a50d361e68b"}, 0x80) 19:48:26 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) [ 1136.210267] Error parsing options; rc = [-22] 19:48:26 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_init_net_socket$ax25(0x3, 0x2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000000)=""/42, 0x2a, 0x2, &(0x7f0000000040)=@generic={0x28, "c32f7d3ba3fc7aefab227b4b4e04c2164842c78249acf3b49cce804280d81b2d3fc432e586af0a00ea6a4da2222df66beb2ddbc6bdf5763362348a667eebfbde02c65b4c8a7720bc00dd33a222ee1105d6112f5124110eda7a0e7ca0220e804809e238b761df1ec8e4bccd9a13ee2442028b4ddbebd1f3f70a50d361e68b"}, 0x80) 19:48:26 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='ecryptfs\x00', 0x0, &(0x7f000000a000)) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x7) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0x0) setsockopt$inet_dccp_buf(r1, 0x21, 0xd, &(0x7f0000000000)="cb92ab4f1ac627dc523bf4d71228eda46fc4a69ac71cbf203fcc77256972d5cc908c48a50aac988e14c18eae726f45530c74a7793477b5e00372023b0d922201c174f87e4376954651747ee03194e243efa4772671f87aa41ea4b9a72c48d5c109330eb8b0fad71d32b8c959f3ca22d304b01f22453f2aefc65a28105e9c0ba9fd7785f93c71c6009cb95092c23b56c4ba6b55c061228bff8e6803e04fade04cac862efba6d9a5d5", 0xa8) [ 1136.254623] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1136.291502] Error parsing options; rc = [-22] 19:48:26 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_init_net_socket$ax25(0x3, 0x2, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000000)=""/42, 0x2a, 0x2, &(0x7f0000000040)=@generic={0x28, "c32f7d3ba3fc7aefab227b4b4e04c2164842c78249acf3b49cce804280d81b2d3fc432e586af0a00ea6a4da2222df66beb2ddbc6bdf5763362348a667eebfbde02c65b4c8a7720bc00dd33a222ee1105d6112f5124110eda7a0e7ca0220e804809e238b761df1ec8e4bccd9a13ee2442028b4ddbebd1f3f70a50d361e68b"}, 0x80) [ 1136.400976] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1136.502109] Error parsing options; rc = [-22] [ 1136.513300] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1136.539485] Error parsing options; rc = [-22] 19:48:29 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:48:29 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:29 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:48:29 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) recvfrom(r0, &(0x7f0000000000)=""/42, 0x2a, 0x2, &(0x7f0000000040)=@generic={0x28, "c32f7d3ba3fc7aefab227b4b4e04c2164842c78249acf3b49cce804280d81b2d3fc432e586af0a00ea6a4da2222df66beb2ddbc6bdf5763362348a667eebfbde02c65b4c8a7720bc00dd33a222ee1105d6112f5124110eda7a0e7ca0220e804809e238b761df1ec8e4bccd9a13ee2442028b4ddbebd1f3f70a50d361e68b"}, 0x80) 19:48:29 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='ecryptfs\x00', 0x0, &(0x7f000000a000)) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 19:48:29 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7227892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:48:29 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) recvfrom(r0, &(0x7f0000000000)=""/42, 0x2a, 0x2, &(0x7f0000000040)=@generic={0x28, "c32f7d3ba3fc7aefab227b4b4e04c2164842c78249acf3b49cce804280d81b2d3fc432e586af0a00ea6a4da2222df66beb2ddbc6bdf5763362348a667eebfbde02c65b4c8a7720bc00dd33a222ee1105d6112f5124110eda7a0e7ca0220e804809e238b761df1ec8e4bccd9a13ee2442028b4ddbebd1f3f70a50d361e68b"}, 0x80) [ 1139.183773] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1139.237743] Error parsing options; rc = [-22] 19:48:29 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:29 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) recvfrom(r0, &(0x7f0000000000)=""/42, 0x2a, 0x2, &(0x7f0000000040)=@generic={0x28, "c32f7d3ba3fc7aefab227b4b4e04c2164842c78249acf3b49cce804280d81b2d3fc432e586af0a00ea6a4da2222df66beb2ddbc6bdf5763362348a667eebfbde02c65b4c8a7720bc00dd33a222ee1105d6112f5124110eda7a0e7ca0220e804809e238b761df1ec8e4bccd9a13ee2442028b4ddbebd1f3f70a50d361e68b"}, 0x80) [ 1139.290256] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1139.346795] Error parsing options; rc = [-22] 19:48:29 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x18340, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x4}, 0x10) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='ecryptfs\x00', 0x0, &(0x7f000000a000)) syz_mount_image$ext4(0x0, 0x0, 0x1, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xcdf9ce52a2fcb826, 0x1}], 0x100488, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x20000, 0x0) ioctl$UI_DEV_DESTROY(r1, 0x5502) 19:48:29 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:48:29 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) [ 1139.533682] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1139.587773] Error parsing options; rc = [-22] [ 1139.617998] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1139.659342] Error parsing options; rc = [-22] 19:48:32 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:48:32 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, &(0x7f0000000000)=""/42, 0x2a, 0x2, &(0x7f0000000040)=@generic={0x28, "c32f7d3ba3fc7aefab227b4b4e04c2164842c78249acf3b49cce804280d81b2d3fc432e586af0a00ea6a4da2222df66beb2ddbc6bdf5763362348a667eebfbde02c65b4c8a7720bc00dd33a222ee1105d6112f5124110eda7a0e7ca0220e804809e238b761df1ec8e4bccd9a13ee2442028b4ddbebd1f3f70a50d361e68b"}, 0x80) 19:48:32 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:32 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e72c7892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:48:32 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='ocfs2\x00', 0x21800c, &(0x7f00000001c0)='\xc4\xec\x9clAp\x9e\x00\xce\x9a\xe1\xf0hm]\x18G\xd44\xf0\x14\x01O\xa0T\x80\x17^d|\xe6{\xaf\x1d\x8cQ\rt\x13\x8d\xfaH1FL\xe1gP\x14q\xddq\x11b\xfa5\xfa\xb8\xab\xea\x19\x84^\t\xa5\xf5]\xa5FQ/3m\xfe\xdf\xa4\x80\x89S\x94\xff\xfb\xaaQ\xbb-\x02%r\b\xab\xbf\x8f\x95\xb0m\xcc;#\xb8\xb4\xc9=\xe1\x94\x19\xc15b\xad?\xee\xb4LY\xb1\xd8J\xd0\xc8\x01\xc7\x907\x06\xf3\x8e\xa7\xaf\x1e') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x3}], 0x12043c, 0x0) 19:48:32 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:48:32 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='ecryptfs\x00', 0x0, &(0x7f000000a000)) 19:48:32 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:32 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1142.308654] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1142.346562] Error parsing options; rc = [-22] 19:48:32 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='ecryptfs\x00', 0x0, &(0x7f00000001c0)='\x00\x98x\xa2\xa0\xbe\xad\x1ee(\xc2\xd7\xaa\x1f7\xc4\x05l\xd6\x1c\x8e\xc4!\xfd@\xefTD\xd5q\v\x1a\xa5 k\x1e\xe5\x9d\xff\x14\xe2\xa5M$\xf5\f\xc4\x1bB\xd9\x8a\xc9d\xea\x17Q\x16\xc6\xa9\xfb\xf5\xf07\x86\xe6 =\x9c\n\xb7\x87\x9f(p\x89\xabb.?\xd9\x9e\xe5\x95\x95\"]zu\x85\x9f;q=\xc40{\x1ex\x8e\xe5\xe9t\xd5!\t\xca\xa6\x93)`om>C\x9f4\xe6\xd1\x9f\xb8\x968\xc3\xa8\xcb\x1bk\xc7LE\x8fds\xad\x8f*\xafZ\xeaT\x01\b\xab0\x8d\xc8R\xbewO\x94\xa9S\x17\xe1{;\x86d\xe0w\x17\xd3\xbd\xfe\x96\xc1\x8eo$\xbc\xc6>\x90\xaa\xa2\xc8\x16') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r4 = dup(r3) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f00000000c0)={0x8, 0x6, 0x4, 0x1000000, 0x80000000, {r1, r2/1000+60000}, {0x5, 0x1, 0x6, 0x1, 0x6, 0x8, "4254c51b"}, 0xd8f, 0x2, @userptr=0x7285, 0xffffffcb, 0x0, r4}) recvmsg$can_raw(r5, &(0x7f00000006c0)={&(0x7f0000000280)=@pppoe, 0x80, &(0x7f0000000640)=[{&(0x7f0000000300)=""/129, 0x81}, {&(0x7f0000000400)=""/226, 0xe2}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000000500)=""/17, 0x11}, {&(0x7f0000000540)=""/8, 0x8}], 0x5, &(0x7f0000001800)=""/4096, 0x1000}, 0x1) r6 = dup(r0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r6, 0x10e, 0x1, 0x0, 0x0) r7 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r7) fsync(r7) bind$ax25(r6, &(0x7f0000000000)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4}, [@bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) 19:48:32 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:32 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) [ 1142.471593] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1142.508333] Error parsing options; rc = [-22] [ 1142.555238] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1142.593706] Error parsing options; rc = [-22] 19:48:35 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:48:35 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:48:35 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e72e7892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:48:35 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:35 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='ecryptfs\x00', 0x0, &(0x7f000000a000)) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000000)=0x10, 0x4) 19:48:35 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, &(0x7f0000000000)=""/42, 0x2a, 0x2, &(0x7f0000000040)=@generic={0x28, "c32f7d3ba3fc7aefab227b4b4e04c2164842c78249acf3b49cce804280d81b2d3fc432e586af0a00ea6a4da2222df66beb2ddbc6bdf5763362348a667eebfbde02c65b4c8a7720bc00dd33a222ee1105d6112f5124110eda7a0e7ca0220e804809e238b761df1ec8e4bccd9a13ee2442028b4ddbebd1f3f70a50d361e68b"}, 0x80) 19:48:35 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) [ 1145.313604] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1145.349091] Error parsing options; rc = [-22] [ 1145.359249] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1145.387875] Error parsing options; rc = [-22] 19:48:35 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 19:48:35 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:35 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0x0) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0x0) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r4) r5 = fcntl$dupfd(r3, 0x406, r4) linkat(r1, &(0x7f0000000000)='./file0\x00', r5, &(0x7f0000000040)='./file0/file0\x00', 0x1c00) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='ecryptfs\x00', 0x0, &(0x7f000000a000)) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r6 = dup(0xffffffffffffffff) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r6, 0x10e, 0x1, 0x0, 0x0) r7 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r8 = dup(r7) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r8, 0x10e, 0x1, 0x0, 0x0) ioctl$NBD_SET_SOCK(r6, 0xab00, r8) 19:48:35 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:35 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e72f7892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) [ 1145.590162] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1145.647506] Error parsing options; rc = [-22] [ 1145.677410] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1145.728171] Error parsing options; rc = [-22] 19:48:38 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:48:38 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 19:48:38 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() setpgid(r0, 0x0) syz_open_procfs(r0, &(0x7f00000004c0)='net/dev_mcast\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps_rollup\x00') r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f0000000580)={0x5, 0x0, [{}, {}, {}, {}, {}]}) recvmmsg(r2, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f00000002c0)={0x2, 0x4, 0x4, 0x70000, 0x3, {0x77359400}, {0x5, 0x0, 0x1, 0x3, 0x5, 0x20, "fba22473"}, 0x40, 0x1, @offset=0x1d74, 0x3, 0x0, 0xffffffffffffffff}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r5, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4000000}]}, 0x1c}}, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(r3, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0xf0, r5, 0x1, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x80000000}]}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7fffffff}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x595e}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0xe}}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8001}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8001}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x2e21}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x40}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x555a}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffff}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xba6}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4e1d9638}]}, 0xf0}, 0x1, 0x0, 0x0, 0x24044000}, 0x20000801) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(r1, 0x80184151, &(0x7f0000000200)={0x0, &(0x7f00000000c0)="9402b54349d8dc8de0072d86162187a0d3d4d5d9b098bf62dceb4272e1fcbe0d4de0d808a51a41cd8e9c2334d78ad3275a9b96c83e988dfe16f8fa343cbc1088a1ff43531b459e6c7e79fabdf59cbd9618fcc3e189f7a9ae270d5f10e7e0e21f23dff0ffb140c6eac29a8b956f82505935a90d6ef335c350d29c093f0efab471e6d4d5e46fc60c4d56489f85f36e8363e435e79a59b01ea7fb1687cf92658cbc75e5249cbdc58c80141efed2a3b0f24368f57d829df9ad6e5fb54ff6199ef5bc9a929d0ebd734c370111adcd246f377eeba5b5958a317b1027958f6e06", 0xdd}) setsockopt$sock_int(r2, 0x1, 0x10, &(0x7f0000000540)=0x9, 0x4) 19:48:38 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7662292b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:48:38 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, &(0x7f0000000000)=""/42, 0x2a, 0x2, &(0x7f0000000040)=@generic={0x28, "c32f7d3ba3fc7aefab227b4b4e04c2164842c78249acf3b49cce804280d81b2d3fc432e586af0a00ea6a4da2222df66beb2ddbc6bdf5763362348a667eebfbde02c65b4c8a7720bc00dd33a222ee1105d6112f5124110eda7a0e7ca0220e804809e238b761df1ec8e4bccd9a13ee2442028b4ddbebd1f3f70a50d361e68b"}, 0x80) 19:48:38 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:38 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 19:48:38 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0x0) bind$unix(r1, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0x0) sendmsg$AUDIT_TRIM(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x10, 0x3f6, 0x4, 0x70bd2d, 0x25dfdbfc, "", ["", "", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x94403, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x49f, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps_rollup\x00') ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r3, 0x8983, &(0x7f0000000240)={0x0, 'ip_vti0\x00', {0x1}, 0x101}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) r4 = socket(0x10, 0x2, 0x0) write(r4, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) recvmmsg(r4, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) setsockopt$sock_int(r4, 0x1, 0x10, &(0x7f0000000540)=0x9, 0x4) r5 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r6 = dup(r5) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r6, 0x10e, 0x1, 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r6, 0x118, 0x1, &(0x7f0000000200)=0x7, 0x4) 19:48:38 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:38 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0x0) bind$unix(r1, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0x0) sendmsg$AUDIT_TRIM(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x10, 0x3f6, 0x4, 0x70bd2d, 0x25dfdbfc, "", ["", "", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x94403, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x49f, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps_rollup\x00') ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r3, 0x8983, &(0x7f0000000240)={0x0, 'ip_vti0\x00', {0x1}, 0x101}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) r4 = socket(0x10, 0x2, 0x0) write(r4, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) recvmmsg(r4, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) setsockopt$sock_int(r4, 0x1, 0x10, &(0x7f0000000540)=0x9, 0x4) r5 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r6 = dup(r5) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r6, 0x10e, 0x1, 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r6, 0x118, 0x1, &(0x7f0000000200)=0x7, 0x4) 19:48:38 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) 19:48:41 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:48:41 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:41 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7662c92b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:48:41 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) 19:48:41 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0x0) bind$unix(r1, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0x0) sendmsg$AUDIT_TRIM(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x10, 0x3f6, 0x4, 0x70bd2d, 0x25dfdbfc, "", ["", "", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x94403, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x49f, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps_rollup\x00') ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r3, 0x8983, &(0x7f0000000240)={0x0, 'ip_vti0\x00', {0x1}, 0x101}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) r4 = socket(0x10, 0x2, 0x0) write(r4, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) recvmmsg(r4, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) setsockopt$sock_int(r4, 0x1, 0x10, &(0x7f0000000540)=0x9, 0x4) r5 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r6 = dup(r5) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r6, 0x10e, 0x1, 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r6, 0x118, 0x1, &(0x7f0000000200)=0x7, 0x4) 19:48:41 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, &(0x7f0000000000)=""/42, 0x2a, 0x2, &(0x7f0000000040)=@generic={0x28, "c32f7d3ba3fc7aefab227b4b4e04c2164842c78249acf3b49cce804280d81b2d3fc432e586af0a00ea6a4da2222df66beb2ddbc6bdf5763362348a667eebfbde02c65b4c8a7720bc00dd33a222ee1105d6112f5124110eda7a0e7ca0220e804809e238b761df1ec8e4bccd9a13ee2442028b4ddbebd1f3f70a50d361e68b"}, 0x80) 19:48:41 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, &(0x7f0000000000)=""/42, 0x2a, 0x2, &(0x7f0000000040)=@generic={0x28, "c32f7d3ba3fc7aefab227b4b4e04c2164842c78249acf3b49cce804280d81b2d3fc432e586af0a00ea6a4da2222df66beb2ddbc6bdf5763362348a667eebfbde02c65b4c8a7720bc00dd33a222ee1105d6112f5124110eda7a0e7ca0220e804809e238b761df1ec8e4bccd9a13ee2442028b4ddbebd1f3f70a50d361e68b"}, 0x80) 19:48:41 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:41 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) 19:48:41 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='ecryptfs\x00', 0x0, &(0x7f000000a000)) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360b7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) 19:48:41 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494021f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:48:41 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) [ 1151.734704] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 1151.781097] Error parsing options; rc = [-22] 19:48:44 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:48:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps_rollup\x00') r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x800, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000040)={@local}, &(0x7f00000000c0)=0x14) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r2) ioctl$sock_SIOCADDRT(r2, 0x890b, &(0x7f0000000200)={0x0, @nl=@kern={0x10, 0x0, 0x0, 0x10000}, @ethernet={0x306, @dev={[], 0x15}}, @ax25={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x2}, 0x3f, 0x0, 0x0, 0x0, 0x7f, &(0x7f0000000180)='wg0\x00', 0x100000001, 0x2, 0x8}) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000540)=0x9, 0x4) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r4 = dup(r3) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, 0x0, 0x0) getsockopt$inet6_tcp_buf(r4, 0x6, 0xb, &(0x7f0000000100)=""/64, &(0x7f0000000140)=0x40) 19:48:44 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) fsetxattr$security_ima(r1, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@v1={0x2, "ee3a72273a7e5093da5532f7a034e3bd"}, 0x11, 0x2) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r5 = dup(r4) socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r7 = dup(r6) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r7, 0x10e, 0x1, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r7, 0x10e, 0x1, 0x0, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r5, 0x84, 0x16, &(0x7f0000000080)={0x2, [0x3ff, 0x0]}, 0x8) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:48:44 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:44 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494041f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:48:44 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, &(0x7f0000000000)=""/42, 0x2a, 0x2, &(0x7f0000000040)=@generic={0x28, "c32f7d3ba3fc7aefab227b4b4e04c2164842c78249acf3b49cce804280d81b2d3fc432e586af0a00ea6a4da2222df66beb2ddbc6bdf5763362348a667eebfbde02c65b4c8a7720bc00dd33a222ee1105d6112f5124110eda7a0e7ca0220e804809e238b761df1ec8e4bccd9a13ee2442028b4ddbebd1f3f70a50d361e68b"}, 0x80) 19:48:44 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:44 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) fsetxattr$security_ima(r1, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@v1={0x2, "ee3a72273a7e5093da5532f7a034e3bd"}, 0x11, 0x2) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r5 = dup(r4) socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r7 = dup(r6) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r7, 0x10e, 0x1, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r7, 0x10e, 0x1, 0x0, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r5, 0x84, 0x16, &(0x7f0000000080)={0x2, [0x3ff, 0x0]}, 0x8) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:48:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps_rollup\x00') r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000ec0, 0xec0, &(0x7f00000001c0)={0x77359400}) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000540)=0x9, 0x4) 19:48:44 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:44 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) fsetxattr$security_ima(r1, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@v1={0x2, "ee3a72273a7e5093da5532f7a034e3bd"}, 0x11, 0x2) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r5 = dup(r4) socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r7 = dup(r6) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r7, 0x10e, 0x1, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r7, 0x10e, 0x1, 0x0, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r5, 0x84, 0x16, &(0x7f0000000080)={0x2, [0x3ff, 0x0]}, 0x8) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:48:44 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) [ 1157.002069] NOHZ: local_softirq_pending 08 19:48:47 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:48:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps_rollup\x00') r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000e30, 0x2, &(0x7f00000001c0)={0x77359400}) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000540)=0x9, 0x4) 19:48:47 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) fsetxattr$security_ima(r1, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@v1={0x2, "ee3a72273a7e5093da5532f7a034e3bd"}, 0x11, 0x2) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r5 = dup(r4) socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r7 = dup(r6) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r7, 0x10e, 0x1, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r7, 0x10e, 0x1, 0x0, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r5, 0x84, 0x16, &(0x7f0000000080)={0x2, [0x3ff, 0x0]}, 0x8) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:48:47 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:47 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494051f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:48:47 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, &(0x7f0000000000)=""/42, 0x2a, 0x2, &(0x7f0000000040)=@generic={0x28, "c32f7d3ba3fc7aefab227b4b4e04c2164842c78249acf3b49cce804280d81b2d3fc432e586af0a00ea6a4da2222df66beb2ddbc6bdf5763362348a667eebfbde02c65b4c8a7720bc00dd33a222ee1105d6112f5124110eda7a0e7ca0220e804809e238b761df1ec8e4bccd9a13ee2442028b4ddbebd1f3f70a50d361e68b"}, 0x80) 19:48:47 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:47 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) fsetxattr$security_ima(r1, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@v1={0x2, "ee3a72273a7e5093da5532f7a034e3bd"}, 0x11, 0x2) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r5 = dup(r4) socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r7 = dup(r6) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r7, 0x10e, 0x1, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r7, 0x10e, 0x1, 0x0, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r5, 0x84, 0x16, &(0x7f0000000080)={0x2, [0x3ff, 0x0]}, 0x8) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:48:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps_rollup\x00') r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000e0c, 0x2, &(0x7f00000001c0)={0x77359400}) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000540)=0x9, 0x4) 19:48:47 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:47 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) fsetxattr$security_ima(r1, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@v1={0x2, "ee3a72273a7e5093da5532f7a034e3bd"}, 0x11, 0x2) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r5 = dup(r4) socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r7 = dup(r6) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r7, 0x10e, 0x1, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r7, 0x10e, 0x1, 0x0, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r5, 0x84, 0x16, &(0x7f0000000080)={0x2, [0x3ff, 0x0]}, 0x8) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:48:47 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494061f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) [ 1158.911837] NOHZ: local_softirq_pending 08 19:48:50 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:48:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps_rollup\x00') r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000e08, 0x2, &(0x7f00000001c0)={0x77359400}) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000540)=0x9, 0x4) 19:48:50 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:50 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) fsetxattr$security_ima(r1, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@v1={0x2, "ee3a72273a7e5093da5532f7a034e3bd"}, 0x11, 0x2) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r2) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r4 = dup(r3) socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r6 = dup(r5) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r6, 0x10e, 0x1, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r6, 0x10e, 0x1, 0x0, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r4, 0x84, 0x16, &(0x7f0000000080)={0x2, [0x3ff, 0x0]}, 0x8) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:48:50 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494071f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:48:50 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) r1 = dup(r0) recvfrom(r1, &(0x7f0000000000)=""/42, 0x2a, 0x2, &(0x7f0000000040)=@generic={0x28, "c32f7d3ba3fc7aefab227b4b4e04c2164842c78249acf3b49cce804280d81b2d3fc432e586af0a00ea6a4da2222df66beb2ddbc6bdf5763362348a667eebfbde02c65b4c8a7720bc00dd33a222ee1105d6112f5124110eda7a0e7ca0220e804809e238b761df1ec8e4bccd9a13ee2442028b4ddbebd1f3f70a50d361e68b"}, 0x80) 19:48:50 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:50 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) r1 = dup(r0) recvfrom(r1, &(0x7f0000000000)=""/42, 0x2a, 0x2, &(0x7f0000000040)=@generic={0x28, "c32f7d3ba3fc7aefab227b4b4e04c2164842c78249acf3b49cce804280d81b2d3fc432e586af0a00ea6a4da2222df66beb2ddbc6bdf5763362348a667eebfbde02c65b4c8a7720bc00dd33a222ee1105d6112f5124110eda7a0e7ca0220e804809e238b761df1ec8e4bccd9a13ee2442028b4ddbebd1f3f70a50d361e68b"}, 0x80) 19:48:50 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) fsetxattr$security_ima(r1, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@v1={0x2, "ee3a72273a7e5093da5532f7a034e3bd"}, 0x11, 0x2) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r2) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r4 = dup(r3) socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r6 = dup(r5) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r6, 0x10e, 0x1, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r6, 0x10e, 0x1, 0x0, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r4, 0x84, 0x16, &(0x7f0000000080)={0x2, [0x3ff, 0x0]}, 0x8) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:48:50 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) r1 = dup(r0) recvfrom(r1, &(0x7f0000000000)=""/42, 0x2a, 0x2, &(0x7f0000000040)=@generic={0x28, "c32f7d3ba3fc7aefab227b4b4e04c2164842c78249acf3b49cce804280d81b2d3fc432e586af0a00ea6a4da2222df66beb2ddbc6bdf5763362348a667eebfbde02c65b4c8a7720bc00dd33a222ee1105d6112f5124110eda7a0e7ca0220e804809e238b761df1ec8e4bccd9a13ee2442028b4ddbebd1f3f70a50d361e68b"}, 0x80) 19:48:50 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_init_net_socket$ax25(0x3, 0x2, 0x0) r0 = dup(0xffffffffffffffff) recvfrom(r0, &(0x7f0000000000)=""/42, 0x2a, 0x2, &(0x7f0000000040)=@generic={0x28, "c32f7d3ba3fc7aefab227b4b4e04c2164842c78249acf3b49cce804280d81b2d3fc432e586af0a00ea6a4da2222df66beb2ddbc6bdf5763362348a667eebfbde02c65b4c8a7720bc00dd33a222ee1105d6112f5124110eda7a0e7ca0220e804809e238b761df1ec8e4bccd9a13ee2442028b4ddbebd1f3f70a50d361e68b"}, 0x80) 19:48:50 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:53 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc33760036", 0xd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:48:53 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_init_net_socket$ax25(0x3, 0x2, 0x0) r0 = dup(0xffffffffffffffff) recvfrom(r0, &(0x7f0000000000)=""/42, 0x2a, 0x2, &(0x7f0000000040)=@generic={0x28, "c32f7d3ba3fc7aefab227b4b4e04c2164842c78249acf3b49cce804280d81b2d3fc432e586af0a00ea6a4da2222df66beb2ddbc6bdf5763362348a667eebfbde02c65b4c8a7720bc00dd33a222ee1105d6112f5124110eda7a0e7ca0220e804809e238b761df1ec8e4bccd9a13ee2442028b4ddbebd1f3f70a50d361e68b"}, 0x80) 19:48:53 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) fsetxattr$security_ima(r1, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@v1={0x2, "ee3a72273a7e5093da5532f7a034e3bd"}, 0x11, 0x2) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r2) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r4 = dup(r3) socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r6 = dup(r5) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r6, 0x10e, 0x1, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r6, 0x10e, 0x1, 0x0, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r4, 0x84, 0x16, &(0x7f0000000080)={0x2, [0x3ff, 0x0]}, 0x8) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:48:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps_rollup\x00') r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000dd4, 0x2, &(0x7f00000001c0)={0x77359400}) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000540)=0x9, 0x4) 19:48:53 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494081f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:48:53 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:53 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_init_net_socket$ax25(0x3, 0x2, 0x0) r0 = dup(0xffffffffffffffff) recvfrom(r0, &(0x7f0000000000)=""/42, 0x2a, 0x2, &(0x7f0000000040)=@generic={0x28, "c32f7d3ba3fc7aefab227b4b4e04c2164842c78249acf3b49cce804280d81b2d3fc432e586af0a00ea6a4da2222df66beb2ddbc6bdf5763362348a667eebfbde02c65b4c8a7720bc00dd33a222ee1105d6112f5124110eda7a0e7ca0220e804809e238b761df1ec8e4bccd9a13ee2442028b4ddbebd1f3f70a50d361e68b"}, 0x80) 19:48:53 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) fsetxattr$security_ima(r1, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@v1={0x2, "ee3a72273a7e5093da5532f7a034e3bd"}, 0x11, 0x2) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r4) socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r6 = dup(r5) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r6, 0x10e, 0x1, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r6, 0x10e, 0x1, 0x0, 0x0) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:48:53 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r0) recvfrom(0xffffffffffffffff, &(0x7f0000000000)=""/42, 0x2a, 0x2, &(0x7f0000000040)=@generic={0x28, "c32f7d3ba3fc7aefab227b4b4e04c2164842c78249acf3b49cce804280d81b2d3fc432e586af0a00ea6a4da2222df66beb2ddbc6bdf5763362348a667eebfbde02c65b4c8a7720bc00dd33a222ee1105d6112f5124110eda7a0e7ca0220e804809e238b761df1ec8e4bccd9a13ee2442028b4ddbebd1f3f70a50d361e68b"}, 0x80) 19:48:53 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:53 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r0) recvfrom(0xffffffffffffffff, &(0x7f0000000000)=""/42, 0x2a, 0x2, &(0x7f0000000040)=@generic={0x28, "c32f7d3ba3fc7aefab227b4b4e04c2164842c78249acf3b49cce804280d81b2d3fc432e586af0a00ea6a4da2222df66beb2ddbc6bdf5763362348a667eebfbde02c65b4c8a7720bc00dd33a222ee1105d6112f5124110eda7a0e7ca0220e804809e238b761df1ec8e4bccd9a13ee2442028b4ddbebd1f3f70a50d361e68b"}, 0x80) 19:48:53 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:56 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) fsetxattr$security_ima(r1, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@v1={0x2, "ee3a72273a7e5093da5532f7a034e3bd"}, 0x11, 0x2) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r4) socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r6 = dup(r5) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r6, 0x10e, 0x1, 0x0, 0x0) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:48:56 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc33760036", 0xd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:48:56 executing program 5 (fault-call:1 fault-nth:0): r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:48:56 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r0) recvfrom(0xffffffffffffffff, &(0x7f0000000000)=""/42, 0x2a, 0x2, &(0x7f0000000040)=@generic={0x28, "c32f7d3ba3fc7aefab227b4b4e04c2164842c78249acf3b49cce804280d81b2d3fc432e586af0a00ea6a4da2222df66beb2ddbc6bdf5763362348a667eebfbde02c65b4c8a7720bc00dd33a222ee1105d6112f5124110eda7a0e7ca0220e804809e238b761df1ec8e4bccd9a13ee2442028b4ddbebd1f3f70a50d361e68b"}, 0x80) 19:48:56 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:56 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494091f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) [ 1166.625490] FAULT_INJECTION: forcing a failure. [ 1166.625490] name failslab, interval 1, probability 0, space 0, times 0 [ 1166.655998] CPU: 0 PID: 29851 Comm: syz-executor.5 Not tainted 4.19.121-syzkaller #0 [ 1166.663903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1166.673254] Call Trace: [ 1166.675859] dump_stack+0x188/0x20d [ 1166.679505] should_fail.cold+0xa/0x1b [ 1166.683414] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1166.688538] __should_failslab+0x115/0x180 [ 1166.692784] should_failslab+0x5/0xf [ 1166.696503] kmem_cache_alloc_node+0x55/0x730 [ 1166.701014] ? find_held_lock+0x2d/0x110 [ 1166.705081] __alloc_skb+0xba/0x5b0 [ 1166.708718] ? skb_trim+0x180/0x180 [ 1166.712361] ? lock_acquire+0x170/0x400 [ 1166.716351] nr_write_internal+0x73/0xd60 [ 1166.720770] nr_establish_data_link+0x78/0xb0 [ 1166.725357] nr_connect+0x778/0x1050 [ 1166.729078] ? nr_find_next_circuit+0xb0/0xb0 [ 1166.733579] ? selinux_netlbl_socket_connect+0x96/0xc0 [ 1166.738858] ? __local_bh_enable_ip+0x159/0x270 [ 1166.743547] ? selinux_netlbl_socket_connect+0x96/0xc0 [ 1166.748831] ? selinux_socket_connect+0x6d/0x80 [ 1166.753510] ? nr_find_next_circuit+0xb0/0xb0 [ 1166.758014] __sys_connect+0x238/0x2c0 [ 1166.761908] ? __ia32_sys_accept+0xb0/0xb0 [ 1166.766148] ? wait_for_completion+0x3c0/0x3c0 [ 1166.770742] ? fput+0x2b/0x190 [ 1166.773937] ? ksys_write+0x1c8/0x2a0 [ 1166.777738] ? __ia32_sys_read+0xb0/0xb0 [ 1166.781805] ? __ia32_sys_clock_settime+0x260/0x260 [ 1166.786830] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1166.791586] ? trace_hardirqs_off_caller+0x55/0x210 [ 1166.796613] __x64_sys_connect+0x6f/0xb0 [ 1166.800680] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1166.805266] do_syscall_64+0xf9/0x620 [ 1166.809073] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1166.814261] RIP: 0033:0x45c829 [ 1166.817456] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1166.836357] RSP: 002b:00007f95343c9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 1166.844065] RAX: ffffffffffffffda RBX: 00000000004dae60 RCX: 000000000045c829 [ 1166.851335] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000004 [ 1166.858604] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1166.865875] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 19:48:56 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x2, &(0x7f0000000040)=@generic={0x28, "c32f7d3ba3fc7aefab227b4b4e04c2164842c78249acf3b49cce804280d81b2d3fc432e586af0a00ea6a4da2222df66beb2ddbc6bdf5763362348a667eebfbde02c65b4c8a7720bc00dd33a222ee1105d6112f5124110eda7a0e7ca0220e804809e238b761df1ec8e4bccd9a13ee2442028b4ddbebd1f3f70a50d361e68b"}, 0x80) [ 1166.873148] R13: 000000000000008a R14: 00000000004c3213 R15: 00007f95343ca6d4 19:48:56 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b4940a1f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:48:56 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, 0x0) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:56 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x0, &(0x7f0000000040)=@generic={0x28, "c32f7d3ba3fc7aefab227b4b4e04c2164842c78249acf3b49cce804280d81b2d3fc432e586af0a00ea6a4da2222df66beb2ddbc6bdf5763362348a667eebfbde02c65b4c8a7720bc00dd33a222ee1105d6112f5124110eda7a0e7ca0220e804809e238b761df1ec8e4bccd9a13ee2442028b4ddbebd1f3f70a50d361e68b"}, 0x80) 19:48:56 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) fsetxattr$security_ima(r1, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@v1={0x2, "ee3a72273a7e5093da5532f7a034e3bd"}, 0x11, 0x2) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r4) socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r6 = dup(r5) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r6, 0x10e, 0x1, 0x0, 0x0) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:48:56 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 19:48:56 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, 0x0) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:59 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc33760036", 0xd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:48:59 executing program 3 (fault-call:3 fault-nth:0): clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 19:48:59 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) fsetxattr$security_ima(r1, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@v1={0x2, "ee3a72273a7e5093da5532f7a034e3bd"}, 0x11, 0x2) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r4) socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r5) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:48:59 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, 0x0) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:59 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b4940b1f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:48:59 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 1169.744418] FAULT_INJECTION: forcing a failure. [ 1169.744418] name failslab, interval 1, probability 0, space 0, times 0 [ 1169.785204] CPU: 1 PID: 29923 Comm: syz-executor.3 Not tainted 4.19.121-syzkaller #0 [ 1169.793116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1169.802472] Call Trace: [ 1169.805076] dump_stack+0x188/0x20d [ 1169.808731] should_fail.cold+0xa/0x1b [ 1169.812632] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1169.817761] __should_failslab+0x115/0x180 [ 1169.822005] should_failslab+0x5/0xf [ 1169.825720] kmem_cache_alloc+0x29f/0x710 [ 1169.829871] ? selinux_is_enabled+0x3f/0x60 [ 1169.834199] ? creds_are_invalid+0x53/0x140 [ 1169.838527] ? __validate_process_creds+0x268/0x2f0 [ 1169.843551] prepare_creds+0x39/0x410 [ 1169.847358] do_coredump+0x2e7/0x2d43 [ 1169.851171] ? lock_downgrade+0x740/0x740 [ 1169.855324] ? dump_align+0xa0/0xa0 [ 1169.858953] ? trace_hardirqs_off+0x50/0x200 [ 1169.863368] ? __lock_is_held+0xad/0x140 [ 1169.867433] ? __dequeue_signal+0x3f2/0x530 [ 1169.871762] ? find_held_lock+0x2d/0x110 [ 1169.875827] ? get_signal+0xe4e/0x1f90 [ 1169.879816] ? proc_coredump_connector+0x358/0x4e0 [ 1169.884748] ? proc_comm_connector+0x220/0x220 [ 1169.889336] ? lock_downgrade+0x740/0x740 [ 1169.893493] ? _raw_spin_unlock_irq+0x24/0x80 [ 1169.898111] get_signal+0xeed/0x1f90 [ 1169.901838] ? ax25_listen+0x180/0x180 [ 1169.905739] do_signal+0x8f/0x1710 [ 1169.909291] ? __ia32_sys_send+0x100/0x100 [ 1169.913534] ? lock_downgrade+0x740/0x740 [ 1169.917690] ? setup_sigcontext+0x820/0x820 [ 1169.922035] ? fput+0x2b/0x190 [ 1169.925238] ? ksys_write+0x1c8/0x2a0 [ 1169.929050] ? exit_to_usermode_loop+0x36/0x2b0 19:48:59 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f", 0x14}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1169.933730] exit_to_usermode_loop+0x22b/0x2b0 [ 1169.938326] do_syscall_64+0x538/0x620 [ 1169.942228] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1169.947420] RIP: 0033:0x45c829 [ 1169.950619] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1169.969532] RSP: 002b:00007f1d89423c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002d [ 1169.977255] RAX: fffffffffffffe00 RBX: 00000000004fb0a0 RCX: 000000000045c829 19:48:59 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x2}}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 1169.984536] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 1169.991797] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1169.999092] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1170.006343] R13: 0000000000000893 R14: 00000000004cb475 R15: 00007f1d894246d4 19:48:59 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:48:59 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b4940c1f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:49:00 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) fsetxattr$security_ima(r1, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@v1={0x2, "ee3a72273a7e5093da5532f7a034e3bd"}, 0x11, 0x2) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r4) socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:00 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 19:49:00 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x3}}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:00 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, 0x0, 0x7ffffffff000, 0x0, 0x0, 0x0) 19:49:00 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:49:00 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) fsetxattr$security_ima(r1, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@v1={0x2, "ee3a72273a7e5093da5532f7a034e3bd"}, 0x11, 0x2) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r4) socket$nl_generic(0x10, 0x3, 0x10) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:00 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, 0x0, 0xf0ffffff7f0000, 0x0, 0x0, 0x0) 19:49:00 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x4}}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:02 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f", 0x14}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:49:02 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:49:02 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) fsetxattr$security_ima(r1, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@v1={0x2, "ee3a72273a7e5093da5532f7a034e3bd"}, 0x11, 0x2) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r4) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:02 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x7ffffffff000, 0x0, 0x0) 19:49:02 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x6}}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:02 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b4940d1f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:49:03 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:03 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) fsetxattr$security_ima(r1, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@v1={0x2, "ee3a72273a7e5093da5532f7a034e3bd"}, 0x11, 0x2) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:03 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0xf0ffffff7f0000, 0x0, 0x0) 19:49:03 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:49:03 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) fsetxattr$security_ima(r1, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@v1={0x2, "ee3a72273a7e5093da5532f7a034e3bd"}, 0x11, 0x2) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:03 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x7ffffffff000) 19:49:05 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f", 0x14}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:49:05 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose, 0x2}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:05 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff7f0000) 19:49:05 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:49:05 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) fsetxattr$security_ima(r1, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@v1={0x2, "ee3a72273a7e5093da5532f7a034e3bd"}, 0x11, 0x2) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) socket$inet6(0xa, 0x2, 0x0) ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:05 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b4940e1f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:49:06 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000000)={0x0, 0x0, 0x9, 0x0, [], [{0x80, 0x1, 0x1, 0x1884d98d, 0x100, 0x2}, {0x476cf2ee, 0x7fffffff, 0x7fffffff, 0x0, 0x1, 0x1}], [[], [], [], [], [], [], [], [], []]}) 19:49:06 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) fsetxattr$security_ima(r1, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@v1={0x2, "ee3a72273a7e5093da5532f7a034e3bd"}, 0x11, 0x2) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) socket$inet6(0xa, 0x2, 0x0) ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:06 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:49:06 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose, 0x1ee}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:06 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x3, 0xf0) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 19:49:06 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) fsetxattr$security_ima(r1, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@v1={0x2, "ee3a72273a7e5093da5532f7a034e3bd"}, 0x11, 0x2) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) socket$inet6(0xa, 0x2, 0x0) ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:09 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:49:09 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, 0x0, 0x0, 0x0) 19:49:09 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000000)={0x2c, @local, 0x4e23, 0x2, 'fo\x00', 0x0, 0x80, 0x7e}, 0x2c) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) 19:49:09 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose, 0xee01}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:09 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) fsetxattr$security_ima(r1, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@v1={0x2, "ee3a72273a7e5093da5532f7a034e3bd"}, 0x11, 0x2) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:09 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b4940f1f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:49:09 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) r2 = gettid() setpgid(r2, 0x0) r3 = gettid() setpgid(r3, 0x0) tgkill(r2, r3, 0x11) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r5 = dup(r4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r5, 0x10e, 0x1, 0x0, 0x0) r6 = accept$netrom(r5, 0x0, &(0x7f0000000000)) setsockopt$netrom_NETROM_T4(r6, 0x103, 0x6, &(0x7f0000000040)=0x6, 0x4) 19:49:09 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) fsetxattr$security_ima(r1, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@v1={0x2, "ee3a72273a7e5093da5532f7a034e3bd"}, 0x11, 0x2) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:09 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, 0x0, 0x0, 0x0) 19:49:09 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose, 0x1000000}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:09 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_init_net_socket$ax25(0x3, 0x2, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r0) r1 = dup(r0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r1, 0x80386433, &(0x7f0000000040)=""/195) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x9) r4 = dup(0xffffffffffffffff) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000000)={0x12515, 0x1, 0x2, 0x1000, &(0x7f0000ffe000/0x1000)=nil}) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r6 = dup(r5) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r6, 0x10e, 0x1, 0x0, 0x0) bind$bt_rfcomm(r6, &(0x7f0000000140)={0x1f, @fixed={[], 0x11}, 0x61}, 0xa) 19:49:09 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) fsetxattr$security_ima(r1, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@v1={0x2, "ee3a72273a7e5093da5532f7a034e3bd"}, 0x11, 0x2) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:12 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:49:12 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, 0x0, 0x0, 0x0) 19:49:12 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose, 0x1ee0000}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:12 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="ddd4000000ca75ea6d002a"], 0x14}, 0x1, 0x60}, 0x0) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r7 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r5, 0x0, 0x43, &(0x7f0000000180)={'icmp\x00'}, &(0x7f0000000340)=0x1e) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=@bridge_delneigh={0x28, 0x1d, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r6, 0x0, 0x4}, [@NDA_LLADDR={0xa, 0x2, @multicast}]}, 0x28}}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, 0x0, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r6}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x3f}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004884}, 0x20000004) r8 = gettid() setpgid(r8, 0x0) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, r1, 0x100, 0x70bd29, 0x25dfdbfb, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000080}, 0x200c0810) r9 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r10 = dup(r9) recvfrom(r10, 0x0, 0x0, 0x0, 0x0, 0x0) 19:49:12 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) fsetxattr$security_ima(r1, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@v1={0x2, "ee3a72273a7e5093da5532f7a034e3bd"}, 0x11, 0x2) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:12 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494101f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:49:12 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) fsetxattr$security_ima(r1, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@v1={0x2, "ee3a72273a7e5093da5532f7a034e3bd"}, 0x11, 0x2) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:12 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0x0) getpeername(r1, &(0x7f0000000000)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f0000000080)=0x80) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) 19:49:12 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180), 0x0, 0x0) 19:49:12 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) fsetxattr$security_ima(r1, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@v1={0x2, "ee3a72273a7e5093da5532f7a034e3bd"}, 0x11, 0x2) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:12 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsu\x00', 0x210980, 0x0) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80822}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x90, 0x1405, 0x20, 0x70bd2d, 0x25dfdbfb, "", [{{0x8, 0x1, 0x1}, {0x8, 0x3, 0x3}}, {{0x8}, {0x8}}, {{0x8, 0x1, 0x1}, {0x8, 0x3, 0x2}}, {{0x8, 0x1, 0x1}, {0x8}}, {{0x8}, {0x8, 0x3, 0x1}}, {{0x8, 0x1, 0x2}, {0x8, 0x3, 0x2}}, {{0x8, 0x1, 0x1}, {0x8, 0x3, 0x4}}, {{0x8, 0x1, 0x1}, {0x8, 0x3, 0x4}}]}, 0x90}, 0x1, 0x0, 0x0, 0x4854}, 0x48004) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 19:49:12 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose, 0x2000000}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:15 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = geteuid() r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, 0x0, 0x0) fstat(r2, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r5, 0x0) r6 = geteuid() syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x1ff, 0x6, &(0x7f00000003c0)=[{&(0x7f0000000080)="815a042f5a69b2ed221adfc4aa7ebe8caaecd2795678718b20956395b1009bfc368860b9428f9dc3958ef293717f40de2a44759ccc7b1b5bc0e795e94506f3003ba0b1ad88ff1311e6b6a5774fdf07bdc6382005ff7d2d51eb7b20fe8ff2fce9f6e4eb0d", 0x64, 0x1}, {&(0x7f0000000100)="a5b73f25f7dafdbf82d12ce53b6d68b8a94e66e3cd803f1250ab263a9938b1050eba87ed3b32a05cc9bd4c73cf59ace119cdc1b4b8ea4de0412bb9d05965f4da1818973d90d94f93c4ef9967668d4668dad08e640a1afdf66a1af277a27247a04cba1e73c68b17455ca0069176e546ea22196d93bf5614ddb7e0ce2f844ff850a0f8e263ddca05b6af024862c9", 0x8d, 0x2}, {&(0x7f00000001c0)="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", 0xff, 0x8000}, {&(0x7f00000002c0)="312acf66a58c6931cde9877bd61e36ee9f1c46c196dbcd47c847a2a4888e6b976ebb5529db9f4bf4b8770ad72f3734ab", 0x30, 0xfffffffffffffff7}, {&(0x7f0000000300)="74dba018b306c8870e7d9d06eeae2db3de3e158fdcbc338dec4ba2824186b04f0f28c004f711250cd33156978622189680a21fef02", 0x35, 0xd71}, {&(0x7f0000000340)="79f6f84744ed1c65f2843a768e44d46d2fb9da706191a372912b08955ae6445acc3fdec998dcb7299c2a99dbea27ae38d3793fdd644fc6ff0c745c53c623731cac28a82922f9fb9b6206c91b5163db8a7a6dd5a444273c56bd", 0x59, 0xbb}], 0x1002000, &(0x7f0000000500)={[{@degraded='degraded'}, {@check_int='check_int'}, {@compress='compress'}], [{@smackfshat={'smackfshat', 0x3d, '$'}}, {@context={'context', 0x3d, 'system_u'}}, {@fowner_lt={'fowner<', r0}}, {@uid_eq={'uid', 0x3d, r3}}, {@fowner_lt={'fowner<', r5}}, {@subj_type={'subj_type', 0x3d, 'vmnet1md5sum{eth0wlan0+vboxnet1@*'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', r6}}, {@smackfstransmute={'smackfstransmute', 0x3d, '-vmnet1%cpuset]cgroup:-'}}]}) r7 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r8 = dup(r7) recvfrom(r8, 0x0, 0x0, 0x0, 0x0, 0x0) 19:49:15 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f000000", 0x17}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:49:15 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:15 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180), 0x0, 0x0) 19:49:15 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose={0xbb, 0xbb, 0xbb, 0x2}, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:15 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494111f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:49:15 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x163, 0x0, 0x0) 19:49:15 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000380)=""/230) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:15 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180), 0x0, 0x0) 19:49:15 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose={0xbb, 0xbb, 0xbb, 0x3}, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:15 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0xcd) r1 = dup(r0) mprotect(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x2000002) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) select(0x40, &(0x7f0000000000)={0x80000001, 0x6, 0x2, 0x1, 0x1, 0x1f, 0x7ff, 0x3f}, &(0x7f0000000040)={0x4, 0x4, 0x80000000, 0x4, 0x1, 0x5, 0x5, 0x73a9}, &(0x7f0000000080)={0x8, 0x3, 0x4, 0x9, 0x9d, 0xffffffff, 0x8}, &(0x7f0000000100)={r2, r3/1000+60000}) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r4) recvfrom(r4, 0x0, 0xff8b, 0x60002102, 0x0, 0x0) ioctl$TIOCNOTTY(r1, 0x5422) 19:49:15 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000380)=""/230) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:15 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{0x0}], 0x1, 0x0) 19:49:18 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500", 0x19}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:49:18 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000380)=""/230) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:18 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose={0xbb, 0xbb, 0xbb, 0x4}, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:18 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)=ANY=[@ANYBLOB="9052fc7f8539600300000000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) 19:49:18 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494131f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:49:18 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{0x0}], 0x1, 0x0) 19:49:18 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/230) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:18 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{0x0}], 0x1, 0x0) 19:49:18 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose={0xbb, 0xbb, 0xbb, 0x6}, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:18 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/230) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:18 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/230) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:18 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)}], 0x1, 0x0) 19:49:21 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500", 0x19}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:49:21 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:21 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494141f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:49:21 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose={0xbb, 0xbb, 0xbb, 0x2}, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:21 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)}], 0x1, 0x0) 19:49:21 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0x0) accept$netrom(r3, &(0x7f0000000000)={{0x3, @rose}, [@null, @bcast, @default, @default, @bcast, @bcast, @rose, @rose]}, &(0x7f0000000080)=0x48) 19:49:21 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000000c0)='dns_resolver\x00', 0x0, &(0x7f0000000240)="dee7030522cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f3233a68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fee505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edecdbd8be51d9917c3e033b06b9e9860ab49c3a4f51ab0124b50c3362201a307df03000", 0x85, r1) keyctl$setperm(0x5, r1, 0x8200e20) r2 = dup(r0) recvfrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r4 = dup(r3) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x7704, 0x0) 19:49:21 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:21 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose={0xbb, 0xbb, 0xbb, 0x3}, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:21 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)}], 0x1, 0x0) 19:49:21 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:21 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be0", 0xb}], 0x1, 0x0) 19:49:24 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose={0xbb, 0xbb, 0xbb, 0x4}, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:24 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500", 0x19}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:49:24 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:24 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be0", 0xb}], 0x1, 0x0) 19:49:24 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494151f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:49:24 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r2) r3 = openat$bsg(0xffffffffffffff9c, 0x0, 0x1d5040, 0x0) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000380)='NLBL_UNLBL\x00') setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)=ANY=[@ANYBLOB="0e540000", @ANYRES16=0x0, @ANYBLOB="020025bd7000fcdbdf25090000000500080005000000110007005ceeb7e16f846d5d1c383bbdb20000000800370000000000080037000200000007000a00d6ffb3000800090005ac0f0018006e8004000100040001000400020004000100040002000800090000000000"], 0x70}, 0x1, 0x0, 0x0, 0x20008000}, 0x44) sendmsg$NLBL_UNLABEL_C_LIST(r3, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="000062ee", @ANYRES16=r4, @ANYBLOB="000104000000fbdbdf25020000001400060076657468305f746f5f7465616d0000000500010000000000"], 0x30}, 0x1, 0x0, 0x0, 0x840}, 0x4000) sendmsg$NLBL_UNLABEL_C_LIST(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r4, 0x100, 0x70bd25, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @private=0xa010101}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8044}, 0x4000000) r5 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r6 = dup(r5) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r6, 0x10e, 0x1, 0x0, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r6, 0x401870cc, &(0x7f0000000100)={0x3, 0x7, 0x3f, 0x6}) r7 = dup3(0xffffffffffffffff, r2, 0x80000) sendto$l2tp6(r7, &(0x7f00000000c0)="2ea578bf527a7dcd72a41f791dae4da8e2c8232fe8e366d267dd4aa69d02aecc6f91e3cc2c751da1113d982e2ef788ad84ac775515aeda0855", 0x39, 0x40004, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) utimensat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{0x0, 0x2710}, {r8, r9/1000+10000}}, 0x100) 19:49:24 executing program 3: clone(0x126224c85, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 19:49:24 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:24 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be0", 0xb}], 0x1, 0x0) 19:49:24 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose={0xbb, 0xbb, 0xbb, 0x6}, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:24 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:24 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be0920001000006", 0x11}], 0x1, 0x0) 19:49:24 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:27 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default={0x98, 0x92, 0x9c, 0xaa, 0xb0, 0x40, 0x6}, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:27 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:49:27 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494161f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:49:27 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be0920001000006", 0x11}], 0x1, 0x0) 19:49:27 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:27 executing program 3: prctl$PR_SET_FPEXC(0xc, 0x2) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) r2 = accept$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000040)=0x1c) recvfrom(r2, 0x0, 0x0, 0x162, 0x0, 0x0) 19:49:27 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f0000000040)='./file0\x00', 0x7fffffff, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000080)="db7ee2b14781899e70b28ab7f9f2333d9053989e6d1b8a8e5259abbc97fe6181f96b22382573705519394ab4b0fad7916d3b75d4b816c8084b0ec5f8122456b29075bb210bb1342e743abb182e8e613f316a6120b093ba68b03a7cfc4256e3a2fa20bfd3e8b57c9d7f97b7c4278226f48b1293f1584bb473970eb93f988e3760287093ad967b6fe448356f78a78ceecf9644a9ec2daa5e7365378ec4139aa3bd765286d7a4e26e96704accf3a365febea8a74d4024efb1dd8094f09a38276cebb97da671343e374ebbaf37cb1b", 0xcd, 0x1}, {&(0x7f0000000180)="00e856dabc89bf9f33fce54583dd05ac0daf083026ba976f656abd8eab0b6d83c9c1f133dc20341cb07899ff1fdc2f257c765a6a3d97e90ded2521245249dcffea833f3cc0957ba7fb0f6598bb91a9f887380c7cf3131cdd7bd8613880ace41e8a2c1e518779c425cd77b47c92d6481354a29205373b69a1293106540fd072d6df0c317203212f496b4f517f4d524d5e40060d424033c6d7842aea9b54678f5b75992d7de7eed6f8355df88a8c2327dc600d900e089c8f81f26aaa7321a96a0f1b50df077122da611a", 0xc9, 0x400}, {&(0x7f0000000280)="cc24d5c7ac8e646344b91744ea135515870ba29aa90f11d110991f14c0dc2cd1f6455cd91f69212e540c4e7459e8d79fc22d3dbdc5cb55be7c6b430f0c0d35a49db9f71c21dd6b8f7c5493ceaea9d7929a61bb9a", 0x54}, {&(0x7f0000000300)="f89988d80f67eb99b20f3579a5a154c0a9bb7248e3dd9c169003641ad77fdbdb615bd0ed854214af9695a2fb74dc0afe92126875d017946fab6ebbfac1078e523f876023e849e88f1c75ec99305663042c75708fd4b79f2ce83ad6e2ddffe2d3f182ba5868aaa1258dd8283b9f8ce1d2e6f1bb7aca95609cecef5dd6e6abe30676a0b5cfe5ef47b631a287f20dee66c602f8e0f2", 0x94, 0x101}], 0x8882, &(0x7f0000000440)='\x00') recvfrom(r1, 0x0, 0x0, 0x40000001, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="d9d618d2c8d2b306a3595fd09237c59cabb2061928e1458d541519b7f8588e7d7ce122f06347830a63ad366d58438e13afedfb3ab7941802f086e135780f4d", 0x3f) 19:49:27 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:27 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be0920001000006", 0x11}], 0x1, 0x0) 19:49:27 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_init_net_socket$ax25(0x3, 0x2, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 19:49:27 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:27 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:27 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be0920001000006010040", 0x14}], 0x1, 0x0) 19:49:30 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:49:30 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) 19:49:30 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:30 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x2}, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:30 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be0920001000006010040", 0x14}], 0x1, 0x0) 19:49:30 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494171f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:49:30 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:30 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be0920001000006010040", 0x14}], 0x1, 0x0) 19:49:30 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) timer_create(0x7, &(0x7f00000001c0)={0x0, 0x2, 0x0, @thr={&(0x7f0000000000)="6e35c99fe0b95fe7043e1f187d013d4f071ad325b750b29abfc25021151b2508c4392565332f753f3452f2e6ea3ef43615f528fb0402512baff16c3d97a46b36a135d337a13847737bde79f487478973b9c96a35371e2c90eb952ae2ed3776c07b566ffea789813d0f154d83852d4d178570bdd3ac9d2b0b5ab3a983f2c282767176a65841fb02c3b442aaacd0d4fdb0252a4919cfe35aa669328d6cf6", &(0x7f00000000c0)="7952942e8ac252c0d38e6626b9ef4e29e3970c21a2cbaf26e7f13d40434ef52c3d0e50e2963f105da51cd28f83b8eeca9c154599bdc86438912cfa681351cca555979f30e89b1554c0be658f6ed049c19ff36d75b1f3e0cf2b4ef38f72ad6f561119b1dee78a21842870600056fc581bbf4ca1581b354c2e95ad16b2b3dfbdd80b791e0bbd10e4ab34489b608801b5d818f9b3cb0687f01ffaa69ad5c3865584397a0f007adfddb38780def27fab5301cc43304814ab36da86e4544a0b1cb634e274c42c3dc6706b174cb9122cd6c7933567f0a0550a8daeb27fa5223b245935525c529bd28e701d8d140b122d94e8104e9ab246e4"}}, &(0x7f0000000200)) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000240)=@gcm_256={{0x303}, "02735b3e05cb9700", "f18854b9b4818e3c950c1cbd863e553ddcb38cf05eb38dc09790226747fecc97", "c74ade64", "408e8bfa8e9ffca1"}, 0x38) 19:49:30 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:30 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) setsockopt$inet6_opts(r1, 0x29, 0xd, &(0x7f0000001040)=@fragment={0x2f, 0x0, 0x2, 0x0, 0x0, 0x6, 0x68}, 0x8) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0x0) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000000000)=""/4096, &(0x7f0000001000)=0x1000) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) 19:49:30 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:33 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:49:33 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be092000100000601004000", 0x15}], 0x1, 0x0) 19:49:33 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) write$P9_RREMOVE(r1, &(0x7f0000000000)={0x7, 0x7b, 0x2}, 0x7) 19:49:33 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:33 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast={0xa2, 0xa6, 0xa8, 0x40, 0x40, 0x40, 0x2}, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:33 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2fbe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:49:33 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, 0x0, 0x0) setsockopt$TIPC_MCAST_BROADCAST(r2, 0x10f, 0x85) dup(r0) 19:49:33 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:33 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be092000100000601004000", 0x15}], 0x1, 0x0) 19:49:33 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:49:33 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x2}, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:33 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:33 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be092000100000601004000", 0x15}], 0x1, 0x0) 19:49:34 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x3}, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:34 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose={0xbb, 0xbb, 0xbb, 0x4}, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:34 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:34 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:34 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebec037addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:49:34 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:34 executing program 2 (fault-call:7 fault-nth:0): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:49:34 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) [ 1204.529045] FAULT_INJECTION: forcing a failure. [ 1204.529045] name failslab, interval 1, probability 0, space 0, times 0 [ 1204.568016] CPU: 0 PID: 30759 Comm: syz-executor.2 Not tainted 4.19.121-syzkaller #0 [ 1204.575934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1204.585380] Call Trace: [ 1204.587982] dump_stack+0x188/0x20d [ 1204.591627] should_fail.cold+0xa/0x1b [ 1204.595531] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1204.600655] __should_failslab+0x115/0x180 [ 1204.604901] should_failslab+0x5/0xf [ 1204.608622] kmem_cache_alloc_node+0x260/0x730 [ 1204.613220] __alloc_skb+0xba/0x5b0 [ 1204.616856] ? skb_trim+0x180/0x180 [ 1204.620496] ? security_file_permission+0x84/0x220 [ 1204.625434] ppp_write+0x9a/0x280 [ 1204.628898] do_iter_write+0x460/0x5e0 [ 1204.632806] vfs_writev+0x1b3/0x2f0 [ 1204.636442] ? vfs_iter_write+0xa0/0xa0 [ 1204.640426] ? lock_downgrade+0x740/0x740 [ 1204.644589] ? check_preemption_disabled+0x41/0x280 [ 1204.649633] ? iterate_fd+0x350/0x350 [ 1204.653443] ? wait_for_completion+0x3c0/0x3c0 [ 1204.658039] do_pwritev+0x1b6/0x270 [ 1204.661669] ? do_writev+0x330/0x330 [ 1204.665386] ? __ia32_sys_clock_settime+0x260/0x260 [ 1204.670411] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1204.675172] ? trace_hardirqs_off_caller+0x55/0x210 [ 1204.680212] ? do_syscall_64+0x21/0x620 [ 1204.684199] do_syscall_64+0xf9/0x620 [ 1204.688012] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1204.693202] RIP: 0033:0x45c829 [ 1204.696408] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1204.715310] RSP: 002b:00007f9ee22e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000128 [ 1204.723113] RAX: ffffffffffffffda RBX: 00000000004faa20 RCX: 000000000045c829 [ 1204.730386] RDX: 0000000000000001 RSI: 0000000020000180 RDI: 0000000000000003 [ 1204.737659] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1204.744931] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1204.752201] R13: 0000000000000879 R14: 00000000004cb34e R15: 00007f9ee22e26d4 19:49:36 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:49:36 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x4}, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:36 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:36 executing program 2 (fault-call:7 fault-nth:1): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:49:36 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe243763deb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) [ 1207.014738] FAULT_INJECTION: forcing a failure. [ 1207.014738] name failslab, interval 1, probability 0, space 0, times 0 [ 1207.063082] CPU: 1 PID: 30790 Comm: syz-executor.2 Not tainted 4.19.121-syzkaller #0 [ 1207.070999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1207.080357] Call Trace: [ 1207.082957] dump_stack+0x188/0x20d [ 1207.086600] should_fail.cold+0xa/0x1b [ 1207.090497] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1207.095619] __should_failslab+0x115/0x180 [ 1207.099865] should_failslab+0x5/0xf [ 1207.103585] kmem_cache_alloc_node_trace+0x272/0x750 [ 1207.108701] __kmalloc_node_track_caller+0x38/0x70 [ 1207.113639] __kmalloc_reserve.isra.0+0x39/0xe0 [ 1207.118317] __alloc_skb+0xef/0x5b0 [ 1207.121950] ? skb_trim+0x180/0x180 [ 1207.125586] ? security_file_permission+0x84/0x220 [ 1207.130520] ppp_write+0x9a/0x280 [ 1207.133980] do_iter_write+0x460/0x5e0 [ 1207.137882] vfs_writev+0x1b3/0x2f0 [ 1207.141513] ? vfs_iter_write+0xa0/0xa0 [ 1207.145490] ? lock_downgrade+0x740/0x740 [ 1207.149649] ? check_preemption_disabled+0x41/0x280 [ 1207.154683] ? iterate_fd+0x350/0x350 [ 1207.158494] ? wait_for_completion+0x3c0/0x3c0 [ 1207.163090] do_pwritev+0x1b6/0x270 [ 1207.166723] ? do_writev+0x330/0x330 [ 1207.170443] ? __ia32_sys_clock_settime+0x260/0x260 [ 1207.175464] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1207.180229] ? trace_hardirqs_off_caller+0x55/0x210 [ 1207.185253] ? do_syscall_64+0x21/0x620 [ 1207.189246] do_syscall_64+0xf9/0x620 [ 1207.193055] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1207.198345] RIP: 0033:0x45c829 [ 1207.201548] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1207.220454] RSP: 002b:00007f9ee22e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000128 [ 1207.228174] RAX: ffffffffffffffda RBX: 00000000004faa20 RCX: 000000000045c829 [ 1207.235462] RDX: 0000000000000001 RSI: 0000000020000180 RDI: 0000000000000003 [ 1207.242742] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1207.250017] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1207.257294] R13: 0000000000000879 R14: 00000000004cb34e R15: 00007f9ee22e26d4 19:49:37 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x6}, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:37 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8e0244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:49:37 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:37 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:37 executing program 2 (fault-call:7 fault-nth:2): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:49:37 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose={0xbb, 0xbb, 0xbb, 0x2}, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:37 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) [ 1207.724639] FAULT_INJECTION: forcing a failure. [ 1207.724639] name failslab, interval 1, probability 0, space 0, times 0 [ 1207.735948] CPU: 1 PID: 30833 Comm: syz-executor.2 Not tainted 4.19.121-syzkaller #0 [ 1207.743831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1207.753187] Call Trace: [ 1207.755786] dump_stack+0x188/0x20d [ 1207.759440] should_fail.cold+0xa/0x1b [ 1207.763336] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1207.768445] ? mark_held_locks+0xf0/0xf0 [ 1207.772522] __should_failslab+0x115/0x180 [ 1207.776769] should_failslab+0x5/0xf [ 1207.780487] kmem_cache_alloc_node+0x55/0x730 [ 1207.784985] ? skb_dequeue+0x129/0x180 [ 1207.788883] __alloc_skb+0xba/0x5b0 [ 1207.792509] ? skb_trim+0x180/0x180 [ 1207.796143] ? lockdep_hardirqs_on+0x196/0x5d0 [ 1207.800731] ? _raw_spin_unlock_irqrestore+0xa0/0xe0 [ 1207.805857] __ppp_xmit_process+0xb5c/0x16c0 [ 1207.810276] ? lock_downgrade+0x740/0x740 [ 1207.814435] ? ppp_receive_nonmp_frame+0x1f50/0x1f50 [ 1207.819557] ppp_xmit_process+0x14f/0x300 [ 1207.823717] ppp_write+0x205/0x280 [ 1207.827263] do_iter_write+0x460/0x5e0 [ 1207.831188] vfs_writev+0x1b3/0x2f0 [ 1207.834829] ? vfs_iter_write+0xa0/0xa0 [ 1207.838808] ? lock_downgrade+0x740/0x740 [ 1207.842967] ? check_preemption_disabled+0x41/0x280 [ 1207.848004] ? iterate_fd+0x350/0x350 [ 1207.851815] ? wait_for_completion+0x3c0/0x3c0 [ 1207.856415] do_pwritev+0x1b6/0x270 [ 1207.860053] ? do_writev+0x330/0x330 [ 1207.863772] ? __ia32_sys_clock_settime+0x260/0x260 [ 1207.868798] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1207.873564] ? trace_hardirqs_off_caller+0x55/0x210 [ 1207.878588] ? do_syscall_64+0x21/0x620 [ 1207.882573] do_syscall_64+0xf9/0x620 [ 1207.886390] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1207.891585] RIP: 0033:0x45c829 [ 1207.894782] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1207.913686] RSP: 002b:00007f9ee22e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000128 [ 1207.921398] RAX: ffffffffffffffda RBX: 00000000004faa20 RCX: 000000000045c829 [ 1207.928665] RDX: 0000000000000001 RSI: 0000000020000180 RDI: 0000000000000003 [ 1207.935929] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1207.943191] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1207.950456] R13: 0000000000000879 R14: 00000000004cb34e R15: 00007f9ee22e26d4 [ 1207.957842] ppp0: PPP: no memory (VJ comp pkt) 19:49:39 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:49:39 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8efc04c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:49:39 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:39 executing program 2 (fault-call:7 fault-nth:3): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:49:39 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose={0xbb, 0xbb, 0xbb, 0x3}, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:39 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000180)={0x0, 0x0, 0x2}) ioctl$KVM_TRANSLATE(r0, 0xc018ae85, &(0x7f00000001c0)={0x1, 0x1, 0x80, 0x8}) clone(0xf0e33e265b8f11a, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_init_net_socket$ax25(0x3, 0x2, 0x0) sendto$phonet(r0, &(0x7f0000000100)="cf505f19ad40da39f7", 0x9, 0x20000010, &(0x7f0000000140)={0x23, 0xba, 0x0, 0x8}, 0x10) socket$phonet(0x23, 0x2, 0x1) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r4 = dup(r3) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) syz_init_net_socket$ax25(0x3, 0x2, 0x0) write$FUSE_BMAP(r2, &(0x7f0000000040)={0x18, 0x0, 0x8, {0x101}}, 0x18) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) recvfrom$rose(0xffffffffffffffff, &(0x7f0000000080)=""/57, 0x39, 0x2, &(0x7f00000000c0)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x1, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x40) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x0) [ 1210.015815] IPVS: ftp: loaded support on port[0] = 21 [ 1210.024961] FAULT_INJECTION: forcing a failure. [ 1210.024961] name failslab, interval 1, probability 0, space 0, times 0 [ 1210.036263] CPU: 0 PID: 30869 Comm: syz-executor.2 Not tainted 4.19.121-syzkaller #0 [ 1210.044146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1210.053495] Call Trace: [ 1210.056107] dump_stack+0x188/0x20d [ 1210.059749] should_fail.cold+0xa/0x1b [ 1210.063647] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1210.068768] __should_failslab+0x115/0x180 [ 1210.073011] should_failslab+0x5/0xf [ 1210.076730] kmem_cache_alloc_node_trace+0x59/0x750 [ 1210.081764] __kmalloc_node_track_caller+0x38/0x70 [ 1210.086706] __kmalloc_reserve.isra.0+0x39/0xe0 [ 1210.091392] __alloc_skb+0xef/0x5b0 [ 1210.095022] ? skb_trim+0x180/0x180 [ 1210.098652] ? lockdep_hardirqs_on+0x196/0x5d0 [ 1210.103248] ? _raw_spin_unlock_irqrestore+0xa0/0xe0 [ 1210.108364] __ppp_xmit_process+0xb5c/0x16c0 [ 1210.112785] ? lock_downgrade+0x740/0x740 [ 1210.116937] ? ppp_receive_nonmp_frame+0x1f50/0x1f50 [ 1210.122050] ppp_xmit_process+0x14f/0x300 [ 1210.126199] ppp_write+0x205/0x280 [ 1210.129746] do_iter_write+0x460/0x5e0 [ 1210.133644] vfs_writev+0x1b3/0x2f0 [ 1210.137274] ? vfs_iter_write+0xa0/0xa0 [ 1210.141283] ? lock_downgrade+0x740/0x740 [ 1210.145436] ? check_preemption_disabled+0x41/0x280 [ 1210.150473] ? iterate_fd+0x350/0x350 [ 1210.154280] ? wait_for_completion+0x3c0/0x3c0 [ 1210.158871] do_pwritev+0x1b6/0x270 [ 1210.162502] ? do_writev+0x330/0x330 [ 1210.166219] ? __ia32_sys_clock_settime+0x260/0x260 [ 1210.171238] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1210.175992] ? trace_hardirqs_off_caller+0x55/0x210 [ 1210.181010] ? do_syscall_64+0x21/0x620 [ 1210.184987] do_syscall_64+0xf9/0x620 [ 1210.188792] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1210.193977] RIP: 0033:0x45c829 [ 1210.197174] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 19:49:40 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0x3ffff, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) [ 1210.216077] RSP: 002b:00007f9ee22e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000128 [ 1210.223789] RAX: ffffffffffffffda RBX: 00000000004faa20 RCX: 000000000045c829 [ 1210.231058] RDX: 0000000000000001 RSI: 0000000020000180 RDI: 0000000000000003 [ 1210.238335] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1210.245607] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1210.252886] R13: 0000000000000879 R14: 00000000004cb34e R15: 00007f9ee22e26d4 [ 1210.260247] ppp0: PPP: no memory (VJ comp pkt) 19:49:40 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose={0xbb, 0xbb, 0xbb, 0x4}, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:40 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) [ 1210.299581] IPVS: ftp: loaded support on port[0] = 21 19:49:40 executing program 2 (fault-call:7 fault-nth:4): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:49:40 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose={0xbb, 0xbb, 0xbb, 0x6}, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:40 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:49:42 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:49:42 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:42 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0221490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:49:42 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xffffffffffffffff, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:49:42 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:42 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r4 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r5 = dup(0xffffffffffffffff) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r5, 0x10e, 0x1, 0x0, 0x0) ioctl$int_out(r5, 0xa8c2, &(0x7f0000000180)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x1, 0x0) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYRES16, @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000040)={r7}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f00000000c0)={r8, @in={{0x2, 0x4c20, @multicast2}}, 0x7ff, 0x80}, &(0x7f00000001c0)=0x90) dup(r4) getsockopt$IP_SET_OP_VERSION(r4, 0x1, 0x53, &(0x7f0000000000), &(0x7f0000000040)=0x8) 19:49:43 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null={0x40, 0x40, 0x40, 0x40, 0x40, 0x40, 0x2}]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:43 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:43 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="1621490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:49:43 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:43 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2460209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:49:43 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x10) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:45 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:49:45 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="7fff490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:49:45 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:45 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2460309d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:49:45 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x20000048) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:45 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x8) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 19:49:46 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x600003, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000040)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) 19:49:46 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) pwritev(r0, &(0x7f0000000280)=[{&(0x7f0000000080)="9e09b5f0ad0a1a9ac7be9e05047d8ec8e87a9cdc21456bc14fb186658459b91722f28b78f6d1021408a4884f723f65aa5f83cfc00f853345ec987f2c6d4b2483762e653d32f17b02db7f75347c24017c9fad49446dda663de95ca72eb12ffee95b200351949cd52afcbacae4f0a6a6b8737c4b1c365ceae95e2ee28264fe0563a2110aaf0196d36ae6cf3467363654a44719d152451a4db3f483ab82d6dc475aadc3d5d4e10909a6928f73b5aff51d32461f233f4d376950ebf2ed31d8f17087ac3ab9d436666cc296507b07c363f073cf69d4f1c7b78f867a7173059f27008484bcdaaa401eedb32e72b9ff98c013400ddbeb88696a12", 0xf7}, {&(0x7f0000000180)="690ad955a98ee7b329b1aaffee68c6f61b845a7d5eecc09214c1ff8c84f28258c3070850f8a284dac99ae19d70b4141d9b2e6a079ba38fef4861cdfa0496bf2fb09886a57b2743de4b95e75a942c8ec84fac500085cd97650dafac16ccd417761709c02a896f95b6cff6f910ceca9816b85eedf73ed1287275e5c427545a99422fe59ce1efdcd48567f2ebe1d293a6f26abeca3f29b4cef8e1b8bfab933e0b98d723efdf0cb8792c1374a8650603b34cf2a3c80f4e4e0ee988c541bb8f1000163b66", 0xc2}], 0x2, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:46 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:46 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffff81d2, 0xa, &(0x7f0000000640)=[{&(0x7f0000000080)="753e8d656778010c6bf22ae941b6e1aab3f452069b5455970b5c557af64bad9a4ba3cecbc4d44652e21bd49d655db89e8b1d439518872ab8da77be99a85238aba1b4aacb432e4bada43d92ae3b0c87736819b09bba6becc317765919348ca6c8cb106614b57f5d75ea8b3c0e99e2af637bd4bc0fe8b213e47c4bf14179ea86de1862ed16f6ef0bfa8b178c0c814cdc0294342ae8cfe27155839647b887f2c8553c267a4b589416f9d7cc28df6b7a211747664b080e74", 0xb6, 0x8}, {&(0x7f0000000140)="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", 0xff, 0x5423}, {&(0x7f0000000240)="2369c49c85515c702035c9b3f5d9b897c412e3d7aa94e1bc9c40d1a773ccf17ff52c557182033420abc56b629715d5a10b55025783fb0697b50d8be5bcf1f6572e1eb892007d5c7ada57fc16a448ee950437d14a8602c8f48d7b9f0daadb", 0x5e, 0x7f}, {&(0x7f00000002c0)="16535569ea96cb4a7ef655ddecd389347b587c4d5ee1f968c9608cc362e8396c5aa461816cfb900192ad796fdfb05f32077961f0c9df58add63faafb4e4ffe66a490e66737d1ef95c024547d33c691b50ac676034bef50812756c662dbb4f1d079b9c7cf87a3", 0x66, 0x3}, {&(0x7f0000000340)="1c8edce481ef5c1e97af204c33140a6f527582b3316460fa55cc6e6c1a74d121149586b085c805769d23b04284a146b300c3b74f244d9b48c6c9ce1ddb6e5b061570d83b898222e0aae5e4b223db9eef59f670e450d06bb976563e47038b730ef975cb895cd240b6bb2c2bcf79d87de2c3fd1c1ddf1b5994f43066868e0f376a923e0d3e924ebae19bf8fb269b85dee4fbab7bf7d519bb5a30f6", 0x9a, 0x3c02}, {&(0x7f0000000400)="f7f4eef5856f94c6a2", 0x9, 0x6}, {&(0x7f0000000440)="936df3531519f618032e963cb5e2956a", 0x10, 0x10001}, {&(0x7f0000000480)="e9e7210e857cf3f3951864182313357e6d0d99596ed79ae372529c60234a63b718a43c82bab8d0c48215926ce951d0f8be067571ae845102cdb939fda2a60b3acd3e196d92fe46e5673dca6183d81d972252f44c5273c9629bfb3b7fe66695d4431729840f59e405f281b172985ccfc2f1dacadbf261db15d8d2c36c576bb0dce297a94d4f12eddcd6a3b54873bb2ae3f207e999bfbc94b06ccc3b20583cc00b6b7ceee02e8328beb9e40988c641d81d3f5ee9afa695fd17f9", 0xb9, 0x8}, {&(0x7f0000000540)="acbdbceeaf2d745b02afba5390bf387e5d8978dd681838a6c02e27227622b54ca7394cf65bca32755a8b04cb267beac8fabc3a4b0e27d39b792ae44a6c4715d1962e139930bded67a8fb2fde0fcf3d0c036f", 0x52, 0xffffffffffff4bd7}, {&(0x7f00000005c0)="4de481b2d60070c22d04cd091de7de1a9f40a3ec2e70fe12351e22630efa3549dd945aa740e2cb53e6d26ec8493a9050207a197e9e4b740c6037ae47967837c28219e671505a", 0x46, 0x800}], 0x202042, &(0x7f0000000740)={[{@noacl='noacl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x1000}}, {@noacl='noacl'}, {@fault_injection={'fault_injection', 0x3d, 0x1000}}], [{@smackfsdef={'smackfsdef', 0x3d, 'ppp0%]]{/&securitynodev'}}, {@audit='audit'}]}) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 19:49:46 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490200000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:49:46 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:48 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:49:48 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0x0) sendmsg$AUDIT_SET_FEATURE(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x3fa, 0x4, 0x70bd28, 0x25dfdbfd, {0x1, 0x0, 0x1, 0x1}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4845}, 0x0) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r2) socket$pppl2tp(0x18, 0x1, 0x1) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r3) recvfrom(r3, 0x0, 0x56, 0x40012140, 0x0, 0x0) r4 = shmget(0x2, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$IPC_INFO(r4, 0x3, &(0x7f0000000100)=""/196) 19:49:48 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) setxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000100)=@v2={0x3, 0x3, 0x6, 0x2000000, 0x1000, "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"}, 0x1009, 0x3) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:48 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021491600000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:49:48 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:48 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2460409d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:49:49 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000040)={0x2002, 0x51, 0xb5, 0xcf, 0xdd, "88441cadb74b00fdfafed87821ff3aa1e3b6d8", 0x7c, 0x9}) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000000)=0x7) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 19:49:49 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 19:49:49 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:49 executing program 5: connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:49:49 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490016000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:49:49 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose, 0x3}, [@default, @rose, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom, @bcast, @rose, @rose, @null]}, 0xfffffffffffffffa) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:52 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:49:52 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:52 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="002149003f000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:49:52 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2460509d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:49:52 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @bcast}, [@null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @bcast, @bcast, @rose, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:52 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) 19:49:52 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:49:52 executing program 3: clone(0x180000905, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 19:49:52 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x210300, 0x0) 19:49:52 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:52 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:49:52 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000102441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:49:52 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:49:52 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0x0) recvfrom$phonet(r3, &(0x7f0000000180)=""/49, 0x31, 0x41, &(0x7f00000001c0)={0x23, 0x80, 0x1f, 0x9}, 0x10) read(r0, &(0x7f0000000000)=""/105, 0x69) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000140)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="010000000000151300001b00000008009a000000f486440c100631084f26420000"], 0x3}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=@bridge_delneigh={0x28, 0x1d, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r8, 0x0, 0x4}, [@NDA_LLADDR={0xa, 0x2, @multicast}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_LEAVE_MESH(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r5, @ANYBLOB="020028bd7000fcdbdf254500000008000300", @ANYRES32=r8, @ANYBLOB="378f914ffff43216a3fa0358a0eff020fd345d83d368b1468b68aa323a343a2a460ea6b0fc04a1d1c9f24c0870b30fe819dcbc23ecdd0888c67cf36ce64254b6b7e95ba3dcad871d7916d17fd88fae90516109a8622fc1f969952828b056af9cd44aaca53e3b9cb921b7c5a46419779a2e43fe077c69d858710ce49962fc1a5f96ba00"/145], 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x4048094) 19:49:52 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:52 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2460609d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:49:52 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, 0x0) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:52 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:49:52 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_init_net_socket$ax25(0x3, 0x2, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r0) pipe2$9p(&(0x7f0000000040), 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000000)={0x30, 0x6, 0x0, {0x3, 0x0, 0x7, 0x0, 'keyring'}}, 0x30) r3 = dup(r0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) 19:49:52 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000202441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:49:52 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:49:52 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0xf0) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 19:49:52 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) r3 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x7fff, 0x2000) ioctl$DRM_IOCTL_MODE_GET_LEASE(r3, 0xc01064c8, &(0x7f0000000100)={0x6, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) unshare(0x4040400) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:49:52 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:49:52 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, 0x0) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:52 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x1, @remote, 0xe5}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x1f}, @in={0x2, 0x4e20, @empty}], 0x48) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040)="888a6e1b68595797415103d975dfabf52a399467ffa43eb86980061731f025eecb86e64fdfc4b2db3436a92c4b0262c083a9b5e9a7b72d4517bd05e3de1d32863cdde9e0203d07c8aec4972a87cf68cd44149c64ff7730f7b1a38cbcab36713da636e1fedbe2004d8cbdc5de094132e7559f59be7b683314490b9c80cee9e4f8bb52790ed383fea201042a5d13f7ec790130ffe4146f40150edeca9d6f70be24956917614761a0877c885188d995c8959629b453142e025763cf3b56729a225b66fee361c94c6d1740c6ad37ced491e9521591af3c822b0b9c7f78dd7288360022e6ca7e4d19b7f6dca3a4", 0xeb, 0x4040884, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @local, 0x4}, 0x1c) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000000)=0x3, 0x4) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r5 = dup(r4) setsockopt$inet_dccp_int(r5, 0x21, 0x1, &(0x7f0000000180)=0xff, 0x4) 19:49:52 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_init_net_socket$ax25(0x3, 0x2, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r1) r2 = dup(r0) recvfrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) 19:49:52 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2460709d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:49:52 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000001602441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:49:52 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_init_net_socket$ax25(0x3, 0x2, 0x6) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) socketpair(0x1f, 0x5, 0x2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_SAVE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x8, 0x6, 0x201, 0x0, 0x0, {0x1, 0x0, 0x3}}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4040000) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0x0) r3 = dup(r1) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) 19:49:52 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, 0x0) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:52 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, 0x0, 0x0) read$FUSE(r2, &(0x7f0000000080), 0x1000) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@null, @rose, @default, @netrom, @default, @rose, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null]}, 0x11) listen(r0, 0x0) r3 = semget$private(0x0, 0x0, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000001140)='/dev/vcsa\x00', 0x4941, 0x0) ioctl$USBDEVFS_SETINTERFACE(r4, 0x80085504, &(0x7f0000001180)={0xffff, 0x8}) semctl$IPC_INFO(r3, 0x4, 0x3, 0x0) semop(r3, &(0x7f00000001c0)=[{0x2, 0x7, 0x800}, {0x2, 0x9, 0x800}, {0x4, 0x1f, 0x1800}, {0x0, 0x5, 0x800}], 0x4) semctl$GETZCNT(r3, 0x3, 0xf, &(0x7f0000001080)=""/156) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00'}) r7 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000011c0)=ANY=[], 0x28}}, 0x4000004) r8 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) 19:49:53 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f0000000000)={0x3, @bcast, r3}) 19:49:53 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:53 executing program 3: clone(0x199175385, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 19:49:55 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:55 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:49:55 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000003f02441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:49:55 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2460809d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:49:55 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000200)={0xc, 0x8, 0xfa00, {&(0x7f0000000080)}}, 0x10) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) r5 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r6 = dup(r5) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r6, 0x10e, 0x1, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(r6, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xd8, 0x1, 0x2, 0x201, 0x0, 0x0, {0xa, 0x0, 0xa}, [@CTA_EXPECT_FLAGS={0x8}, @CTA_EXPECT_HELP_NAME={0xe, 0x6, 'sip-20000\x00'}, @CTA_EXPECT_TUPLE={0x94, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev={0xfe, 0x80, [], 0x13}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast2}, {0x14, 0x4, @ipv4={[], [], @rand_addr=0x64010101}}}}]}, @CTA_EXPECT_HELP_NAME={0xe, 0x6, 'snmp_trap\x00'}, @CTA_EXPECT_FN={0x8, 0xb, 'sip\x00'}]}, 0xd8}, 0x1, 0x0, 0x0, 0x10}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 19:49:55 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0x0) setsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000000)=0x4, 0x4) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f0000000040)=""/154, 0x9a}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/187, 0xbb}, {&(0x7f00000011c0)=""/206, 0xce}], 0x4, &(0x7f0000001300)=""/73, 0x49}, 0x100) 19:49:55 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f0000000000)=0x9) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r4) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r4, 0x800c6613, &(0x7f0000000140)=@v2={0x2, @adiantum, 0x0, [], "3611e7a06e04c6574cc7865694fb4c77"}) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$IPSET_CMD_PROTOCOL(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, 0x1, 0x6, 0x801, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}}, 0x40008082) 19:49:55 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:55 executing program 5: connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0x0) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000080)={0x1, 0x0, [{0x2fb, 0x0, 0xb639}]}) listen(0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e22, 0x80000001, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xb8}}}, 0x84) socket$rxrpc(0x21, 0x2, 0x2) 19:49:55 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x20) ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, &(0x7f0000000040)) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) recvfrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) 19:49:55 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000001441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:49:55 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:55 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x340001, 0x0) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r0, 0xc01064ab, &(0x7f00000000c0)={0x0, 0x0, 0x4aa}) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_snmp6\x00') r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$KDSKBSENT(r4, 0x5608, &(0x7f00000006c0)={0x0, "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"}) r5 = dup(r1) recvfrom(r5, 0x0, 0x0, 0x80002020, 0x0, 0x0) setsockopt$CAN_RAW_RECV_OWN_MSGS(r4, 0x65, 0x4, &(0x7f0000000040)=0x1, 0x4) r6 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r7 = dup(r6) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r7, 0x10e, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000100)={r5}) 19:49:58 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:49:58 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, 0x0, 0x0) ioctl$RNDGETENTCNT(r2, 0x80045200, &(0x7f00000011c0)) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r4 = dup(r3) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r4, 0x80184132, &(0x7f0000001180)) r5 = dup(0xffffffffffffffff) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f00000010c0)={@pptp={0x18, 0x2, {0x0, @loopback}}, {&(0x7f0000000080)=""/4096, 0x1000}, &(0x7f0000001080), 0x20}, 0xa0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_FORWARD(r5, 0x40084149, &(0x7f00000012c0)=0x3) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r5, 0x8983, &(0x7f0000001280)={0x0, 'erspan0\x00', {0x1}, 0x81}) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001200)='/dev/cachefiles\x00', 0x64203, 0x0) r7 = creat(&(0x7f0000001300)='./file0\x00', 0xe) ioctl$VT_RELDISP(r7, 0x5605) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r6, 0x8982, &(0x7f0000001240)) 19:49:58 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000000)=0x4, 0x4) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r5 = dup(r4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r5, 0x10e, 0x1, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r5, 0x10e, 0x1, 0x0, 0x2) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x2, 0x8, 0x101, 0x0, 0x0, {0x0, 0x0, 0x8}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000800}, 0xc090) r6 = socket$caif_seqpacket(0x25, 0x5, 0x4) recvfrom(r6, 0x0, 0x0, 0x40002100, 0x0, 0x2c) 19:49:58 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:58 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2460909d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:49:58 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490002000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:49:58 executing program 3: clone(0x1e0080005, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) ioctl$DRM_IOCTL_GET_STATS(r1, 0x80f86406, &(0x7f0000000000)=""/54) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 19:49:58 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x6) 19:49:58 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490016000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:49:58 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CURSOR2(r2, 0xc02464bb, &(0x7f0000000080)={0x3, 0x9, 0x1ff, 0x800, 0x5, 0xc6, 0x359, 0x3, 0x1d99}) listen(r0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 19:49:58 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, 0x0, 0x0, 0x6) [ 1229.084282] IPVS: ftp: loaded support on port[0] = 21 19:49:59 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000160002441be09200010000060100400000", 0x16}], 0x1, 0x0) [ 1229.788569] IPVS: ftp: loaded support on port[0] = 21 19:50:01 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2460a09d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:50:01 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:50:01 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, 0x0, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x88000, 0x0) r4 = dup(r3) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, 0x0, 0x0) r5 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r5) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 19:50:01 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, 0x0, 0x0, 0x6) 19:50:01 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900003f0002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:50:01 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 19:50:01 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r0) accept4$ax25(r0, &(0x7f0000000140)={{0x3, @rose}, [@remote, @null, @null, @netrom, @netrom, @default, @netrom, @netrom]}, &(0x7f00000001c0)=0x48, 0x80800) clone(0x168110805, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x208c0, 0x0) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f00000002c0)={0x1, &(0x7f0000000200)=[{}]}) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r1, 0xc0945662, &(0x7f0000000080)={0x5, 0x0, [], {0x0, @bt={0x5, 0xffff, 0x1, 0x0, 0x3000, 0x68cb, 0x8, 0x7, 0x0, 0x7ff, 0x9, 0x1, 0x7, 0x70406462, 0x10, 0x4, {0x5, 0x80000001}, 0xff, 0x7f}}}) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r5 = dup(r4) recvfrom(r5, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r5, 0x4008af60, &(0x7f0000000000)) 19:50:02 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, 0x0, 0x0, 0x6) 19:50:02 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000018441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:50:02 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x831c00}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1cfacd3f2cbdcdc139351d4138ca5159093e52ea492e55daa5559765d75b6afc8af3bc1d7e51bf0cac05274e64e5d111607a31c6c896a9c52ead99471272baaebf99f148fdbebc2de73f75310806c4377b486ddb97f52e89bea9462650b8d0bf6cc20cd789f0ff5b", @ANYRES16=r1, @ANYBLOB="2000281dba77d8c8f915c1f4bd7000fedbdf25100000"], 0x1c}, 0x1, 0x0, 0x0, 0x10de446131eb6ca7}, 0x4000001) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) r4 = getpgid(0xffffffffffffffff) r5 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r5) r6 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r7 = dup(r6) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r7, 0x10e, 0x1, 0x0, 0x0) kcmp(0xffffffffffffffff, r4, 0x0, r5, r7) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 19:50:02 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180), 0x0, 0x6) 19:50:02 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000020002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:50:02 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2460b09d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:50:04 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:50:04 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180), 0x0, 0x6) 19:50:04 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r2, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r2, 0x0) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000000c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTALL(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x48, r3, 0x100, 0x70bd2d, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x22}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x3}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x48}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) sendmsg$NLBL_MGMT_C_LISTALL(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x14, r3, 0x400, 0x70bd2a}, 0x14}, 0x1, 0x0, 0x0, 0x20000080}, 0x4048000) sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, r3, 0x1, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_MGMT_A_DOMAIN={0x5, 0x1, '\x00'}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @empty}]}, 0x38}, 0x1, 0x0, 0x0, 0x10}, 0x1) r4 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 19:50:04 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000160002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:50:04 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2460c09d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:50:04 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0xb) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x0) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f00000002c0)='./bus\x00', 0x8) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003340)={0x0, 0x3938700}) sched_setattr(0x0, 0x0, 0x0) getpriority(0x1, 0x0) process_vm_readv(0x0, &(0x7f0000002600)=[{&(0x7f0000000540)=""/107, 0x6b}, {&(0x7f0000001bc0)=""/9, 0x9}, {&(0x7f0000000440)=""/233, 0xe9}], 0x3, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000940)={0x4, &(0x7f0000000140)=""/13, &(0x7f00000008c0)=[{0x10001, 0xe9, 0x8, &(0x7f0000000600)=""/233}, {0x49d, 0xb9, 0x7, &(0x7f0000000700)=""/185}, {0x1000, 0x55, 0x41a, &(0x7f00000007c0)=""/85}, {0x9ca, 0x79, 0x8000000, &(0x7f0000000840)=""/121}]}) mount$9p_tcp(&(0x7f0000000180)='127.0.0.1\x00', 0x0, &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000ac0)=ANY=[@ANYRESDEC=0x0, @ANYBLOB="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", @ANYRESDEC, @ANYRESHEX]) mkdir(&(0x7f0000000240)='./file0/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x20}, 0x1, 0x0, 0x0, 0x40c8011}, 0x2000c010) rmdir(&(0x7f00000000c0)='./bus/file0\x00') ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000340)={0x4, 0x70, 0x11, 0x7, 0x0, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x100, 0x0, @perf_config_ext={0x9, 0x5}, 0x4085, 0x0, 0x2, 0x1, 0x1, 0x1, 0xe6}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000980)={{0x1, 0x1, 0x4, 0x1}, 0x80, 0x20}) 19:50:04 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180), 0x0, 0x6) 19:50:05 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000001602441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:50:05 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, &(0x7f0000000000)={0x6c, 0x0, 0x3, @stepwise={0x5, 0xff, 0x4, 0x36c, 0x1000, 0x1}}) openat$adsp1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/adsp1\x00', 0x201, 0x0) getdents(r2, &(0x7f0000000040)=""/104, 0x68) r3 = dup(r0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r5 = dup(r4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r5, 0x10e, 0x1, 0x0, 0x0) r6 = accept$nfc_llcp(r5, 0x0, &(0x7f0000000100)) getpeername(r6, &(0x7f0000000140)=@can, &(0x7f00000001c0)=0x80) ioctl$SNDRV_PCM_IOCTL_DROP(r2, 0x4143, 0x0) 19:50:05 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, 0x0, 0x0) ioctl$SG_SET_DEBUG(r2, 0x227e, &(0x7f0000000000)=0x1) r3 = dup(r0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) 19:50:05 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{0x0}], 0x1, 0x6) 19:50:05 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r4 = dup(r3) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, 0x0, 0x0) ioctl$IOC_PR_REGISTER(r4, 0x401870c8, &(0x7f0000000080)={0x8, 0x7fffffff, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:50:07 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:50:07 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x7) connect$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x33000, @dev={0xfe, 0x80, [], 0x39}, 0x3, 0x1}, 0x20) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) recvfrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00'}, &(0x7f0000000080)=0x1e) 19:50:07 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000003f02441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:50:07 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2460d09d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:50:07 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{0x0}], 0x1, 0x6) 19:50:07 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, 0x0, 0x0) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r3) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r4) r5 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r6 = dup(r5) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r6, 0x10e, 0x1, 0x0, 0x0) r7 = dup(r6) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r7, 0x10e, 0x1, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r7, 0x54a1) r8 = socket$inet_udplite(0x2, 0x2, 0x88) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) 19:50:08 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:50:08 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{0x0}], 0x1, 0x6) 19:50:08 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r1, 0xc008551b, &(0x7f0000000100)=ANY=[@ANYBLOB="090000001500496f2000108527940119ff0000000000000000000000d4708b9b45d710796132e1e83730009c31762ebfedf9001747d781518ee51f36bf32964934"]) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r2, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400204) socket$inet6_sctp(0xa, 0x5, 0x84) 19:50:08 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000202441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:50:08 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)}], 0x1, 0x6) 19:50:08 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000027c0)=ANY=[@ANYBLOB="01000000577444953add70c7574229", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040)={r3}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000002700)={r3, @in6={{0xa, 0x4e23, 0x8000, @remote, 0x78c8}}, 0x8001, 0x4, 0x1}, &(0x7f0000000000)=0x98) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r5 = dup(r4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r5, 0x10e, 0x1, 0x0, 0x0) recvmmsg(r5, &(0x7f0000002480)=[{{&(0x7f0000002680)=@hci, 0x80, &(0x7f0000000680)=[{&(0x7f0000000080)=""/72, 0x48}, {&(0x7f0000000100)=""/66, 0x42}, {&(0x7f0000000180)=""/231, 0xe7}, {&(0x7f0000000280)=""/236, 0xec}, {&(0x7f0000000380)=""/117, 0x75}, {&(0x7f0000000400)=""/181, 0xb5}, {&(0x7f00000004c0)=""/34, 0x22}, {&(0x7f0000000500)=""/101, 0x65}, {&(0x7f0000000580)=""/206, 0xce}], 0x9, &(0x7f0000000740)=""/31, 0x1f}}, {{&(0x7f0000000780)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000002640)=[{&(0x7f0000000800)=""/8, 0x8}], 0x1, &(0x7f0000000880)=""/129, 0x81}, 0x7}, {{&(0x7f0000000940)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000001b40)=[{&(0x7f00000009c0)=""/195, 0xc3}, {&(0x7f0000000ac0)=""/114, 0x72}, {&(0x7f0000000b40)=""/4096, 0x1000}], 0x3, &(0x7f0000001b80)=""/76, 0x4c}, 0x3}, {{&(0x7f0000001c00)=@vsock, 0x80, &(0x7f0000001e80)=[{&(0x7f0000001c80)=""/219, 0xdb}, {&(0x7f0000001d80)=""/159, 0x9f}, {&(0x7f0000001e40)=""/57, 0x39}], 0x3, &(0x7f0000001ec0)=""/35, 0x23}, 0x8a}, {{&(0x7f0000001f00)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000002040)=[{&(0x7f0000001f80)=""/150, 0x96}], 0x1, &(0x7f0000002080)=""/31, 0x1f}, 0x72}, {{0x0, 0x0, &(0x7f0000002400)=[{&(0x7f00000020c0)=""/107, 0x6b}, {&(0x7f0000002140)=""/199, 0xc7}, {&(0x7f0000002240)=""/148, 0x94}, {&(0x7f0000002300)=""/212, 0xd4}], 0x4, &(0x7f0000002440)=""/64, 0x40}, 0x3}], 0x6, 0x10000, &(0x7f0000002600)={0x0, 0x3938700}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000002800)=""/25) ioctl$DRM_IOCTL_MODE_OBJ_SETPROPERTY(r1, 0xc01864ba, &(0x7f0000000840)={0xf52, 0xfff, 0x8, 0xb0b0b0b0}) r6 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r7 = dup(r6) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r7, 0x10e, 0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000002ec0)={'batadv0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000002f00)={'veth1_to_bond\x00', r8}) 19:50:08 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsu\x00', 0x80001, 0x0) getsockopt$inet_mreqsrc(r2, 0x0, 0x28, &(0x7f0000000100)={@loopback, @multicast2, @empty}, &(0x7f0000000140)=0xc) r4 = dup(r3) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, 0x0, 0x0) write$FUSE_STATFS(r4, &(0x7f0000000080)={0x60, 0x0, 0x7, {{0x3, 0x2, 0x80200000000000, 0x9, 0x3ff, 0xab, 0xffffffff, 0x5}}}, 0x60) 19:50:08 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000001602441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:50:08 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2460e09d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:50:08 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)}], 0x1, 0x6) 19:50:08 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000018441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:50:08 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/seq\x00', 0xc041) dup(0xffffffffffffffff) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:50:11 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:50:11 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)}], 0x1, 0x6) 19:50:11 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2460f09d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:50:11 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000018441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:50:11 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r4 = dup(r3) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, 0x0, 0x0) r5 = gettid() setpgid(r5, 0x0) r6 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r7, 0x0) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0x0, r9) setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000080)={r5, r7, r9}, 0xc) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./control\x00', 0x912, 0x3, &(0x7f0000000300)=[{&(0x7f0000000140)="10e6f6240b54ed4998daa1568c7c1e1b8a5b7fa3c51a355b5e84590e068aaa4779e77def34275148727892f4cc80c3bbd90b1ec33b0efbf2e33d2a4e91b18a2a66ca6385d7b8b49b8a147d437a21d3fd58e83d0e94ccc6534319c4b00b8a22c86f674d72834ae432fbdc05ef57dc3c26a2dec6e6af1e9ce7c0e2d9145b762e3ce4757c73301348", 0x87, 0x5}, {&(0x7f0000000200), 0x0, 0x6}, {&(0x7f0000000240)="b79340ab866a64f2bf1ccb7b1341fd5df47ce9abe8604a594dc353a36adca21ddca95373d269ab4882c71f2f609c8618f82dcb50894c6eafa9a02aecf9c63ebe366cf795dbf208f9a92962848b28a99b5ee4b26370a525ceac9f29f379305cdea9e4aa7ee54ce3c540574cd08f7c244cfae220c9882a62c493def78ffd2a7a78c7ed1534d4b782c0cd993b22e76b8cefc155098ca367822d3fe30f", 0x9b}], 0x2800422, &(0x7f0000000380)={[{@inode32='inode32'}, {@logbsize={'logbsize', 0x3d, [0x34, 0x36]}}, {@filestreams='filestreams'}, {@largeio='largeio'}, {@nouuid='nouuid'}, {@gqnoenforce='gqnoenforce'}, {@swalloc='swalloc'}, {@qnoenforce='qnoenforce'}, {@noikeep='noikeep'}], [{@pcr={'pcr', 0x3d, 0x13}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'em0'}}, {@obj_type={'obj_type', 0x3d, '\x00'}}, {@smackfshat={'smackfshat', 0x3d, 'md5sumeth1.'}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:50:11 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x1, 0x40000) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, 0x0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000002c0), 0x106, 0xa}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000380)=[{0x24, 0x0, [0xfffffff7, 0xfac, 0x5, 0xff, 0x2fffe, 0x5, 0x8001, 0x81, 0x2, 0x9, 0xf94e, 0x102, 0xffffffff, 0x633a1524, 0x3]}], r6}}, 0xfffffd9d) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000140)={0x16, 0x98, 0xfa00, {&(0x7f0000000100)={0xffffffffffffffff}, 0x1, r4, 0xc, 0x1, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0), r7}}, 0x18) gettid() r8 = dup(r0) r9 = accept4$inet(r8, &(0x7f0000000000)={0x2, 0x0, @empty}, &(0x7f0000000040)=0x10, 0x40800) ioctl$RTC_VL_CLR(r2, 0x7014) recvfrom(r9, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCGWINSZ(r2, 0x5413, &(0x7f0000000340)) 19:50:11 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)='\x00!I\x00\x00\x00\x00\x00\x00\x00\x00', 0xb}], 0x1, 0x6) 19:50:11 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09203000000060100400000", 0x16}], 0x1, 0x0) 19:50:11 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r0, &(0x7f0000000080)=@generic, &(0x7f0000000100)=0x80, 0x80000) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:50:11 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0x0) r4 = syz_genetlink_get_family_id$batadv(0x0) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="00082dbd7000fcdbcf35110000000500"], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x801) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="7f66d8bd6d1bac8e0000", @ANYRES16=r4, @ANYBLOB="000128bd7000fedbdf250b00000005002a0001000000080039000100008008003b0009000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x80) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r6 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snd/seq\x00', 0x4000) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r6, 0x4058534c, &(0x7f00000002c0)={0x8, 0x120000, 0x99d, 0xfffffffe, 0x3, 0x1}) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x20800, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r7, 0x0, 0x489, &(0x7f00000001c0)={{0x68, @local, 0x4e22, 0x0, 'sh\x00', 0x20, 0xc813, 0x40}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x4, 0x3f, 0x8, 0x8e}}, 0x44) r8 = dup(r5) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r8, 0x10e, 0x1, 0x0, 0x0) ioctl$SG_EMULATED_HOST(r8, 0x2203, &(0x7f0000000100)) 19:50:11 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)='\x00!I\x00\x00\x00\x00\x00\x00\x00\x00', 0xb}], 0x1, 0x6) 19:50:11 executing program 3: r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000000c0)='dns_resolver\x00', 0x0, &(0x7f0000000240)="dee7030522cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f3233a68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fee505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edecdbd8be51d9917c3e033b06b9e9860ab49c3a4f51ab0124b50c3362201a307df03000", 0x85, r0) r1 = request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='lo\x00', r0) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f00000000c0)={r1, 0x9c, 0x32}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'wp512-generic\x00'}}, &(0x7f0000000180)="d55412b483f4850f7894c83edec1de00e6fdf4dd3dc2b64ac17d65c0d9b35a5891d786609233755400295aceb823745ad62095f45ddbef199b1840c5387a44f34d1ad47727b2144a7ac5116e6cf4efa2f965f9968ac809380810d14d451f873dd10627b87eea524e7bf9e6dcdeccef66e52a21765c4f28ac3fd29eb09fcac9f8c0bfc2af4e174178fb8c12fdbd26b5bcc430730a66333bf39ade41ac", &(0x7f0000000240)="d627ff9c79972e18adba7cfc589b863b1292cddf2e2a70cfece2cc65c666e000802ed7d20b85eab3ec7be6fe97684df327e2") clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r2) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r3) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r5 = dup(r4) recvfrom(r5, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1241.632670] Option ':híó5«ó^Å' to dns_resolver key: bad/missing value [ 1241.661012] Option ':híó5«ó^Å' to dns_resolver key: bad/missing value 19:50:14 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:50:14 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsu\x00', 0x244841, 0x0) ioctl$SG_SET_DEBUG(r2, 0x227e, &(0x7f00000001c0)=0x1) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000080)=""/171, 0xab}], 0x1, 0x4) 19:50:14 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09204000000060100400000", 0x16}], 0x1, 0x0) 19:50:14 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)='\x00!I\x00\x00\x00\x00\x00\x00\x00\x00', 0xb}], 0x1, 0x6) 19:50:14 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461009d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:50:14 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = gettid() setpgid(r1, 0x0) ptrace$getregset(0x4204, r1, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/207, 0xcf}) r2 = dup(r0) recvfrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) 19:50:14 executing program 3: pread64(0xffffffffffffffff, &(0x7f0000000080)=""/184, 0xb8, 0x4) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_init_net_socket$ax25(0x3, 0x2, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='./file0/file0\x00') r0 = socket$l2tp6(0xa, 0x2, 0x73) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 19:50:14 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) sendto(r1, &(0x7f0000000000)="e8b483e3c3ac49a38010edbbff5c2eba3660309ef537425023156862ad7c7f2a76bb092afc", 0x25, 0x4000a040, &(0x7f0000000040)=@l2tp6={0xa, 0x0, 0x8, @private1={0xfc, 0x1, [], 0x1}, 0xe3e}, 0x80) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 19:50:14 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000000000000060100400000", 0x11}], 0x1, 0x6) 19:50:14 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, 0x0, 0x0) getsockopt$nfc_llcp(r2, 0x118, 0x4, &(0x7f0000000080)=""/81, 0x51) r3 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r3) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r5 = dup(r4) r6 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r7 = dup(r6) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r7, 0x10e, 0x1, 0x0, 0x0) r8 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r9 = dup(r8) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r9, 0x10e, 0x1, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r9, 0x10e, 0x1, 0x0, 0x2c) ioctl$NS_GET_PARENT(r5, 0xb702, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x9) 19:50:14 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09202010000060100400000", 0x16}], 0x1, 0x0) 19:50:14 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000000000000060100400000", 0x11}], 0x1, 0x6) [ 1245.944141] NOHZ: local_softirq_pending 08 19:50:17 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:50:17 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000000000000060100400000", 0x11}], 0x1, 0x6) 19:50:17 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) utimes(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={{0x0, 0x2710}, {0x0, 0xea60}}) ioctl$VIDIOC_G_DV_TIMINGS(0xffffffffffffffff, 0xc0845658, &(0x7f00000001c0)={0x0, @bt={0x4, 0x3, 0x0, 0x0, 0x100000000, 0x7, 0x100, 0x7ff, 0x7, 0x3, 0x10001, 0xd31, 0x6, 0x5, 0x0, 0x0, {0xc0, 0x6}, 0x40, 0x9}}) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x101, @private1={0xfc, 0x1, [], 0x1}, 0x20}, 0x1c) accept4$bt_l2cap(r2, &(0x7f0000000140)={0x1f, 0x0, @fixed}, &(0x7f0000000180)=0xe, 0x800) 19:50:17 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09216010000060100400000", 0x16}], 0x1, 0x0) 19:50:17 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) ioctl$FBIOPAN_DISPLAY(r1, 0x4606, &(0x7f0000001140)={0x640, 0x20, 0x140, 0x384, 0x6, 0xffffffff, 0x2, 0x2, {0x7fffffff, 0x9, 0x1}, {0x7, 0x688, 0x1}, {0x3, 0x5, 0x1}, {0x7, 0xdff0, 0x1}, 0x3, 0x0, 0x10001, 0x9, 0x1, 0x80000000, 0x3, 0x8, 0x7, 0x4, 0x200, 0x6, 0x4, 0x1, 0x2, 0x7}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000040)={r5}, &(0x7f0000000140)=0x8) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000040)={r7}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001200)={r7, 0x2a, "fc4474594cb6fad218204b22e362bf3448486de7bc12cd6670f7f5c5a02974842878ce35e23e24a21c86"}, &(0x7f0000001240)=0x32) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000000)={r5, 0x1000, "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"}, &(0x7f0000001040)=0x1008) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000001080)={r8, @in6={{0xa, 0x4e21, 0xffffff81, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x3f}}, 0x400, 0xffff, 0x1ff, 0x9, 0x10, 0x47, 0x3}, 0x9c) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 19:50:17 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461109d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:50:17 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000000000000060100400000000000", 0x14}], 0x1, 0x6) 19:50:17 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200020000060100400000", 0x16}], 0x1, 0x0) 19:50:17 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x3f}) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000180)=@req={0x28, &(0x7f0000000140)={'bond0\x00', @ifru_hwaddr=@remote}}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) 19:50:17 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r0) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x410000, 0x0) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB='\x00', @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000080)={r4, 0x8}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000200)=ANY=[@ANYRES32=r5, @ANYBLOB="81ff0300ebff7f000500a7d6ef0fd8f75dab93a7ab89af2527f74689ec2a5e2ca8b025914ca10c5ab9d83c19ae4203f2b20cd57fb75fb94b9d9b16e791301bddf641ecca8607af89c5e4117c824abb5e0000a9ebeb936400000000000000"], 0xe) r6 = dup(r2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r6, 0x10e, 0x1, 0x0, 0x0) ioctl$UI_SET_PHYS(r1, 0x4008556c, &(0x7f0000000040)='syz1\x00') r7 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r8 = dup(r7) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x600c00, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(0xffffffffffffffff, 0x8982, &(0x7f00000001c0)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r8, 0x10e, 0x1, 0x0, 0x0) recvfrom(r8, 0x0, 0x0, 0x23, 0x0, 0xfffffffffffffe94) 19:50:17 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000000000000060100400000000000", 0x14}], 0x1, 0x6) 19:50:17 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200080000060100400000", 0x16}], 0x1, 0x0) 19:50:20 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:50:20 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461309d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:50:20 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000000000000060100400000000000", 0x14}], 0x1, 0x6) 19:50:20 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0x0) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r4) tee(r3, r4, 0x7, 0x9) r5 = dup(r1) sendmsg$nl_route_sched(r5, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@gettaction={0xbc, 0x32, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@action_gd=@TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x18, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7ff}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_gd=@TCA_ACT_TAB={0x10, 0x1, [{0xc, 0xe, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1}}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x30000}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x0, 0x1}}, @action_gd=@TCA_ACT_TAB={0x4c, 0x1, [{0x10, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0xc, 0xc, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0x14, 0x5, 0x0, 0x0, @TCA_ACT_KIND={0xd, 0x1, 'connmark\x00'}}, {0xc, 0xa, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0xc, 0x7, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1}}, @action_gd=@TCA_ACT_TAB={0x4}]}, 0xbc}, 0x1, 0x0, 0x0, 0x4004094}, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 19:50:20 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200000300060100400000", 0x16}], 0x1, 0x0) 19:50:20 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0x0) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0x0) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r5 = dup(r4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r5, 0x10e, 0x1, 0x0, 0x0) r6 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="99e3e83fbe11dd1564e72b9ff4718a365b40d6d6f77656f907438164aeeb31e028166ce7ebe3e2e1129c2ebd5d36713389ae728ce95da08860c1ac6e413d0b1d4963f182ce5d6e8784ff09065013bfd801d8af46a6d751475b201882472f472fd3c8b03b4a432893f57fbbaf217535ff82a694548f9030a54fae68a02029eebdf931bce24b2e9633e66c06d4d5315cc34d1911e54273d4b53668f4108dda32c66001b7", @ANYRES16, @ANYBLOB="010000000000151300001b00000008009a000000f486440c100631084f26420000"], 0x3}}, 0x0) sendmsg$NL80211_CMD_START_AP(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x401004}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)={0x18c, 0x0, 0x1, 0x70bd25, 0x25dfdbff, {}, [@NL80211_ATTR_SMPS_MODE={0x5, 0xd5, 0x2}, @NL80211_ATTR_FTM_RESPONDER={0x16c, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_ENABLED={0x4}, @NL80211_FTM_RESP_ATTR_LCI={0x79, 0x2, "75ad170dc97ecaccaf85f72791bab0ac521c2a0b3a60a215fd2021bb80896110e762f8030bbfe2da30209a222915e5348a0d08d46027312b7db63e838d3a65c328494364d2b3f19c5b747a9d08fa7bf5a92c7584c326ed014f73829f0998028a44978963dd11c2ab39c9407b35dacf8407c3bdac7d"}, @NL80211_FTM_RESP_ATTR_CIVICLOC={0xe3, 0x3, "5a5d9b0fa90cfd3001127f88167069be2d61b5f8a6a42c926f331b0eae8ee91e45c1854393e40815bebc3028de34244aa85f890713e9cd3ecec13aca44f5f0dd7bb90e9e2df287c079a07c1b83bd73ebb65e9f54aa39bc20cad116e0fffee9b70f76425c6ba1c0f59484ba63c87a8be4f49112a678d424500458ee77a9f6a512abe9b492700c6725232db01ddf7362fa8a28f2ac6188182a569f0c9289c42295bca7fc545beee730d06ed98526ee70bc8eaeb9e0b2129f600004eb2f7bc71e86bf8b5818d49b0e8d91a8112ce63e424cc0145fbcaeab4050921a76c44ebd0e"}, @NL80211_FTM_RESP_ATTR_ENABLED={0x4}]}, @NL80211_ATTR_PRIVACY={0x4}]}, 0x18c}, 0x1, 0x0, 0x0, 0xc0}, 0x44000) r7 = dup(r6) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r7, 0x10e, 0x1, 0x0, 0x0) r8 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7f, 0x4080) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r8, 0xc0502100, &(0x7f0000000040)) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r9 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r10 = dup(r9) recvfrom(r10, 0x0, 0x0, 0x0, 0x0, 0x0) 19:50:20 executing program 3: clone(0xa1090200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000000)={0x40, 0x30}) 19:50:20 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="002149000000000000000006010040000000000001", 0x15}], 0x1, 0x6) 19:50:20 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)=0x3) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:50:20 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010200060100400000", 0x16}], 0x1, 0x0) 19:50:20 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="002149000000000000000006010040000000000001", 0x15}], 0x1, 0x6) 19:50:20 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000080)={r0}) setsockopt$inet6_buf(r4, 0x29, 0x2c, &(0x7f00000000c0)="31742dda530e39974f1a94c48d2c07cf9847c18fc6c943ffd4a16718b0a53de4ffd31f7bb98bf4dd869a31a6b09b6f254c57e5c769a929a4aab7a1bbef7312c0924ebfad5790f836d3efdcbe9a96517ad43ef48296b09460bf2a33b4a97ec4cc697c352bfa506ae4484c3bf5f0e4997a623d4d7005da6a6c363e94866c0ec70c01fed71ca8", 0x85) r5 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 19:50:23 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:50:23 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461409d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:50:23 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200011600060100400000", 0x16}], 0x1, 0x0) 19:50:23 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="002149000000000000000006010040000000000001", 0x15}], 0x1, 0x6) 19:50:23 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose, 0x5}, [@rose, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:50:23 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0x0) fcntl$dupfd(r3, 0x406, r0) socket$pppoe(0x18, 0x1, 0x0) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r5 = dup(r4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r5, 0x10e, 0x1, 0x0, 0x0) r6 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r6) r7 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r8 = dup(r7) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r8, 0x10e, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000000)={'veth0_to_bond\x00', {0x2, 0x4e24, @broadcast}}) r9 = dup(r1) recvfrom(r9, 0x0, 0x0, 0x0, 0x0, 0x0) 19:50:23 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x3, 0xca) r1 = dup(r0) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=@bridge_delneigh={0x28, 0x1d, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r6, 0x0, 0x4}, [@NDA_LLADDR={0xa, 0x2, @multicast}]}, 0x28}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000080)={@mcast2, 0xa, r6}) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 19:50:23 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x0) 19:50:23 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000000)={0x10000, 0x17000, 0x9, 0x401, 0x4}) 19:50:23 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010016060100400000", 0x16}], 0x1, 0x0) 19:50:23 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r3) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000080)={r3}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f00000000c0)=[@in={0x2, 0x4e22, @multicast2}], 0x10) 19:50:23 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:50:26 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:50:26 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0x0) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000000)=0x2, 0x4) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0x0) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r4) r5 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r6 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r7 = dup(r6) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r7, 0x10e, 0x1, 0x0, 0x0) ioctl$TIOCEXCL(r7, 0x540c) dup(r5) r8 = dup(r5) recvfrom(r8, 0x0, 0x0, 0x0, 0x0, 0x0) 19:50:26 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be0920001003f060100400000", 0x16}], 0x1, 0x0) 19:50:26 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r4 = dup(r3) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000280)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private1}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) ioprio_set$uid(0x0, r5, 0x1) ioctl$KVM_GET_API_VERSION(r4, 0xae00, 0x0) r6 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r7 = dup(r6) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r7, 0x10e, 0x1, 0x0, 0x0) bind$inet6(r7, &(0x7f0000000200)={0xa, 0x4e24, 0x9, @private2={0xfc, 0x2, [], 0x1}, 0x1400000}, 0x1c) r8 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r9 = dup(r8) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) ioctl$KDGKBLED(r9, 0x4b64, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:50:26 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461509d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:50:26 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x4ec0d241eacc75d7) dup(r0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000000)) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) recvfrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r3) ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f0000000100)) ioctl$sock_SIOCDELRT(r2, 0x890c, &(0x7f0000000080)={0x0, @llc={0x1a, 0x204, 0x0, 0x1, 0x7f, 0x4, @broadcast}, @l2tp={0x2, 0x0, @loopback, 0x4}, @ax25={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x6}, 0xfffe, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000040)='syz_tun\x00', 0xe785, 0xffffffffffffffff, 0x20}) 19:50:26 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0x0) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000000)=0x5) 19:50:26 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose, @default, @netrom, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) listen(r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, {&(0x7f0000000080)=""/164, 0xa4, &(0x7f0000000140)=""/136, 0x2, 0x1}}, 0x48) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0xffff) 19:50:26 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010002060100400000", 0x16}], 0x1, 0x0) 19:50:26 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) r2 = socket$nl_crypto(0x10, 0x3, 0x15) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r4 = dup(r3) r5 = gettid() setpgid(r5, 0x0) rt_sigqueueinfo(r5, 0x19, &(0x7f0000000100)={0x29, 0x8, 0x1}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, 0x0, 0x0) ioctl$TCSETX(r4, 0x5433, &(0x7f00000000c0)={0x5, 0x800, [0x2, 0x3347, 0xff81, 0x10, 0x3f], 0x5}) getpeername(r2, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, &(0x7f0000000080)=0x80) recvfrom(r1, 0x0, 0x0, 0x40012051, 0x0, 0x0) 19:50:26 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:50:26 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0xe) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 19:50:29 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x10000, 0x0, 0x0) read$usbmon(0xffffffffffffffff, &(0x7f0000000000)=""/183, 0xb7) 19:50:29 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010016060100400000", 0x16}], 0x1, 0x0) 19:50:29 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:50:29 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461609d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:50:29 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, 0x0, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000180)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2a}}, @in={0x2, 0x4e22, @broadcast}, @in6={0xa, 0x4e23, 0x100, @dev={0xfe, 0x80, [], 0x44}, 0x8}], 0x3c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="01000097", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) r5 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r6 = dup(r5) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r6, 0x10e, 0x1, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000100)=@assoc_value={r4, 0x1}, 0x8) ioctl$IMSETDEVNAME(r2, 0x80184947, &(0x7f0000000080)={0x4bf3, 'syz1\x00'}) listen(r0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8983, &(0x7f00000000c0)={0x2, 'team_slave_0\x00', {0x4}, 0x3a}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) 19:50:29 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060200400000", 0x16}], 0x1, 0x0) 19:50:29 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, 0x0, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280)='nl80211\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=@bridge_delneigh={0x28, 0x1d, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r4, 0x0, 0x4}, [@NDA_LLADDR={0xa, 0x2, @multicast}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_DEL_STATION(r0, &(0x7f00000004c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000480)={&(0x7f00000002c0)={0x188, r1, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@NL80211_ATTR_STA_SUPPORTED_CHANNELS={0x18, 0xbd, [0x897, 0x4, 0xb28f, 0x7f, 0x6, 0x6, 0x800, 0x9, 0x2, 0x81]}, @NL80211_ATTR_STA_SUPPORTED_OPER_CLASSES={0xfd, 0xbe, "c56fff11157ca71e8f9589d70a7c89ec49ffdcd3c49ef8a3ef77ff4b055b0ef546cbab900857e73719fee76fd506c489efd82edae1983c005465ca112f2be6337cfcf84a1df2df1c33bed7cc43af386506119f1211494225ec49374923b194ead544101c3b2338c5d6910300120bc750ebd53615c3e07a74a84e446612ef86705e490e9b14fcd68684be76e20551b75b7ef0b7ac705090070d7420e002137a626310a27d8f0d706717851b30f46b689f011c18035d5fea1aa84517c40236bbc6e31603ad9369c9ec3f5a78111d13644864cf2226fe4c34a8128037c061f9246435d4efed7e1601dc60798abe8464d298c420e6ee88aa633b7c"}, @NL80211_ATTR_STA_VLAN={0x8, 0x14, r4}, @NL80211_ATTR_STA_TX_POWER={0x6, 0x114, 0x6}, @NL80211_ATTR_STA_FLAGS2={0xc, 0x43, {0x8, 0x3}}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x40}, @NL80211_ATTR_STA_EXT_CAPABILITY={0x20, 0xac, "e45b1c0bcaf5a1b7ce28bc60388bf726c1935eea5d7648ab6158d43f"}, @NL80211_ATTR_STA_AID={0x6, 0x10, 0x535}, @NL80211_ATTR_STA_PLINK_STATE={0x5, 0x74, 0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x7}]}, 0x188}, 0x1, 0x0, 0x0, 0x20000030}, 0x4000) r6 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r7 = dup(r6) recvfrom(r7, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x20000, 0x0) r9 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r9, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="01000000eeabf0a9b18aa2565b7f7e37312475cf9d6ce162ba24c0a8df3cb781a45d4bbc79e99285273cc12ad417f7156770f1b64b9cfa96e01891333dd2c55f636ba59cb0d9eef3ef1bc9f94d5cedcc3940e816861479eaee880a1a1430a41333d8f43a9330c68306358007638f480200027b92b99363dda26b26a1a9a60428d353988cc67fac2b51698133834be5569fb4d416c778fdcbd9f57102d8c91e11a5b0d38c812c9242ccde8da1e49df3b03dbe2c", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r9, 0x84, 0x66, &(0x7f0000000040)={r10}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r7, 0x84, 0x73, &(0x7f00000000c0)={r10, 0xc2, 0x10, 0x7, 0x4}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f0000000140)={r11, 0x0, 0x0, 0x800, 0x7fff}, &(0x7f0000000180)=0x14) 19:50:29 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:50:29 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000400)={0xbd, 0x5}) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 19:50:29 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r3) accept4(r3, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000200)=0x80, 0x80000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000000300)) r5 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r6 = dup(r5) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r6, 0x10e, 0x1, 0x0, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000000c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="1709000000000000000001000000050007000000000008000900020067c558150658eee4cb25974a54000000060002000100000008000a00000000000800"], 0x44}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r6, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, r8, 0x4, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x8}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x8}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r9 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x800, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r9, 0xc0086420, &(0x7f00000001c0)) 19:50:29 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461709d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:50:29 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060800400000", 0x16}], 0x1, 0x0) 19:50:29 executing program 3: msync(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) clock_adjtime(0x1, &(0x7f0000000000)={0x8, 0x6, 0x5, 0x40, 0x10001, 0x5, 0x0, 0xffffffff, 0x80000000000003, 0x2, 0x8, 0x0, 0xffffffff, 0x7, 0x80000001, 0x5, 0x100000000, 0x0, 0x80000001, 0x1, 0x2, 0x19, 0x2, 0x8002, 0x0, 0x7c6e820d}) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r2) ioctl$FITHAW(r2, 0xc0045878) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x22000, 0x0) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r4) r5 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r6 = dup(r5) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="00c6f69136bdf3d60c6d572b237dbf8489e9b8857f90ce5047aa06356c7bf60b8dcdd55faf95aa48b83f0cd11bdf2e17b299a2ac0aa82feb761d", @ANYRES16=r7, @ANYBLOB="010000000000000000000100000000000000014100000020001700000000000000006574683a76657468305f766972745f7769666900"], 0x3c}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r7, 0x100, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x9}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x4805) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r6, 0x10e, 0x1, 0x0, 0x0) bind$vsock_stream(r6, &(0x7f0000000180)={0x28, 0x0, 0x2711, @hyper}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000140)={r4}) 19:50:30 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_init_net_socket$ax25(0x3, 0x2, 0xc3) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r0) r1 = dup(r0) truncate(&(0x7f0000000040)='./file0\x00', 0x7) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1260.077829] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1260.091890] Unknown ioctl -1073191904 [ 1260.140201] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1261.312888] NOHZ: local_softirq_pending 08 19:50:32 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:50:32 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060003400000", 0x16}], 0x1, 0x0) 19:50:32 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r3, 0x0, 0x488, &(0x7f0000000080)={{0x9c, @local, 0x4e22, 0x4, 'sed\x00', 0x32, 0x1, 0x52}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e23, 0x0, 0x7, 0x5, 0xffe00000}}, 0x44) dup(r1) 19:50:32 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BLKRRPART(r1, 0x125f, 0x0) 19:50:32 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f246120ed3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:50:32 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 19:50:32 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000040)={0x5, 0x0, 0xffffffff}) clone(0x81093300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r4 = dup(r3) recvfrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) 19:50:32 executing program 5: connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:50:32 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060102400000", 0x16}], 0x1, 0x0) 19:50:32 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f246120fd3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:50:32 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r2, 0xc06c4124, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}) 19:50:32 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060116400000", 0x16}], 0x1, 0x0) 19:50:35 executing program 5: socket$nl_rdma(0x10, 0x3, 0x14) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) rseq(&(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x5, 0xa66, 0x8, 0x304}, 0x5}, 0x20, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:50:35 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:50:35 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461214d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:50:35 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400200", 0x16}], 0x1, 0x0) 19:50:35 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x80340, 0x0) sendmsg$NFT_MSG_GETRULE(r1, &(0x7f00000015c0)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001580)={&(0x7f0000001500)={0x48, 0x7, 0xa, 0x62e2e0cec2544ef4, 0x0, 0x0, {0x5, 0x0, 0x6}, [@NFTA_RULE_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_RULE_ID={0x8}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x1}, @NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x3}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x2}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x24800) r2 = dup(r0) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) vmsplice(r3, &(0x7f0000001400)=[{&(0x7f0000001480)="3e36439c138f5bb4c76a7511d033ccde63a5eabfb6d8f7f82100000000000000e17de962b3ff909fc43f87bc31615976efd5fa82fb12", 0x36}, {&(0x7f00000000c0)="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", 0x1000}, {&(0x7f00000010c0)="c9712faffae1dceb7c9371814d26177099105257043f805650dd0a47f91655b59fef459c2270083be8f6ebe35253e1d907776f2374e5436bda716fb9e9e66aba10138faa1e32cf642f098a673fea17e98d5cf4a4281c236e5e9d76c794c0f1e2221e8ba1427c7a5f8930d3fc4b9460aa45a5a09f42884300bce2e3596a8c5baf132c124c54082dbf8ededcee47ab66d39a1feb9376deb1c7001b5cd6729e169b6b87e6a3f670996ada489137f4640657665a79b150b99f", 0xb7}, {&(0x7f0000001180)="fecb6cb48a890650b38d26fa4b48393987ed069d5f92517376d9e117ede32827378d3503d03756c4c26d97d5ed83d4b06c2c68f3f435241f69d7a6d0ac4a1751d71c5e837cb32706552a9a2a6947282f116b12aa44c1f30acbcfb15150aa7e147b0ae5674bcce3f2e958897641cee0786d2e5acf1c3d165a908e768f2fafdfbb7a9cc7063381f69fd67c193a4bddf525d97d38f7de13f44a96f2d59fbc711375b945e9c7f49cec5dff790eb7643633", 0xaf}, {&(0x7f0000001240)="8ba9d4d81ae400dd40d24f7b4ec9b1ad34abd0d43ce24b6cb06009e39188660dd8d0387fe10596f799b97f1b", 0x2c}, {&(0x7f0000001280)="c968414fd9ad", 0x6}, {&(0x7f00000012c0)="47b53d76184a3beb4c51fba02a37b57ba6389b53a1dc194b06d3a3bc135f4e16803ecbda4d32d3079326e754e9c575a10f6991f656b6b6506459f0cda84f0fa12a657d76e0049f24cedc8e7372", 0x4d}, {&(0x7f0000001340)="f59a193552fa674fc0130f52c62aa3cfa520723989ebbdb312f80faf6fd74522bf1c60da28d47cd46d88325218af6de2bdb89b121e0ed3a690f0336b0bc9d8df12c0625014f9bd2501b2c5194b707f78e5686dea08c52d830a954afbd64fd4f48641ff752f0265db9bfbafa88523f990d3b28a390585f7076c00388ead3fb403b98e0db5133e669942e15f74c85f81224e480e387139ad03001584d74cac06c052f3cce355014150f3438a489370af", 0xaf}], 0x8, 0x0) recvfrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r5 = dup(r4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r5, 0x10e, 0x1, 0x0, 0x0) getsockopt$netlink(r5, 0x10e, 0x6, &(0x7f0000000000)=""/5, &(0x7f0000000040)=0x5) 19:50:35 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 19:50:35 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000340)={@void, @val={0x5, 0x0, 0x0, 0x0, 0x7e}, @mpls={[], @ipv4=@dccp={{0x5, 0x4, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x84, 0x0, @remote, @local}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "f426e6", 0xe, "070403"}, "8cbfc12abc282c27820fd9118600820e1106001100000000940a5a17e89fb5f1d3debc8540002b4ef424297d1138b27a369d0b112b33df4c366b67856c210a24c3df6373d0ca47c3c2885da770edbd1ee5bde967a6ffffffc1f40004"}}}}, 0x8a) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 19:50:35 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, 0x0, 0x0) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r4 = dup(r3) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, 0x0, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f0000000080)={0xa10000, 0x3, 0x2, r4, 0x0, &(0x7f0000000040)={0x930ad9a7c09feb3a, 0x0, [], @p_u32=&(0x7f0000000000)=0x3}}) ioctl$USBDEVFS_GETDRIVER(r5, 0x41045508, &(0x7f00000000c0)={0xb87, "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"}) r6 = dup(r0) recvfrom(r6, 0x0, 0x0, 0x0, 0x0, 0x0) 19:50:35 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100401600", 0x16}], 0x1, 0x0) 19:50:35 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c525739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:50:35 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) getsockopt$ax25_int(r1, 0x101, 0xc, &(0x7f0000000000), &(0x7f0000000040)=0x4) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 19:50:36 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400016", 0x16}], 0x1, 0x0) 19:50:36 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0xcc) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x2880, 0x0) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f0000000040)={{&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x2) r2 = dup(r0) recvfrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) 19:50:38 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:50:38 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0xf0) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 19:50:38 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556229a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:50:38 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) dup(0xffffffffffffffff) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0xc3) r2 = dup(r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, 0x0, 0x0) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r3) r4 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video0\x00', 0x2, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r6) r7 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r8 = dup(r7) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r8, 0x10e, 0x1, 0x0, 0x0) ppoll(&(0x7f00000000c0)=[{0xffffffffffffffff, 0x200}, {r2, 0x400}, {r3, 0x4212}, {r4, 0x304}, {r5, 0x84}, {r6, 0x20d3}, {r8, 0x4008}, {r0, 0x3334ce243e0f3df6}], 0x8, &(0x7f0000000100), &(0x7f0000000140)={[0x3]}, 0x8) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose, @default, @netrom, @bcast, @rose, @bcast, @null]}, 0x48) listen(0xffffffffffffffff, 0x2002) r9 = socket$inet_udplite(0x2, 0x2, 0x88) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) 19:50:38 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 19:50:38 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be0920001000006010040003f", 0x16}], 0x1, 0x0) 19:50:38 executing program 3: clone(0x1110440, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x8) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x80042, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = dup(r0) recvfrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) 19:50:38 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556239a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:50:38 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) recvfrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) 19:50:38 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r4 = dup(r3) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, 0x0, 0x0) ioctl$KVM_X86_SETUP_MCE(r4, 0x4008ae9c, &(0x7f0000000080)={0x1f, 0x1, 0x20}) 19:50:39 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:50:39 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, 0x0, 0x0) r3 = gettid() setpgid(r3, 0x0) r4 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000040)=0xc) setresuid(0x0, r5, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000000000)={0xaae, 0xe95, {r3}, {r5}, 0xfffffffffffffffc, 0x9}) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:50:41 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:50:41 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$SIOCGETNODEID(r2, 0x89e1, &(0x7f0000000080)={0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:50:41 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556259a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:50:41 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:50:41 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:50:41 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:50:41 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$pptp(0x18, 0x1, 0x2) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:50:42 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c5562a9a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:50:42 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:50:42 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r4 = dup(r3) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, 0x0, 0x0) accept(r4, &(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @initdev}}, &(0x7f0000000100)=0x80) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x4001fd) 19:50:42 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:50:42 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, 0x0, 0x0) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r4 = dup(r3) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, 0x0, 0x0) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB='7\x00\x00\x00', @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000040)={r6}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000000080)={r6, 0x92, "64a96850b890fb29c3daf0c8a21d2b36899f544ced75f19ee6a4309dbcc499478b4ef89b8893ed1e4de9197ff224e17d6add7c7e3a1aa6f94b3dc4defa928d3427c681c50ebb1184112cdea71b681ad65216e0ffe64179ed138db5a93313ab07a46c4dbfcd32e6fd0f4ba2bc9553063d2ed190857aa213fdab737a0840223487363a5717ff9b589c883fd400b90a1442a317"}, &(0x7f0000000140)=0x9a) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000180)={0x1000, 0x0, 0x96c, 0x200, r7}, &(0x7f00000001c0)=0x10) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) 19:50:44 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:50:44 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:50:44 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c5562b9a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:50:44 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, 0x0, 0x0) ioctl$SIOCPNDELRESOURCE(r2, 0x89ef, &(0x7f0000000080)=0x4) listen(r0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 19:50:44 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:50:44 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:50:44 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) setsockopt$inet6_MCAST_LEAVE_GROUP(r2, 0x29, 0x2d, &(0x7f0000000080)={0x200, {{0xa, 0x4e23, 0x7, @private0={0xfc, 0x0, [], 0x1}, 0x5}}}, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 19:50:45 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:50:45 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c5562c9a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:50:45 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r7) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001d00010007000000", @ANYRES64=r7, @ANYBLOB="000004000a005d29d205767395ed0da1e5c20200bbd741ca5dbbe59399c8db2ebbbb"], 0x28}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', r5}) listen(r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 19:50:45 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400002", 0x16}], 0x1, 0x0) 19:50:45 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400016", 0x16}], 0x1, 0x0) 19:50:47 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:50:47 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000080)=0x8000, 0x4) 19:50:47 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c5562d9a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:50:47 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:50:47 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:50:47 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='io.stat\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000180)=@gcm_128={{0x304}, "d21bee06bf00648a", "ff635c97e59aff43814871436a4173d9", "35c4fcb1", "659dfdf5ef7753a1"}, 0x28) r3 = dup(r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r3, 0x10f, 0x81, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r4 = dup(r0) recvfrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x4042, 0x0) r6 = dup(0xffffffffffffffff) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r6, 0x10e, 0x1, 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r6, 0x9208, 0x2) r7 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000001c0)={0x7fff, 0x0, 0x10003, 0x3}) ioctl$DRM_IOCTL_SG_FREE(r5, 0x40106439, &(0x7f0000000080)={0x6, r8}) r9 = dup(r7) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r9, 0x10e, 0x1, 0x0, 0x0) ioctl$NS_GET_PARENT(r9, 0xb702, 0x0) 19:50:47 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:50:47 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c5562e9a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:50:47 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = gettid() setpgid(r1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000180)='net/sctp\x00') ioctl$UI_DEV_CREATE(r2, 0x5501) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x101080, 0x0) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000040)={r7}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f00000000c0)={r7, @in={{0x2, 0x4e21, @rand_addr=0x64010102}}, 0x5, 0xff, 0x5, 0x401, 0x8, 0xfffeffff, 0x1f}, 0x9c) 19:50:48 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = gettid() setpgid(r1, 0x0) rt_sigqueueinfo(r1, 0x29, &(0x7f0000000040)={0x37, 0x1002, 0x9}) r2 = dup(r0) recvfrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) 19:50:48 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f00000000c0), 0x4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0x0) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000080)={0x9, 0x7, [0x20, 0x7, 0x8, 0x800, 0x4], 0x2}) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r3, 0x5, &(0x7f0000000000)="dac7121751102fee565dca6b592407be962522977c27e478d765255aeb92a83cb877553da01e9594f687751d87c18a3c0e7f57e9a0d969942d034398d926d0796cb74cfb2158786002390bc1b1b5e4d42c7a") 19:50:48 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:50:50 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:50:50 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x3, 0xce) r1 = dup(r0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x56be05, 0x0) write$FUSE_BMAP(r2, &(0x7f0000001180)={0x18, 0xfffffffffffffff5, 0x7, {0x8000}}, 0x18) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r4 = dup(r3) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000100)=0x3b7, 0x8) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r4, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x20, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x3}, @L2TP_ATTR_DATA_SEQ={0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x20004000}, 0x0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$X25_QBITINCL(r2, 0x106, 0x1, &(0x7f0000000140), 0x4) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000001000)={0x0, 0x1b0, &(0x7f00000012c0)="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", &(0x7f00000011c0)="c6bcb17d8797ae0412fb40227f0f3217f803aa978d6bb302c18428c90b4f1a93b51232614781f4a32ef89a0979be255ac4596559608ab153ff1a5a59e96fad525f6bd9bbae12afab1fe704c710b776bab5941c68c4bd60e5035bc5c0aab11b7b8b3dfd247cb893f05ea9172d1c3b75fe01bad1305fb56041493b1d8cf4fda0d68372927b39c135ce0dd1e2634dba38f2e485efdbf02b576e7802a60178b7438bd8e7e9caa5a5ef60abb5f7a49e885fb1dcf29b8e1257341bcd03721cf1346e4e209a53bf42c747f2f063b5f25ca71e2fa0d27b4e18ef409705", 0x1000, 0xd9}) 19:50:50 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556309a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:50:50 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:50:50 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:50:50 executing program 5: openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x135000, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @default}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @default, @bcast, @bcast, @rose, @null]}, 0x48) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000100)) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000240)={0x0, 0x3ff, 0xf65, @broadcast, 'dummy0\x00'}) listen(r0, 0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000140)=0x6) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x40, 0x0) r4 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ocfs2_control\x00', 0x8000, 0x0) lgetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='system.posix_acl_access\x00', &(0x7f0000000300)=""/183, 0xb7) getsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$VT_DISALLOCATE(r3, 0x5608) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 19:50:50 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0x0) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x1, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r4, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0xa8, r5, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x48, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2a}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0x39}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x27}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0xa8}}, 0x90) getsockopt$netrom_NETROM_T2(r3, 0x103, 0x2, &(0x7f0000000000)=0x4a7, &(0x7f0000000040)=0x4) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 19:50:50 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:50:50 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556589a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:50:51 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r0) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f0000000040)=@req3={0x0, 0x26f, 0x6, 0x9, 0x9, 0x5, 0x6}, 0x1c) r4 = dup(r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, 0x0, 0x0) mount(&(0x7f0000000140)=@md0='/dev/md0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='nsfs\x00', 0x100080, &(0x7f0000000200)='@\x00') r5 = syz_init_net_socket$nl_rdma(0xffffffffffffffff, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_GET(r5, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x1409, 0x400, 0x70bd2d, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x4004040}, 0x890) recvfrom(r4, 0x0, 0x0, 0x102, 0x0, 0x0) 19:50:51 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@null, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0x0) getpeername$inet(r3, &(0x7f0000002140), &(0x7f0000002180)=0x10) r4 = dup(r1) r5 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r6 = socket$pppoe(0x18, 0x1, 0x0) r7 = gettid() setpgid(r7, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f00000021c0)='/dev/video35\x00', 0x2, 0x0) r8 = getpgrp(r7) ioctl$sock_FIOSETOWN(r6, 0x8901, &(0x7f0000002100)=r8) r9 = dup(r5) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r9, 0x10e, 0x1, 0x0, 0x0) ioctl$KVM_SET_NESTED_STATE(r9, 0x4080aebf, &(0x7f0000000080)={{0x0, 0x0, 0x80, {0x0, 0x111000, 0x3}}, "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", "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"}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 19:50:51 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r3, 0x641e) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0x0) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f0000000080)={0x324, "217339f993fa36b3527a2abbbc90362771da3aa7f6344766c6534e2721de6f3c", 0x6da18e011bd2517b, 0x9, 0x5b, 0x20000, 0x4}) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r4) r5 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r5) recvfrom(r5, 0x0, 0x0, 0x4001a021, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r4, 0xc058534f, &(0x7f0000000000)={{0xf8, 0x3}, 0x0, 0x601c, 0x3, {0x1f, 0x40}, 0x7f, 0x5b}) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000100)=0x1, 0x4) 19:50:53 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:50:53 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:50:53 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, 0x0, 0x0) setsockopt$inet_buf(r2, 0x0, 0x20, &(0x7f0000000000)="f47cd14ccb169070f1e61e916a42d8283e1db7547bd4fad650adec91285667517d4f985a76d0e3b31ee7413b864b3c009e253881c593cc25ca8a768bfeb6c53dcd366353ef6583a2", 0x48) r3 = dup(r0) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r5 = dup(r4) socket$l2tp6(0xa, 0x2, 0x73) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r5, 0x10e, 0x1, 0x0, 0x0) capget(&(0x7f0000000080)={0x20080522}, &(0x7f00000000c0)={0x9, 0x0, 0xaa61, 0x6, 0x4, 0x9}) r6 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r7 = dup(r6) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r7, 0x10e, 0x1, 0x0, 0x0) r8 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r9 = dup(r8) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r9, 0x10e, 0x1, 0x0, 0x0) accept4$ax25(r9, &(0x7f0000000140)={{0x3, @bcast}, [@default, @remote, @rose, @default, @default, @null, @null, @null]}, &(0x7f0000000100)=0x48, 0x800) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) 19:50:53 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x550040, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000015c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000001580)={&(0x7f0000000100)={0x145c, 0x6, 0x3, 0x402, 0x70bd26, 0x25dfdbff, {0x2, 0x0, 0x3}, [@typed={0x5, 0x1c, 0x0, 0x0, @str='\x00'}, @typed={0x8, 0x2e, 0x0, 0x0, @uid=r3}, @nested={0xd6, 0x5, 0x0, 0x1, [@typed={0x2d, 0x93, 0x0, 0x0, @binary="60647b6c999a019141430174dbf12743c0f102711f91566050afb2d659ea743a2de9a071c839692940"}, @typed={0x5, 0x79, 0x0, 0x0, @str='\x00'}, @generic="f00ac88d3b12760e81dfb7f25250f55a46028a3268ba65cd202a035ef7c15ef69f2908dda9fc713d91788030333b475b83f45cca3d703f341025429bf2b71bce70132ded9ff6bdd335c91f5e983b436c064634865e2d42741231199020a0efe40acab37ae22240d067369bb24b4db02d88a646881a44e4f0d4789a3ee88f19e092d0b863100fda29f0115fd80c983467d439a644d0fba5734795"]}, @generic="3c805ec8b23212d367eb7e2e7686939615b229403b94b61487da890ba03c8f2f44c9b2afd13e46b29bf1ed4435cc06a31ebb4ace8f908e70cd3ebd2f8e47fc147987bb61d6b358d6cdc6adaa67450b99609e56ec583250f517e8b04056ab52205dd6e80929f782c0b60542e99de720338071d8c7c5da7fbadade2da17ffa38742fbcb72f8a363e71bc366d1e020260404ca9b0d5ede06cf4cf0b", @nested={0x198, 0x46, 0x0, 0x1, [@typed={0xc, 0xf, 0x0, 0x0, @u64=0xffffffffffffff81}, @generic="335ceb8c8417565bb750fa49ccd5ef7fb1be5ce9e34332ddc636ce57f665e6a503087aa92869772324f99cfd41995bffd05a107af971f9b257485c4621143b5583c287fb6f560e5482c251e118e004b816f37b6df1f5b67ee818ef0ed1e351186bae5102017460319ad12973261aedbdae2b3afdb0231e1931a79430f12e634a07708603b7f4b6d3ced847a99f37531a0ad5da721fd69af3bb7c9a6b73a5329a2a8310685c56", @generic="ba313687f000d2f6248fa8212f6c1f573d959c", @generic="811580c964274e5c5de0d653335f75804c1b222f165aec60b7f0adbaa1aac895d10ce51ff45cedd47a7a935147b619d61e0f2b091eaf4dbf9ef769a7b5df565a1a9c4a580197d42c46d8424cdd33422ce35e26ae3b81de5d59e5e9b9b4ae99f5198310b61e48dae25ce6a4dfcbc834f65f25333bb5f184ec6c7fee360d3d76a980426b4cc795c8e20de045e75303f54a0475e25ac23fdb5d558808207e238cf336d2a6141b5cd6ff813262fb124fa24a87b31df99eb32ffc067823eb6e5717ef6557ec14c91690b5efd295b7a40a1a"]}, @nested={0x103, 0x46, 0x0, 0x1, [@typed={0x14, 0x4, 0x0, 0x0, @ipv6=@local}, @typed={0x14, 0x78, 0x0, 0x0, @ipv6=@local}, @generic="78db5b01c4cc37507335d1070ed3e2aa25c16e5ab5956aca6d17a7ae66e4c2d042bf0a4ab077136f65e77351846df980955c7fb74d6500f54e73d167eb8397ab31becf5081b571d0aa958700929f379f0d605c85e84021ca559e1e9f07275cee1c0a10ffa6a874f60e1a111574eff320552b86a112b87e88268b0dbb91c037bd0302a21b2f7c7c339a1f61aaee33e3266a1e0ae5028703d1d7971d", @typed={0x17, 0x64, 0x0, 0x0, @str='posix_acl_access\x14,\x00'}, @typed={0x8, 0x49, 0x0, 0x0, @ipv4=@private=0xa010100}, @typed={0x14, 0x6b, 0x0, 0x0, @ipv6=@private1}, @typed={0x8, 0x70, 0x0, 0x0, @u32=0x6}]}, @typed={0xc, 0x50, 0x0, 0x0, @u64=0x6}, @typed={0x14, 0x76, 0x0, 0x0, @ipv6=@mcast1}, @generic="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", @typed={0x8, 0x8a, 0x0, 0x0, @fd=r0}]}, 0x145c}, 0x1, 0x0, 0x0, 0x805}, 0x1) listen(r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 19:50:54 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:50:54 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556639a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:50:54 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x4040, 0x0) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f00000000c0)=[{{0x1}, {0x3, 0x1}}, {{0x4, 0x1, 0x0, 0x1}, {0x0, 0x1, 0x0, 0x1}}, {{0x0, 0x0, 0x1}, {0x4, 0x1, 0x1}}, {{0x1, 0x1}, {0x0, 0x1}}, {{0x3, 0x1, 0x1}, {0x4, 0x1, 0x0, 0x1}}, {{0x1, 0x1}, {0x1, 0x1, 0x0, 0x1}}, {{0x4, 0x1}, {0x2, 0x1, 0x1}}, {{0x3, 0x0, 0x0, 0x1}, {0x1, 0x1, 0x1, 0x1}}, {{0x4, 0x1, 0x1, 0x1}, {0x0, 0x1}}], 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0xca) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000000)={0xb6, 0xb, 0x4, 0x400000, 0x5c, {0x0, 0xea60}, {0x1, 0x0, 0x80, 0x7, 0x5, 0x1, "3a8d2323"}, 0x80, 0x1, @fd=r3, 0x1, 0x0, r1}) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000004, 0x30, r4, 0x46618000) r5 = dup(r1) recvfrom(r5, 0x0, 0x0, 0x0, 0x0, 0x0) 19:50:54 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:50:54 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) personality(0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, 0x0, 0x0) connect$netrom(r2, &(0x7f0000000000)={{0x6, @null}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose, @null, @netrom, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose, @null]}, 0x48) listen(r0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) r5 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r5) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f0000000080)={{0x4, 0x0, @identifier="739e800a62f8cbd40e25431385477c2f"}}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 19:50:54 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) close(r1) preadv(r0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/58, 0x3a}, {&(0x7f0000000080)=""/23, 0x17}, {&(0x7f00000000c0)}, {&(0x7f0000000200)=""/199, 0xc7}, {&(0x7f0000000100)}], 0x5, 0x3) r5 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r6 = dup(r5) recvfrom(r6, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1284.244427] audit: type=1326 audit(1588967454.148:37): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=722 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45f66a code=0x0 19:50:54 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:50:54 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) acct(&(0x7f0000000000)='./file0\x00') recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 19:50:56 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:50:56 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r4 = dup(r3) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, 0x0, 0x0) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000240)={0x8, 0x3, 0x4, 0x100000, 0x5, {}, {0x4, 0x5, 0x4, 0xad, 0x7, 0x2, "52edef77"}, 0x5, 0x3, @userptr=0x8, 0x0, 0x0, r4}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r5, 0xc01864b1, &(0x7f0000000300)={0x1, 0x2, 0x1, 0x4, &(0x7f00000002c0)=[{0x7, 0x398, 0x4, 0x401}, {0x5, 0x2, 0x8, 0x3f}, {0xc34e, 0x5, 0x80, 0x6}, {0x101, 0xfff, 0x1, 0xfffb}]}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, 0x0, 0x0) connect$netrom(r2, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup(r6) r8 = dup(0xffffffffffffffff) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r8, 0x10e, 0x1, 0x0, 0x0) r9 = syz_genetlink_get_family_id$batadv(0x0) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="00082dbd7000fcdbcf35110000000500"], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x801) sendmsg$BATADV_CMD_SET_MESH(r8, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, r9, 0x300, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x48040}, 0xae80b870b284d337) sendmsg$AUDIT_USER_TTY(r7, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="f4000000640400082abd7000fedbdf2528fc3c79b2a74ca4ff64b178d81cc34bb3e4d1b85544894e373eebc3044c0720c648589031a1cd13bd1f7e6bfeff1f0b7e9518621f386cb598a9824a7d764b2624d81e43d29f516e211aa972847867114663b3b60b7b0ea8d797ec61710a0f0844dfbcc6464defdec3a888f6fa60708c1f09995832766258f5c4ac0e19062a330c7c50375286be4e56ce7f856ce688640e6af3de7c0d0ec005c9b8e0a1a7e7017f59c746d1832c5078c28801591eb7aab663ede30ca8747c3c8f917ae118824b3f310c74338b9601d6c65d60b7127bbe347659b736d6cdcda44ba76a127d44c1890bfd00"], 0xf4}, 0x1, 0x0, 0x0, 0x80}, 0x20000004) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) 19:50:56 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x4e20, @local}, {0x2, 0x4e24, @remote}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x3a}}, 0x44, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)='gretap0\x00', 0x6, 0x7ff, 0x1}) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 19:50:56 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:50:57 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:50:57 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556649a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:50:57 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x200286, 0x0) sendto$x25(r1, &(0x7f00000000c0)="63ece1073d015f6d25a53a555c2eda412c27c7bb3a99033e0d354987bb84d87af7091bcae66b25805101ba1fae4a14f159477effd267424ed2f0a9ccaa", 0x3d, 0x280420d1, &(0x7f0000000100)={0x9, @null=' \x00'}, 0x12) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 19:50:57 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x4ec0d241eacc75d7) dup(r0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000000)) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) recvfrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r3) ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f0000000100)) ioctl$sock_SIOCDELRT(r2, 0x890c, &(0x7f0000000080)={0x0, @llc={0x1a, 0x204, 0x0, 0x1, 0x7f, 0x4, @broadcast}, @l2tp={0x2, 0x0, @loopback, 0x4}, @ax25={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x6}, 0xfffe, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000040)='syz_tun\x00', 0xe785, 0xffffffffffffffff, 0x20}) 19:50:57 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:50:57 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r4 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r5 = dup(0xffffffffffffffff) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r5, 0x10e, 0x1, 0x0, 0x0) ioctl$int_out(r5, 0xa8c2, &(0x7f0000000180)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x1, 0x0) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYRES16, @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000040)={r7}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f00000000c0)={r8, @in={{0x2, 0x4c20, @multicast2}}, 0x7ff, 0x80}, &(0x7f00000001c0)=0x90) dup(r4) getsockopt$IP_SET_OP_VERSION(r4, 0x1, 0x53, &(0x7f0000000000), &(0x7f0000000040)=0x8) 19:50:57 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x20000356}], 0x1, 0x0) 19:50:57 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @bcast, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:50:59 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:50:59 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556699a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:50:59 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x7ffff000}], 0x1, 0x0) 19:50:59 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, 0x0, 0x0) connect$netrom(r2, &(0x7f0000000000)={{0x6, @rose}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose, @default, @netrom, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose, @null]}, 0xffffffffffffffce) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r4 = dup(r3) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r4, 0x4010640d, &(0x7f0000000200)={0x13}) listen(r0, 0x0) r5 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r6 = dup(r5) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r6, 0x10e, 0x1, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r6, 0x40045731, &(0x7f00000001c0)=0x8) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r9, 0x20, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x3}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'bond_slave_1\x00'}]}, 0x30}}, 0x4000840) 19:51:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:51:00 executing program 3 (fault-call:7 fault-nth:0): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:00 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, 0x0, 0x0) ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, &(0x7f0000000080)=0x17) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 19:51:00 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 19:51:00 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x2, 0x0) [ 1290.316944] FAULT_INJECTION: forcing a failure. [ 1290.316944] name failslab, interval 1, probability 0, space 0, times 0 [ 1290.333418] CPU: 1 PID: 872 Comm: syz-executor.3 Not tainted 4.19.121-syzkaller #0 [ 1290.341152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1290.350604] Call Trace: [ 1290.353236] dump_stack+0x188/0x20d [ 1290.356889] should_fail.cold+0xa/0x1b [ 1290.360800] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1290.365934] __should_failslab+0x115/0x180 [ 1290.370184] should_failslab+0x5/0xf [ 1290.373931] kmem_cache_alloc_node+0x260/0x730 [ 1290.378929] __alloc_skb+0xba/0x5b0 [ 1290.382690] ? skb_trim+0x180/0x180 [ 1290.386848] ? security_file_permission+0x84/0x220 [ 1290.391787] ppp_write+0x9a/0x280 [ 1290.395279] do_iter_write+0x460/0x5e0 [ 1290.399172] vfs_writev+0x1b3/0x2f0 [ 1290.402791] ? vfs_iter_write+0xa0/0xa0 [ 1290.406770] ? lock_downgrade+0x740/0x740 [ 1290.411136] ? check_preemption_disabled+0x41/0x280 [ 1290.416161] ? iterate_fd+0x350/0x350 [ 1290.419973] ? wait_for_completion+0x3c0/0x3c0 [ 1290.424562] do_pwritev+0x1b6/0x270 [ 1290.428181] ? do_writev+0x330/0x330 [ 1290.431903] ? __ia32_sys_clock_settime+0x260/0x260 [ 1290.437087] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1290.441875] ? trace_hardirqs_off_caller+0x55/0x210 [ 1290.446897] ? do_syscall_64+0x21/0x620 [ 1290.450885] do_syscall_64+0xf9/0x620 [ 1290.454706] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1290.459917] RIP: 0033:0x45c829 [ 1290.463113] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1290.482096] RSP: 002b:00007f1d89423c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000128 [ 1290.489811] RAX: ffffffffffffffda RBX: 00000000004faa20 RCX: 000000000045c829 [ 1290.497084] RDX: 0000000000000001 RSI: 0000000020000180 RDI: 0000000000000003 [ 1290.504403] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 19:51:00 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c5566c9a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) [ 1290.511677] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1290.518948] R13: 0000000000000879 R14: 00000000004cb34e R15: 00007f1d894246d4 19:51:00 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x501200, 0x0) ioctl$VIDIOC_G_SLICED_VBI_CAP(r1, 0xc0745645, &(0x7f0000000100)={0x6e, [0x9, 0x1, 0x3, 0x1, 0x0, 0xffff, 0xb7f7, 0x50, 0x7, 0x100, 0x1, 0x20, 0xfffd, 0x4, 0xfff9, 0xa5, 0x8, 0x1, 0x200, 0x8, 0x2, 0x6, 0x4, 0xfa6, 0x7fff, 0x2, 0x400, 0xfff, 0x7, 0x6, 0x8001, 0x5, 0x1f, 0x6, 0x1, 0x1, 0x0, 0x7f, 0x364a, 0x6, 0x401, 0x7fff, 0x1, 0xf1, 0x3, 0x6c3, 0x25, 0xa68a], 0x3}) listen(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x8101, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 19:51:00 executing program 3 (fault-call:7 fault-nth:1): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:00 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x8, 0x0) [ 1290.704821] FAULT_INJECTION: forcing a failure. [ 1290.704821] name failslab, interval 1, probability 0, space 0, times 0 [ 1290.731203] CPU: 1 PID: 899 Comm: syz-executor.3 Not tainted 4.19.121-syzkaller #0 [ 1290.739064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1290.748431] Call Trace: [ 1290.751051] dump_stack+0x188/0x20d [ 1290.754708] should_fail.cold+0xa/0x1b [ 1290.758618] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1290.763756] __should_failslab+0x115/0x180 [ 1290.768013] should_failslab+0x5/0xf [ 1290.771748] kmem_cache_alloc_node_trace+0x272/0x750 [ 1290.776881] __kmalloc_node_track_caller+0x38/0x70 [ 1290.781832] __kmalloc_reserve.isra.0+0x39/0xe0 [ 1290.786521] __alloc_skb+0xef/0x5b0 [ 1290.790173] ? skb_trim+0x180/0x180 [ 1290.793826] ? security_file_permission+0x84/0x220 [ 1290.798775] ppp_write+0x9a/0x280 [ 1290.802255] do_iter_write+0x460/0x5e0 [ 1290.806176] vfs_writev+0x1b3/0x2f0 [ 1290.809914] ? vfs_iter_write+0xa0/0xa0 [ 1290.813906] ? lock_downgrade+0x740/0x740 [ 1290.818074] ? check_preemption_disabled+0x41/0x280 [ 1290.823135] ? iterate_fd+0x350/0x350 [ 1290.826956] ? wait_for_completion+0x3c0/0x3c0 [ 1290.831565] do_pwritev+0x1b6/0x270 [ 1290.835210] ? do_writev+0x330/0x330 [ 1290.839136] ? __ia32_sys_clock_settime+0x260/0x260 [ 1290.844167] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1290.848936] ? trace_hardirqs_off_caller+0x55/0x210 [ 1290.853965] ? do_syscall_64+0x21/0x620 [ 1290.857951] do_syscall_64+0xf9/0x620 [ 1290.861771] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1290.866969] RIP: 0033:0x45c829 [ 1290.870176] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1290.889214] RSP: 002b:00007f1d89423c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000128 [ 1290.896922] RAX: ffffffffffffffda RBX: 00000000004faa20 RCX: 000000000045c829 [ 1290.904309] RDX: 0000000000000001 RSI: 0000000020000180 RDI: 0000000000000003 [ 1290.911584] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1290.919008] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1290.926277] R13: 0000000000000879 R14: 00000000004cb34e R15: 00007f1d894246d4 19:51:00 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c5566f9a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:00 executing program 3 (fault-call:7 fault-nth:2): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:00 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x300, 0x0) [ 1291.134585] FAULT_INJECTION: forcing a failure. [ 1291.134585] name failslab, interval 1, probability 0, space 0, times 0 [ 1291.146060] CPU: 1 PID: 928 Comm: syz-executor.3 Not tainted 4.19.121-syzkaller #0 [ 1291.153787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1291.163264] Call Trace: [ 1291.165902] dump_stack+0x188/0x20d [ 1291.169587] should_fail.cold+0xa/0x1b [ 1291.173496] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1291.178623] ? mark_held_locks+0xf0/0xf0 [ 1291.182712] __should_failslab+0x115/0x180 [ 1291.187056] should_failslab+0x5/0xf [ 1291.190791] kmem_cache_alloc_node+0x55/0x730 [ 1291.195299] ? skb_dequeue+0x129/0x180 [ 1291.199292] __alloc_skb+0xba/0x5b0 [ 1291.202939] ? skb_trim+0x180/0x180 [ 1291.206587] ? lockdep_hardirqs_on+0x196/0x5d0 [ 1291.211323] ? _raw_spin_unlock_irqrestore+0xa0/0xe0 [ 1291.216462] __ppp_xmit_process+0xb5c/0x16c0 [ 1291.220897] ? lock_downgrade+0x740/0x740 [ 1291.225082] ? ppp_receive_nonmp_frame+0x1f50/0x1f50 [ 1291.230223] ppp_xmit_process+0x14f/0x300 [ 1291.234530] ppp_write+0x205/0x280 [ 1291.238093] do_iter_write+0x460/0x5e0 [ 1291.242156] vfs_writev+0x1b3/0x2f0 [ 1291.245908] ? vfs_iter_write+0xa0/0xa0 [ 1291.249991] ? lock_downgrade+0x740/0x740 [ 1291.254154] ? check_preemption_disabled+0x41/0x280 [ 1291.259247] ? iterate_fd+0x350/0x350 [ 1291.263065] ? wait_for_completion+0x3c0/0x3c0 [ 1291.267669] do_pwritev+0x1b6/0x270 [ 1291.271313] ? do_writev+0x330/0x330 [ 1291.275045] ? __ia32_sys_clock_settime+0x260/0x260 [ 1291.280084] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1291.284856] ? trace_hardirqs_off_caller+0x55/0x210 [ 1291.289893] ? do_syscall_64+0x21/0x620 [ 1291.293894] do_syscall_64+0xf9/0x620 [ 1291.297723] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1291.302945] RIP: 0033:0x45c829 [ 1291.306155] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1291.325527] RSP: 002b:00007f1d89423c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000128 [ 1291.333506] RAX: ffffffffffffffda RBX: 00000000004faa20 RCX: 000000000045c829 [ 1291.340789] RDX: 0000000000000001 RSI: 0000000020000180 RDI: 0000000000000003 [ 1291.348052] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1291.355421] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1291.362696] R13: 0000000000000879 R14: 00000000004cb34e R15: 00007f1d894246d4 [ 1291.370059] ppp0: PPP: no memory (VJ comp pkt) 19:51:03 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:51:03 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0x0, r4) r5 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r6 = dup(r5) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r6, 0x10e, 0x1, 0x0, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0x0, r9) r10 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0x0, r11) setxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {0x1, 0x1}, [{}, {}, {0x2, 0x2}, {}, {0x2, 0x1}, {0x2, 0x1}], {0x4, 0x2}, [{0x8, 0x6}, {}, {0x8, 0x5}, {}, {0x8, 0x5, r4}, {0x8, 0x1, r7}, {0x8, 0x4, r9}, {0x8, 0x0, r11}], {0x10, 0x6}, {0x20, 0x6}}, 0x94, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:51:03 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556709a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:03 executing program 3 (fault-call:7 fault-nth:3): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:03 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0xffffff1f, 0x0) 19:51:03 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1293.316873] FAULT_INJECTION: forcing a failure. [ 1293.316873] name failslab, interval 1, probability 0, space 0, times 0 [ 1293.328301] CPU: 1 PID: 956 Comm: syz-executor.3 Not tainted 4.19.121-syzkaller #0 [ 1293.336020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1293.345402] Call Trace: [ 1293.348015] dump_stack+0x188/0x20d [ 1293.351674] should_fail.cold+0xa/0x1b [ 1293.355589] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1293.360824] ? find_held_lock+0x2d/0x110 [ 1293.365022] ? kmem_cache_alloc_node+0x5b2/0x730 [ 1293.369805] __should_failslab+0x115/0x180 [ 1293.374082] should_failslab+0x5/0xf [ 1293.377812] kmem_cache_alloc_node_trace+0x59/0x750 [ 1293.382858] __kmalloc_node_track_caller+0x38/0x70 [ 1293.387802] __kmalloc_reserve.isra.0+0x39/0xe0 [ 1293.392504] __alloc_skb+0xef/0x5b0 [ 1293.396146] ? skb_trim+0x180/0x180 [ 1293.399954] ? lockdep_hardirqs_on+0x196/0x5d0 [ 1293.404555] ? _raw_spin_unlock_irqrestore+0xa0/0xe0 [ 1293.409682] __ppp_xmit_process+0xb5c/0x16c0 [ 1293.414117] ? lock_downgrade+0x740/0x740 [ 1293.418287] ? ppp_receive_nonmp_frame+0x1f50/0x1f50 [ 1293.423529] ppp_xmit_process+0x14f/0x300 [ 1293.427696] ppp_write+0x205/0x280 [ 1293.431259] do_iter_write+0x460/0x5e0 [ 1293.435170] vfs_writev+0x1b3/0x2f0 [ 1293.438812] ? vfs_iter_write+0xa0/0xa0 [ 1293.442801] ? lock_downgrade+0x740/0x740 [ 1293.446964] ? check_preemption_disabled+0x41/0x280 [ 1293.452010] ? iterate_fd+0x350/0x350 [ 1293.455833] ? wait_for_completion+0x3c0/0x3c0 [ 1293.460435] do_pwritev+0x1b6/0x270 [ 1293.464075] ? do_writev+0x330/0x330 [ 1293.467799] ? __ia32_sys_clock_settime+0x260/0x260 [ 1293.472830] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1293.477597] ? trace_hardirqs_off_caller+0x55/0x210 [ 1293.482631] ? do_syscall_64+0x21/0x620 [ 1293.486784] do_syscall_64+0xf9/0x620 [ 1293.490609] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1293.495809] RIP: 0033:0x45c829 [ 1293.499034] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1293.518024] RSP: 002b:00007f1d89423c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000128 [ 1293.525731] RAX: ffffffffffffffda RBX: 00000000004faa20 RCX: 000000000045c829 [ 1293.532999] RDX: 0000000000000001 RSI: 0000000020000180 RDI: 0000000000000003 [ 1293.540365] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1293.547629] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1293.554909] R13: 0000000000000879 R14: 00000000004cb34e R15: 00007f1d894246d4 [ 1293.562287] ppp0: PPP: no memory (VJ comp pkt) 19:51:03 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556729a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:03 executing program 3 (fault-call:7 fault-nth:4): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:03 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CURSOR2(r2, 0xc02464bb, &(0x7f0000000080)={0x1, 0x0, 0x3f, 0x4, 0x9ec1, 0xf7, 0x5, 0xfff, 0xffffffae}) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r4 = dup(r3) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, 0x0, 0x0) ioctl$KVM_GET_REG_LIST(r4, 0xc008aeb0, &(0x7f00000000c0)={0x4, [0x425e, 0x3fffc0000000000, 0x1, 0x0]}) listen(r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r7) listen(r7, 0x101) 19:51:03 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556749a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:03 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x2) 19:51:03 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:06 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:51:06 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x16) 19:51:06 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @default}, [@rose, @rose, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose, @bcast, @bcast]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r4 = dup(r3) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, 0x0, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000000080)={0x3, 0x0, 0x90, 0x6, 0x9, 0x42, 0x8, 0x85, 0x5, 0x0, 0x9, 0x9, 0x20, 0x2}, 0xe) 19:51:06 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="02214900000000000000000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:06 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556759a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:06 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 19:51:06 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r4 = dup(r3) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_FORWARD(r4, 0x40084149, &(0x7f0000000080)=0x100) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:51:06 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x1600) 19:51:06 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="16214900000000000000000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:06 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 19:51:06 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556789a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:06 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x3f00) 19:51:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:51:09 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="7fff4900000000000000000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:09 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) accept(r0, &(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x80) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r4, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r4, 0x0) r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000000c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTALL(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x48, r5, 0x100, 0x70bd2d, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x22}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x3}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x48}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) sendmsg$NLBL_MGMT_C_LISTALL(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x14, r5, 0x400, 0x70bd2a}, 0x14}, 0x1, 0x0, 0x0, 0x20000080}, 0x4048000) sendmsg$NLBL_MGMT_C_ADD(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x60, r5, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x2}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x3}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x21}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast2}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @dev={0xac, 0x14, 0x14, 0xd}}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @empty}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}]}, 0x60}, 0x1, 0x0, 0x0, 0x20}, 0x4000000) r6 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 19:51:09 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c226972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:09 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x1000000) 19:51:09 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 19:51:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:51:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:51:09 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 19:51:09 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x2000000) 19:51:09 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214902000000000000000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:51:09 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, 0x0, 0x0) ioctl$sock_ax25_SIOCDELRT(r2, 0x890c, &(0x7f0000000080)={@null, @bcast, 0x5, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) listen(r0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 19:51:09 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x16000000) 19:51:09 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214916000000000000000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:09 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c2c6972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:09 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x3f000000) 19:51:09 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900160000000000000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:10 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c2e6972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:10 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x82, 0x0) ioctl$NBD_SET_SIZE(r1, 0xab02, 0x1) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 1302.260450] NOHZ: local_softirq_pending 08 [ 1302.264732] NOHZ: local_softirq_pending 08 19:51:12 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 19:51:12 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x100000000000000) 19:51:12 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="002149003f0000000000000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:12 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:51:12 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c2f6972c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:12 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000440), r3, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x1, {0xa, 0x4e22, 0x9, @dev={0xfe, 0x80, [], 0x28}, 0x6}, r3}}, 0x38) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r5 = dup(r4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r5, 0x10e, 0x1, 0x0, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r5, 0x119, 0x1, &(0x7f0000000100), 0x4) r6 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r8 = dup(r7) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r8, 0x10e, 0x1, 0x0, 0x0) fsetxattr(r8, &(0x7f0000000240)=ANY=[@ANYBLOB="757371722e2f6465762f696e66696e6962616e642f72646d1b00008000bc9e6e49e41c0641eecffadbd6e644499e62f2a9c9af6356a433bee6a64635c93eab1df5c033103d3505f836d62d61d42b5d1c37ad054bc667ae0eca757353d03cdcd376a88725a8e4b31aefd382410d5add863da2547bf6cd00"/133], &(0x7f00000001c0)='/md5sum\x00', 0x8, 0x1) dup(0xffffffffffffffff) signalfd4(0xffffffffffffffff, &(0x7f0000000200)={[0xaa]}, 0x8, 0x800) 19:51:12 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000001000000000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:12 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x200000000000000) 19:51:12 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000002000000000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:12 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r4 = dup(r3) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(r4, 0xc0585609, &(0x7f00000000c0)={0x8001, 0xa3f36c26d7be26f5, 0x4, 0x40000, 0x800, {r5, r6/1000+10000}, {0x4, 0xd, 0x1, 0x98, 0xec, 0x7, "ce1b751a"}, 0xaf6, 0x4, @userptr=0x3, 0x81, 0x0, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001400)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x150, 0x150, 0x2, [@enum={0xb, 0x2, 0x0, 0x6, 0x4, [{0x6, 0x6}, {0x7, 0x910b}]}, @typedef={0x0, 0x0, 0x0, 0x8, 0x5}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x2, 0x4}, {0xb, 0x4}, {0x6, 0x2}, {0x9, 0x2}, {0x0, 0x4}]}, @restrict={0x6, 0x0, 0x0, 0xb, 0x5}, @volatile={0x2}, @func_proto={0x0, 0x9, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0x5, 0x3}, {0xc, 0x2}, {0x7, 0x2}, {0x7, 0x4}, {0x8, 0x1}, {0x2, 0x2}, {0x10, 0x3}, {0x10}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x2, 0x1}, {0xc}, {0xf, 0x2}, {0xf, 0x2}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x0, 0x3}, {0xa, 0x2}, {0x2, 0x1}, {0xd, 0x1}]}, @struct={0xa, 0x3, 0x0, 0x4, 0x0, 0xffff, [{0x1, 0x4, 0x7}, {0x1, 0x3, 0x73d3}, {0xb, 0x0, 0xff}]}]}}, &(0x7f0000000400)=""/4096, 0x16a, 0x1000, 0x1}, 0x20) r8 = syz_genetlink_get_family_id$batadv(0x0) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="00082dbd7000fcdbcf35110000000500"], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x801) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) getsockname$packet(r10, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r12 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=@bridge_delneigh={0x28, 0x1d, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r11, 0x0, 0x4}, [@NDA_LLADDR={0xa, 0x2, @multicast}]}, 0x28}}, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r7, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, r8, 0x200, 0x70bd25, 0x2, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r11}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x840}, 0x4004000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:51:12 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x1600000000000000) 19:51:13 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c662272c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:15 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 19:51:15 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000016000000000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:15 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x3f00000000000000) 19:51:15 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:51:15 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f00000000c0)='./file0\x00', 0x412080, 0x1c) r2 = dup(r1) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f0000000080)={0x62, @remote, 0x4e24, 0x4, 'nq\x00', 0x19, 0x9, 0x6}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:51:15 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c662572c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:15 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:51:15 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000003f000000000601004000000000000100", 0x16}], 0x1, 0x0) [ 1305.817958] IPVS: set_ctl: invalid protocol: 98 172.20.20.187:20004 19:51:15 executing program 5: syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @default]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r1) recvfrom$ax25(r1, &(0x7f00000000c0)=""/241, 0xf1, 0x40000100, &(0x7f00000001c0)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x4}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x48) r2 = socket$inet_udplite(0x2, 0x2, 0x88) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video2\x00', 0x2, 0x0) socket$l2tp(0x2, 0x2, 0x73) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 1305.861576] IPVS: set_ctl: invalid protocol: 98 172.20.20.187:20004 19:51:15 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:51:15 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000010601004000000000000100", 0x16}], 0x1, 0x0) 19:51:16 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c662c72c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:18 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 19:51:18 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x3, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) r4 = gettid() setpgid(r4, 0x0) r5 = getpgrp(r4) sched_setparam(r5, &(0x7f0000000040)=0x8a7) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) r6 = socket$inet6_dccp(0xa, 0x6, 0x0) r7 = dup(0xffffffffffffffff) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r7, 0x10e, 0x1, 0x0, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000340)={r3, 0xffffffffffffffff, 0x4, r7}, 0x10) accept$inet6(r6, 0x0, &(0x7f0000000000)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) r8 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r8) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f00000001c0)={0x3, 'xfrm0\x00', {0x8}, 0x20}) pwritev(r8, &(0x7f0000000480)=[{&(0x7f0000000180)="0021490000009fe09200010000060100400000", 0x13}, {&(0x7f0000000080)="f8fe2150702227839abd4abf91ada10328d94c5e5e4b76eaad867fe218ee226f002f99f85f747bfd6e4e90bc20d4e25fa559381946c6d58b99716e69925fc1654f114e89f8c6ac825557f7877fdb", 0x4e}, {&(0x7f00000001c0)}, {&(0x7f0000000240)="8df2b663a65d999a27e7492c5be7076d81205317e67b12dda8dcc05e8987df1580b6a28f0ea404cc6f2118db7a3377952f3fd3f9b3c8e33f25c93d14a1d9e9b34a078cfae744fe055b5f06befe9852ad4a03ee7beb355d4cc59a0639104f0b1d80f2d103a73baa2348259f9feac35b26d2efd728c3486e2bec68fadde1598943b96d67ee0f6043c42422c5d20d847f9b3fc71ca25f9599fde46fbc45c4f7d4f1f9cee910fc28ae6b9cca7c7dcb9d2ce5e4e69b58babc2073d8de2ad490e0b60ee1bed4c95ad79bd3ed3925d6b118e50900b1ae993b3b325155933ebcbf597b62f4cf0fdc4e5faf9f76539be444", 0xed}], 0x4, 0x0) 19:51:18 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000020601004000000000000100", 0x16}], 0x1, 0x0) 19:51:18 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:51:18 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666922c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:18 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, 0x0, 0x0) connect$netrom(r2, &(0x7f0000000000)={{0x6, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r4 = dup(r3) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x2}, &(0x7f0000000180)=0x8) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0xffffffffffffff31, &(0x7f0000000040)={&(0x7f0000000400)=ANY=[@ANYBLOB="fac797de00fcf7e8e64fa0c941998f0ff7d316e09e9582b1b9b149d5855c5ca753cc73e25644a21e87f2f313ffb3db069d89dd4a3c8dee011af5c74dc608dc1613333729df9fab651165b57576f24655209a89754eddc32e8717713a9a465083d4644b2ad7796492ca6cab3d926642ce6961eae4c2cbfabfb24fd93a168e94846e52874cb180b747e2a560abf675302a12600f03b734fa29f6fed3a37600", @ANYRES32, @ANYRESHEX=r7], 0x28}, 0x1, 0x0, 0x0, 0x41095}, 0x20044014) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000001980)={'batadv_slave_0\x00', r7}) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f00000019c0)=r9) listen(r0, 0x5) r10 = socket$inet_udplite(0x2, 0x2, 0x88) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) 19:51:18 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000160601004000000000000100", 0x16}], 0x1, 0x0) 19:51:18 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:51:18 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x47e50e4) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:51:18 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:51:18 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose, 0xfffffffd}, [@default, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000019340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000192c0)={0x6, 0x200, 0x58, {0x0, 0xea60}, {0x77359400}, {0x0, 0x0, 0x0, 0x1}, 0x1, @can={{0x2, 0x1, 0x0, 0x1}, 0x6, 0x0, 0x0, 0x0, "4000000000000017"}}, 0x48}, 0x1, 0x0, 0x0, 0x48040}, 0x80) sendmsg$RDMA_NLDEV_CMD_DELLINK(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB="30000000041429bd7000fcdbdf250800010000000000080001000100000008000100020000000900010002000000"], 0x30}, 0x1, 0x0, 0x0, 0x40080}, 0x4008010) listen(r0, 0x0) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r4 = dup(r3) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, 0x0, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f00000000c0)='cpuset.effective_mems\x00', 0x0, 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f00000002c0)=""/102400) ioctl$TIOCL_SELLOADLUT(r5, 0x541c, &(0x7f0000000100)={0x5, 0x9, 0x8, 0x1000, 0x4}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r7, 0x84, 0x20, &(0x7f0000000080)=0xfff, 0x4) 19:51:18 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 19:51:21 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 19:51:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 19:51:21 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="002149000000000000003f0601004000000000000100", 0x16}], 0x1, 0x0) 19:51:21 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x101000, 0x0) bind$bt_hci(r2, &(0x7f0000000040)={0x1f, 0x4, 0x7}, 0x6) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = fcntl$dupfd(r0, 0x0, r3) ioctl$PPPIOCSMAXCID(r4, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:51:21 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666925c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:21 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose, @bcast]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, 0x0, 0xedf0406dddd6d3f9, 0x70bd2d, 0x25dfdbff, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0xc084) 19:51:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 19:51:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:51:21 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @rose, @rose, @bcast]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) r5 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r6 = dup(r5) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r6, 0x10e, 0x1, 0x0, 0x0) r7 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/bsg\x00', 0x2, 0x0) getsockname$packet(r7, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="280000e41d000100000000000000000007000000", @ANYRES32=r8, @ANYBLOB="000004000a000200bbbbbbbbbbbb0000"], 0x28}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000100)={'batadv0\x00', r8}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:51:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:51:21 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900020000000000000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:51:24 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e22, 0xcc8c, @loopback, 0xffff}, @in={0x2, 0x4e24, @private=0xa010100}, @in6={0xa, 0x4e24, 0x6, @private2={0xfc, 0x2, [], 0x1}}, @in={0x2, 0x4e20, @rand_addr=0x64010100}, @in={0x2, 0x4e21, @remote}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e21, 0x8, @empty, 0x10000}], 0x94) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 19:51:24 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$VIDIOC_REQBUFS(r3, 0xc0145608, &(0x7f0000000000)={0x1b94, 0xa, 0x3}) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r5 = dup(r4) write$binfmt_script(r4, &(0x7f0000000480)=ANY=[@ANYBLOB="2321202e2f66696c653020626c61636b6c69737400202373797356656d6e6f6465760f6b657972696e672b260ad00f988a0b43f66b61747cd31ed56d917de164203e3a75827533c00967a30682962a54a646d13a304b6e2d36063cc4997af8eefe676a4fcb56f3a839d33ba8b4f2bdccf308e2b04270ffeeae7f186375ef8bc54ba8cc9cb568f478bb0fc031c9b0340bedf1ec7a1fd07b3cf858038c6e676d8a6d554168dd6952030c9811ea278a4fac59a72518b1ea5962431d243887b929fb4117d1d0f96773ef31fa0ee3471d508dfccfe3"], 0xd3) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$KVM_ENABLE_CAP_CPU(r5, 0x4068aea3, &(0x7f0000000580)={0x7b, 0x0, [0xa7a, 0x0, 0xff, 0x6]}) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x84000) r6 = add_key(&(0x7f0000000040)='blacklist\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000240)="d9ab917bdfe2f2a5ffa76394156c70083c35f0b7835894d34ded6f1d4533334e38134a84c030a77f054ca05a03774328e3e6cd8e842b7ce832259d143136063553b4b9db771ba8c8a0637ea2d9ec7e28c5eec43aa3c55ee52021d407208b0594744c8b81db0189bc94a34c56b472e5584e39e93707b99c4dd7aac13c1c2a88fe702529f3c7f36b08ddf12ae940349338f0f6bcc4eff8d6fb78194a6f9856", 0x9e, 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_QUERY(0x18, r6, 0x0, &(0x7f00000000c0)='\x00', &(0x7f00000001c0)) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:51:24 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:51:24 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900160000000000000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:24 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c66692cc9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:24 executing program 4 (fault-call:10 fault-nth:0): prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:51:24 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1314.809981] ptrace attach of "/root/syz-executor.1"[1705] was attempted by "/root/syz-executor.1"[1707] 19:51:24 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:51:24 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000240)=[{0x1000, 0x1, 0x1a, 0x1}]}) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/diskstats\x00', 0x0, 0x0) r5 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r6 = dup(r5) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r6, 0x10e, 0x1, 0x0, 0x0) setsockopt$CAIFSO_REQ_PARAM(r6, 0x116, 0x80, &(0x7f00000002c0)="2d77b7e506af78d064960f9c0079b93b72137ea1b6d587dcf3eccaaffe332a44955782a6cafee3928eee652fb1600159739b3e89cf49781f1513969520610dc4705b23ce20440386c2587d6678a3502f2f69299694badf820c4716bb711812d142ebdaeca58020b9ff25376273b284779d0eb2dd87cf35b25ddf1961d3ed9cc4adc4336a8337ce3dc638215939484e655380a3b0bce6db957f19", 0x9a) getsockopt$PNPIPE_ENCAP(r4, 0x113, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f00000001c0)="0021490000000002441be09200010000060100400000", 0x16}], 0x0, 0x6) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) [ 1314.887264] ptrace attach of "/root/syz-executor.1"[1729] was attempted by "/root/syz-executor.1"[1730] 19:51:24 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:51:24 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900001600000000000601004000000000000100", 0x16}], 0x1, 0x0) [ 1314.956658] ptrace attach of "/root/syz-executor.1"[1733] was attempted by "/root/syz-executor.1"[1735] 19:51:24 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)=ANY=[@ANYBLOB="280200001d00010000005e5ea434b200000007245d490de4250a1556199a141ec6e60000002149e20f0000595b42ef6a56304b0bf2634f358d248429fd50deb1aa4ccc96cdc48a211066a2545a2615eb9db120cd2d1f0e3a19cec0a1db4b70a50e1571003c7b1c72cb1a39ea8b329ece6884b19e7e57edd14a988b13659a88675524e6c7dfabd4521a10ac99724686bbb419b7e72ffb3e21b34a0bfc0c3fc0272e4b87828a51c783a4d8cd5ab1f3ba7710b025193fd83f4375322ede3ce374094b000000", @ANYRES32=r3, @ANYBLOB="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"/311], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=@bridge_delneigh={0x28, 0x1d, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, r7, 0x0, 0x4}, [@NDA_LLADDR={0xa, 0x2, @multicast}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) getsockname$packet(r10, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r12 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=@bridge_delneigh={0x28, 0x1d, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r11, 0x0, 0x4}, [@NDA_LLADDR={0xa, 0x2, @multicast}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_GET_MESH_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xe000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0x54, 0x0, 0x210, 0x70bd26, 0x25dfdbff, {}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x800, 0x1}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x2, 0x2}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r11}]}, 0x54}}, 0x8804) 19:51:25 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:51:25 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20200, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f0000000240)={@phonet={0x23, 0x2, 0xba, 0xe9}, {&(0x7f0000000040)=""/149, 0x95}, &(0x7f00000001c0), 0x4}, 0xa0) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:51:25 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666971c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:25 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900003f00000000000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:25 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = gettid() setpgid(r1, 0x0) getpgid(r1) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 19:51:27 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:51:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:51:27 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/221) socket$inet6(0xa, 0x2, 0x0) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0x0) r4 = fcntl$dupfd(r0, 0x406, r3) ioctl$PPPIOCSMAXCID(r4, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:51:27 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000010000000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:27 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666973c9e1361a5f4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:27 executing program 5: r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000000c0)='dns_resolver\x00', 0x0, &(0x7f0000000240)="dee7030522cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f3233a68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fee505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edecdbd8be51d9917c3e033b06b9e9860ab49c3a4f51ab0124b50c3362201a307df03000", 0x85, r0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="f43f2ca45b097f15cdaced55239a65d0c0b767006c53ea45221478750eaf119ad6580b8ec9146288ae5a8cdd63a7a0204ac042d643c857c6fef524bec825920063a7fc8cab6a66e3da8ce35338a837f9", 0x50, r0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @null}, [@rose, @rose, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}, 0x8a) listen(r1, 0x0) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000300)={&(0x7f00000003c0)="6841b839b3c46e50df844a05fc854b4c06e59268374f0b817f5ffab2cdb2f5bccfa78cb31ee5061c4e78168fd23d9943fa5d7f23063ea0c448e7a2779b0a5bd14500b19f95326b47c150659a47ca83299e6f3a3873d4a56fa2e056b639e50c332de701b5951affca5fe08d5ee295fb56dcf7db26dfdc1a6743f31bd16e47140327f75aa3fd542d426b2ca45021bbce1d67df6700fc57d2ea3ef3d346454539e0cb5c65e1e321416fe3690a19673e281a86a544c9c7cd6a2a95109df52b66040a0dcfae426452069b0b0dabd388c629ad0b42b931d274a8064ccc00e96219763d6ed8df873f00", &(0x7f00000004c0)=""/202, &(0x7f0000000180)="93039d65f481c8108dbefd1aa7b0034f413028239014a933e857675fe3862b3310ff73f94bb49a1b8bc8a8405e652bf603f59a6a7e2b05a90ca8ddc92a8820c8beb647feede9e0749da2de0b36cf94971374b406640bb03f2e3410653753307dad5f97873f478a68517229d46bfdd2614e1b2f68bc824508d4195efdc63d3b31bce0765b4c5f11688a3fab7afcfefea5b0519c813dbaf1f4cdc312b4437b8c8bede002f78aba9e267e645f57e59a60af82", &(0x7f00000005c0)="e6ff968115b0824025b48cb0bd20bb40352550e9efae9084deaf5ddad18c1f7bdef027b75ff39a9e252cd396eecfbb71f8885fd8e16450692d35088128008ec4930192015b9fb765d8ad6a61c4fabb4341f888ea95bb099210c42c9ae6845ea58bb62619078964c5a1e39615ab7e98e14f2b9b063deadc4ec352ef61e12834e042113275f9262a436acf8b7f5fa0a861173fe23b70498f4c2f2da543d6d3abb366ae59c364bbea07b2f0278ee9fe9574196fd157fbfc148fe0d02ab94a4b46ffc8f7813e2dc0c30858b503cee69967354d4feb7c57e09bdd5dc0f009e4b1", 0x7fffffff, r3}, 0x38) r4 = dup(0xffffffffffffffff) r5 = dup(0xffffffffffffffff) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r5, 0x10e, 0x1, 0x0, 0x0) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r5, 0x84, 0x5, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e22, 0x2, @empty, 0xff}}}, 0x84) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 1317.829130] Option ':híó5«ó^Å' to dns_resolver key: bad/missing value 19:51:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:51:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:51:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:51:27 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000020000000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:28 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:51:28 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r5 = dup(r4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r5, 0x10e, 0x1, 0x0, 0x0) ioctl$PPPIOCSMAXCID(r5, 0x40047451, &(0x7f0000000040)=0x593) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0x0) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000000)=0xbf, 0x4) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) setpgid(0x0, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000480)={{0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x1000200, 0x8000, 0x3ff, 0x2, 0x0, 0x0, 0xfff}) socket$inet6(0xa, 0x2, 0x0) r6 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSMAXCID(r6, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x8000, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r7, 0x118, 0x1, &(0x7f00000000c0)=0x5, 0x4) 19:51:30 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x5, 0x0) 19:51:30 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a224242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:30 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r0) 19:51:30 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000160000000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:30 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @default}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) fgetxattr(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="73656375726974792e2473656c696e7578001d9e4182667aed38c04caace4a48d2ef8b266a9c5038778d60e914ba1d2246dc180bcbc5533f5705157ad3708d6a0aa38d"], &(0x7f00000001c0)=""/68, 0x44) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000040)={r6}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f00000000c0)={r6, 0xad4}, &(0x7f0000000100)=0x8) setpgid(r3, 0x0) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000000080)=r3) 19:51:30 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)=0x1) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0x0, 0x2121c2) ioctl$NBD_CLEAR_SOCK(r5, 0xab04) r6 = syz_genetlink_get_family_id$smc(&(0x7f0000000040)='SMC_PNETID\x00') ioctl$PPPIOCATTCHAN(r4, 0x40047438, &(0x7f0000000300)) sendmsg$SMC_PNETID_GET(r4, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="00042abd7010ffdbdf25010000000900030073797a32000000000900030073797a3100000000140002007665746830000000000000000000000014000200677265300000000000000000000000000900030073797a3000000000"], 0x60}, 0x1, 0x0, 0x0, 0x800}, 0x4000) sendmsg$SMC_PNETID_GET(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="70000000adf6f9039c804be991a6908d52f370c36524061de3df54cdac66a7b758efe9c32921aba9384a420a261caf01a900135ae33196982fecd81ba8a2c45311e4b58a4f0223e9c68a2726903809394c5323399097dd85f71d92465bceb40cc48c96edae5b947132ee9f497c1556defde38f081985199a769623d52c77bd2e7a105a0ec8df39512149a750f4abee943280b59213e5dc4a4378c6c377a0f1d95b06d63f9fa9c49dbb7e60cdab45a551ea356b58c911726a2574be716c476e936b8c7eb1b1757c339d6d5178857d371c731d082ba7770c7b5229df43f39bba94cc7fc9352a68b1f4090000007a08c3", @ANYRES16=r6, @ANYBLOB="080029bd7000fedbdf25010000000900030073797a30000000000900010073797a300000000005000400010000000900030073797a31000000000900030073797a3200000000140002000000000000000000000000000000000005000400020000000500040001000000"], 0x70}, 0x1, 0x0, 0x0, 0x44094}, 0x0) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) r7 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r8 = dup(r7) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r8, 0x10e, 0x1, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r8, 0xc01064b5, &(0x7f00000004c0)={&(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0], 0x4}) ioctl$DRM_IOCTL_MODE_SETPLANE(0xffffffffffffffff, 0xc03064b7, &(0x7f0000000500)={0x0, 0xf16, 0x5, 0x2, 0x1000, 0x8, 0x80000000, 0x99b, 0x1, 0x9, 0x80000001, 0x7}) 19:51:30 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a2c4242685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:31 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="002149000000003f0000000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:31 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:51:31 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000000)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:51:31 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000200000000000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:31 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f2542685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:33 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x21, 0x0) 19:51:33 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900001600000000000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:33 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$VIDIOC_ENUMOUTPUT(r3, 0xc0485630, &(0x7f0000000040)={0x40, "5f56c910e68f44d94353ee6297608c760bd849aed9b163ccd7055e696443088b", 0x3, 0x1ff, 0x1, 0x80000, 0x8}) open(&(0x7f0000000000)='./file0\x00', 0x200, 0x24) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r5 = dup(r4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r5, 0x10e, 0x1, 0x0, 0x0) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000040)={r7}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f00000000c0)={r7, 0x0, 0x8}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000240)={r8, 0x401, 0x1, [0x8001]}, &(0x7f0000000280)=0xa) 19:51:33 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4225685c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:33 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 19:51:34 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000016000000000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:34 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:51:34 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242225c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:34 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}, 0x48) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x200000, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040)={r3}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000100)={r3, 0x99, "9a6e5371d02d37f2f7e59785781d11d12e10b5bb8c93dfc35070a9002e3ea62f8211d04e45a2dd79a91fb216cb3bbcaa45c31b809e27eebf813d63842725c696a322199f92470b60e2bf2aeb98573006c86b68026e4c904e3aa8ad13284e47cd80e9c324d8e856b5fdfb5abeb1cc94c9f86bb8dff8c3b3f2bcf216c4698daf972bedcd1c7e0e8c25ebbdb76f1cae004988c0db9c94b0cc8562"}, &(0x7f00000001c0)=0xa1) listen(r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r6 = dup(r5) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r6, 0x10e, 0x1, 0x0, 0x0) r7 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r8 = dup(r7) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r8, 0x10e, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x2400, 0x5) setsockopt$bt_BT_DEFER_SETUP(r6, 0x112, 0x7, &(0x7f0000000080), 0x4) r9 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) 19:51:34 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000003f000000000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:34 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f42422c5c2508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:34 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000100000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:36 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x500, 0x0) 19:51:36 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c0508c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:36 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000200000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:36 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r5 = dup(r4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r5, 0x10e, 0x1, 0x0, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x3c, r7, 0x1, 0x0, 0x0, {{}, {}, {0x20, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'veth0_virt_wifi\x00'}}}}}, 0x3c}}, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r7, 0x300, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x885) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) r8 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x133100, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r8, 0x0, 0x5d, 0x35, &(0x7f0000000240)="6424979aa48a0bc3c3e6583e80576a38a1dee7f10d6d84c83aa0faa9795abe2c04a926e0ef7afa2c694c553abe0736f22601697bf179e407a78f351508c99ecd8ceb26ba1ab12707ffa3df35056dee3cb1b015e1eecd2f756d74d1b419", &(0x7f00000002c0)=""/53, 0x40, 0x0, 0x7d, 0x1000, &(0x7f0000000480)="bf688b3b0f6222888137ad2097403e5ec9695b564a672df6a0a0a0411730d1b23f4033f948372a4e0f2eaf5421ade41883d7dc1843f486405339f4566d58b067e6ef4f2bebc0c74e15de2d711be735ca2ae4d43909dd85e9ca1c70172432a7810b526539f9c98419f10d5257a4bc2ac6852a18c2716eae41f1fa5155aa", &(0x7f0000000500)="11e0a9b866da83810996894cf8c3245be73061c5dcdbc7625671abdca7c2e5095994cbe9a7090478203879cacbb88cca9bd6d3d1207af61e83c881aa6180c5a2839a43e0dea4f0dad9023b93083b4ca5f9bdd53710483b6ac313235f2e06e6edbe479b98ecccac8327946fa9fde26e86fb72a3b60eac2022191ba7eb563a1bdff95d439dd6a16ca3b716bafaf122d59e785524fc441624b73265b735db29a37e5b20cb6dbd55dac6d2debde8384b4a7b0a8fa552c2d8e158adfb509bbf952bc96cf77d4998b0ea5b80f44611fbd4b62e846620d47d9db92eb753159f69143463cc5d3c65d0946e54805cf9c51c2a54e01d3eee9c1120cab989ecdd77551941b221745bb018efe476d1103f681c1e1187c44572064e45ea02f0637f38ff2f9fe7c410c131940d6baf4623d8685f8443a7474149d74b267231c80476a280ca55e0e09da66a9791ac5be25a565f88305344f991bb54d263bc7ba0223d79146b66e6041fb5a623e54cdc14a6bf4fd0cee4ac8feddb60f14a30d11ac138fab4c1a654de39f3fa20464dfe090b2814701e74bbd9a3d79d5b03a615ca980535f41d8c22f3b2132c32373c2520ae563019e2d033b47129940c8be1c5ed8cf86f103f4aed5b3f941341ff89916e8eea1eca3402a09a21119651ce5932b505bb44020d51759610a130369f263a666473ade0a873fdcd28b486ccfd8b0ef5219e11f6eedc9320513736d43c6fd9e73840ff253a32c58afd8c9fa59f2f37afc567acc0cc86f87613715ec6169300e01dd59b2035f9c9cc9949cb0f1af635cbb63bfc9b06054ef9ad7a42a0d03f643f1a5c1b5fab91db0af95f18d945d29d5534af01315c0d6525a349222f55e5c6112a6e363c39c64e1665e59281eb48a34ebf826611b5d83e415bd7826af5c25109948b04b2418c412bb10b14751765d0c78ab58a9435c1f7561d84b6424bde7f18062b0e7041c285dfc9ea24756ea1ff39440d843600d08e7b4f091661b80e095a5c36f6517ec54660fef6a3bf6121a2ad157a4058e513fbfddebee838bd7111486fffac66d8abc9cabb0de6465a5759a01d994fd68326ce1e989672dba6c45decb209d65c406ae722c5a4fa0eb5951cd438d4009450049ebd0747255090fbaf2cf6d7628176fb0a5e97e8eefc80444b53f6bd3eb05498c62708fe19607d6e7792c57c5727efe6238ce74a8c636a89c8501d92b235a05db24f65aa7807bdbba3ae949ccb1f43e3d1ab98a998671958d52991626d65db208b5ed8977a9fec9a8ec62628e1ea545c1f7f8b3223a8dc278a5680360cce07216ddfd11ca2a52272472a1de93dbae87aba8912725619fec77fa1557f407ad727c6a5956f0d0ac24bb5a5f894de531bad607c56affb60928929ca9356eab8f8d3a37f53f916ea0c5f2badd52aea5fcda1ed9ed57b1aebded33ba94ea4f4caf2fa9f7cdee83f1e827f7807f64db331a6b7db3f472ca2fdbd6cb1eae5211916a72ec526b7d9e5f9974703abbe569e3497f09fc0ce9e98f3a9c2b0b5e73ad970d2ec921b00c71e8e22bbabafc7a39de7235265eedb8fcb17eb8b639830d7724603830774c41d1ec9d2447001911cb7ec6766e8afdc054f1737f56b6915415c98a53b5ae51cf66faefb1a39f3fe2d83a25fa5ec25a7a3a694962266450223c4e8f0a356cdfacdd3f3e84166a5b29b95b75fe22b663fe9f5e877bfc87bda1e1b9ac84d9f5ed335a1acffc4d9a9108bbb7941253e2c8a27f0f952659975285ea5942b59eebb54d91af022e393be5697092c443afe558b676f2e4fdc26b5625fbe1f21c4f80a228bbd65c95eeb41d55d14358c78da6866025daec082b8bd157a84b40235322a495e8e5a0cc6c60e20dc7398dced8ec41c5b98461a39f41825ffaf844893ee7d7fb6d65665ba0a1fb594a0b21b9cb74d28e70d78e67c5bc849167a210ef270fe844d6b72db497816a20733b2b0eaa6cd19bf2cd35eef19a9d591b108f00623f0f70155df12e721614078c2d393b09af1cd0bf2eff3466d30b03dddd83b26ccf524c10423030db42cc1594ab4cf142f3d1787313e7cb191843864d1361512329111b7f1b2a41b6e5d18a63e5f7e9af837076b9cbb05d4ee6a0c7ef1979acc8317c404c7dd93e02cc09e0a49faf14bd979ed7782f617ad3914f56365104eb219cf722d0c91a19707449fa01aa799dc4e0a7c79a5bc2d480041c015d7eb5d531d6fd8740d20f97628b051f4ce9f6162b189da44be20e4369159650b946c6b806de1be3345a4a645e7c9420f5f7c253532c3f999a1b42aa06459c4a95e93acba18953668068ff85e845115fd4820d9e931b82a274b29de8d335d37bb1edbe176115ea6feb8c31a619ad7ff74c548f990c6f18e90f5ffa1c39c099b1ae895c025cb9bb9ec9a15aa9ef634d44e24012aa014a785efd9efaf66a6e40334a04e37d688f45b35500382edb222a0ef51389cfec20e9660cf28a70f85839e743ee39ad87f152e771998d53ec7ed988f21513c87f22bbb6a995dfff9262ee462f2399d4718d447c16a6a377e52ecb08b1bc5f37a1959b9671684516913e163bb3ae2f5393a213f1d26a48006f210cc7c8f18119c80a896c86d5f8593ec500ff788f9f9501d0563f434e00478f4e8f06e38d9a66ad6f8492d619581cdfb4a29012f80411e40554eb6ff6b1315e239b7d9deeb0b86237f989416c612b11b9acc9ab14a560c137b16b98258efa49c5439ab54fac96f3a2eb93e45d3fd0f7ac0d7aef80edbe70d46a764e65bb9ace3519d3ccc04317773f483c665809206663f4b4e7032f39b9e99f5f061b538277d48ec36e75039dea4a1b38709aef39b9687b452f8423ebfeeb910ec3fe110c970c5fc6148d29335ca4d2121670ddf426e782b76685c77087c16edbf8e9c6bb425e8882e16c24dcd852f5b78ffe71bc9028a5181c131d8260b2a10aa1aba9fbfc62b88a11ab97ded71428ddcd92b786f71fe8fbe1429e595b344ac5ea60140b2548a5a58f17945d3ca0b7ce5eb4c8e3d8cea4b567f868bc03a482655bf022d89129bea44a9c95d8f28bccef3732cb41357a34f8ec43b3f28f6fbf4a5b4103c3a626d8e9a3913ad0795eebfd5d9668e81fe0160cd17c07b3650f862fee3ec18e4d9bcd0362b1e430dab06df491911fc1e06a7fafccf79be4a0da95d89565ddf16577c3c946f491c2554c9c041193f426c84b4040a12c8c64a3c4aa06c4a24108d7396fb799bf1d205b17c4906ebe1a5add30cdfe4f608f75fd08439bb3712abd57742c74f7893fd8cb00205c6ae3d021298291c287c4e98d6c2e065ac7c82d4ceeca27aa2b95e2f9a34a28ae0d3c2ca254365a0c684b591fc039fb9a675ae6a405c098eb00f51b0d7c06eaf45bca6fb66e138ed4d928fc15da712cde75023cae12a3c75671c7300a519f3b03cda116c406b755625279e0297b168daf597f432a6242320dea7d6d7bfd08dc461053aa3288b716416943364cb0df8e2f4b5ddde8369ee7098a7bd2a512e9926c49465ba142e03be00b76c3c8463f9bddfb42c27de57bd80d9e7daffe1caa53e734f680ffbb02416eddfc5552fa06a82429909e4dec1be5f5805db370179f589e63f48338a4e4b45f48876d9df4c58e13061a58d88ff7048ace828806a54544a9e3cc9181215c29137826b2e9c26a6f3677be7657f5a855f0479b52c3c7875676e5a6f1d6b55a0f573e4f81e1d53458fcac2e48c3bea3fc6e89818ea5c4a24c120b354f0d9b9887ff60c865a2dedad2d3ee2275a204f6966040fe05c468d038bccce6ceccc6c7bbd3698f4990ccf2a9ecbf77ad1336cf31670dea48c74d93e44b3201063a3a5b3e235078c6b8a047deb6a6345ecf8b3e6ca558fd9062ed78adece41441b6b6db545ef1f327e649a55efe6c7c1eeccaf194767c914fb654131ed300b69407e82a64c45152603f6ddbe4bf2848ca371683ebf50018ccceb1e603f5ca9288ae2e0218b7718801288f9dbf46cd2582c0c471e817012cc8484e62ba2fa425dc39330fa6c1725a7728d14b1dda1fc1be0708e515600809e918265e7e70ca6be54e9345e8f72cc3f00688719e1b2926afd9101511a9065b7fecf9a9d4c7aab67915f47ca24bdf19078bbe083e0f8325f2a681b80d8f78a09130b2ff374dc7ce53af3496b92e353a8b71f26f3af074ea33ad96fe71d7795c78eceae5a0a718dc19f15980dba9b2570a08f1392e5b9628a51c0ad3363f186b8642bf9b3c3a7105eaccd30a1335ce55037ad40a4712ef10b2545a8e21c62631fd898584a91c9f733025a41063e6e05ccacadcd1b2685253e0f64a2a285f31bece6d383a120502c28b52ee2cc5553836557dae30155f53a88acf4d150ba333543d1412220a088d28c6c5b0f051e39dc4f50e77ea30b5627693c1a51b0d354f225893c3352252d0a0b169094a53f35c5d5ce32ede82981168a9c15a794b7944d0440795e10ff20fac6f54cdc4745a2073e964a287bcead1f39ef90cf90760de571fbcd0f2b221dc24b713f2badb75a63b8a539b1225af0c4e1659478a9700b997fe52f948e6109776c0e8f79645a0270b3e5e2133d24cc5519fc89555ff653b310ccebb4d5b3990e53630b482d2a7078e0e552d927f2a5cf6b7ffb3797a5433d4297c4b0cb70409aded891c16619b456fc2ba7c3f7168843c9666e4d58771d12924085eb11cf479689e1b51884d78c808677ea516e0b839519206914ad22e52d89932f64c2cf963955f419a91640d966b3a86c961206674ac1591c74576ce84dd8b491196cd416bf68e7bec19df6e87bf51b66fa7e45aabaad7c7fcf54f540c292c0ec922d45d3a9a16d7d36330bd0155f8d3a55527dd17827d33c6b5eb7586e8cc27d76ca76100be2cc1f8a3ca89cb557ff107eedcc1e39a2bb009182ad38f9f53b0b20992f01ae18cb99f3081c3c4a99e86d487640f47475fd10e193f5bfb96f827f8060b8cf34e7784454791ce7e32cccad6e95cde6f838bb7f8b2125b4798cec14454e036e8a095ec967c97af8ecf461bdb760d3bfe3d4b74778dfddae7be5cbda01ce68a34ae2deff7c08f39c8db3225418d0cb32d2e8498fe87b765d44e4b2719e14161ce141e7500a480a07366437d4d3d6f1c1a15f9b9cfcc579a3f83e4c00b627dcfd9b4c1b9b22b3c672b4f98581ad40f1f954cfcc8960469011d561c99e071ace72d26fdc5f4b24a778a51a6ca4eee7237f5c55953ecdf1674113e6a0af5af5db4f5ee582e3418a9794a7bf74412081219e7948fd1dd05e919ac13e943262a41ad7294f3350a5d0b8730ec82728f44a1a468c4a2d732eaa9d69418b13477d47973bba6ac1d9572636fcfe50b9aafb4e0ed808237748d4ca870159dff9dbd990b290316a78e62d437b896d1fc59d37a03ec850ef9dd672d7d41378d223f54c19694b2bf26430acd3e14e6261c7df18269abebd466c335e725ba7ad5a9ed629cc69d98536f392bc13ebee3e2a368c9890bae587603d1fe7af8c4749cd29e8a043168c9f79f05d021679cfa024e50ff7cdb01fc701bb69f399d0d804f47f71937d8788823684e40d38d310984d4b1a0d139e638cf2d8f10c6d09d5023949d167bd7d5dd5506f3f550ecacdf5bb5237c2615c2610b701f73aae72e56d5c508dadf598e0066106bfbac6470c90dca48fb0a84ed585a6ce02a49a107a05cfb5b956391ec4e7f9c864a73a7ab2c9cec66899fb1910628da62c380f7fa588c1cd3075715e19bad54302857d663c5958ef78c9a6afeb32ed6a0968da7c757ea82be53666a1ece01b8991df8f141fad613f6c6c"}, 0x40) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:51:36 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r4 = dup(r3) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, 0x0, 0x0) write$dsp(r4, &(0x7f0000000080)="a3f59256e6e92e363a4597eea3e152d1af8d6d016bda5c5c66fa38173b4c89981202f8d4343267b6bf619fd63d6b27c84f896cdd56f813943495045cd60d8f7c6fd8e767119f8472b6", 0x49) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 1327.010393] Enabling of bearer rejected, already enabled 19:51:37 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000001600000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:37 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:51:37 executing program 5: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x37cb1133) socket$inet(0x2, 0x3, 0x33) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x8006}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, 0x0) r5 = dup(0xffffffffffffffff) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000227bd7800fddbdf250d00fffff7208a080000007c0200000000000000000000000cc78be6b19d69f5a6da7654bef74b7ab65a394c90eed7617af35d0a4c53e6e766fc42405a09f7508b58d84d54fa6c2e20818e85a2412775895c0d5db511363b3c2c9e210c32c24babcec66086bccf60d6802ad5e835c8e93f088e7625786760934d35ea84d04fc2420678db678772850b7bc69bffcd6ac4b8f27dc99a16fb0634a052b7ff7f00000000000031f546425e0623f23bd236ee363d5bce9958e073"], 0x24}, 0x1, 0x0, 0x0, 0xc890}, 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) 19:51:37 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2502c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:37 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r7 = dup2(r6, r5) r8 = socket$inet_udplite(0x2, 0x2, 0x88) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(r7, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r10 = socket$inet6(0xa, 0x2, 0x0) r11 = fcntl$dupfd(r0, 0x0, r10) ioctl$PPPIOCSMAXCID(r11, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, &(0x7f0000000000)={@any, 0x0, 0x4, 0x6}) 19:51:37 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000003f00000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:37 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f0000000000)=0x2, 0x4) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r3 = dup2(r2, r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000380)=""/230) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r2, 0x0, r4) ioctl$PPPIOCSMAXCID(r5, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r3, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:51:39 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x3f00, 0x0) 19:51:39 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000002000000000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:39 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2503c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:39 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x4, 0x2, 0x8}) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, 0x0, 0x0) r3 = dup2(r2, r0) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000380)=""/230) socket$inet6(0xa, 0x2, 0x0) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r4) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PPPIOCSMAXCID(r5, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r3, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:51:39 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000200)={{0x6, @rose}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose, @default, @netrom, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose, @rose, @bcast]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r4 = dup(r3) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) r5 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r6 = dup(r5) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r6, 0x10e, 0x1, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r6, 0x5411, &(0x7f0000000000)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, 0x0, 0x0) sendmsg$NFQNL_MSG_VERDICT_BATCH(r4, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x6c, 0x3, 0x3, 0x3, 0x0, 0x0, {0x0, 0x0, 0x3}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x1}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffd, 0x3}}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffe, 0x80000001}}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x5}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffb, 0x7}}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x3}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0xa8a}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xab73ffb774c3421b, 0x3}}]}, 0x6c}, 0x1, 0x0, 0x0, 0x24000000}, 0x4000010) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:51:40 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x800, 0x8c00) r1 = syz_genetlink_get_family_id$batadv(0x0) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00082dbd7000fcdbcf35110000000500"], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x801) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r1, 0x8, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}, 0x1, 0x0, 0x0, 0xe0b78fbb9ede8924}, 0x4) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r3 = dup2(r2, r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000380)=""/230) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r2, 0x0, r4) ioctl$PPPIOCSMAXCID(r5, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r3, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:51:40 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:51:40 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) listen(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 19:51:40 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000016000000000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:40 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup2(0xffffffffffffffff, r1) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000380)=""/230) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x82182, 0x0) r6 = fcntl$dupfd(r5, 0x0, r3) ioctl$UI_DEV_CREATE(r5, 0x5501) ioctl$VIDIOC_PREPARE_BUF(r4, 0xc058565d, &(0x7f0000000080)={0xffffffff, 0x8, 0x4, 0x20, 0x8, {0x0, 0x2710}, {0x2, 0x1, 0x3f, 0x8, 0xc7, 0x48, "7236beb1"}, 0x9, 0x1, @planes=&(0x7f0000000040)={0x8001, 0xf, @fd=r6, 0x5}, 0x5, 0x0, 0xffffffffffffffff}) bind$bt_sco(r7, &(0x7f00000001c0), 0x8) ioctl$PPPIOCSMAXCID(r4, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r2, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) r8 = syz_init_net_socket$ax25(0x3, 0x2, 0xcb) r9 = dup(r8) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r9, 0x10e, 0x1, 0x0, 0x0) ioctl$TIOCSISO7816(r9, 0xc0285443, &(0x7f0000000240)={0x101, 0x3, 0x5, 0x80000001, 0xdf}) 19:51:40 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2504c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:40 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x40) bind$vsock_stream(r2, &(0x7f0000000080)={0x28, 0x0, 0x0, @my=0x1}, 0x10) 19:51:42 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x4000, 0x0) 19:51:42 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x8) r3 = dup(r2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0x0) recvfrom$unix(r3, &(0x7f0000000000)=""/31, 0x1f, 0x12003, 0x0, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r0, 0x0, r4) ioctl$PPPIOCSMAXCID(r5, 0x40047451, &(0x7f0000000100)) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:51:42 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000160000000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:42 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2505c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:42 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$VIDIOC_S_OUTPUT(r2, 0xc004562f, &(0x7f00000000c0)=0xffffa0a0) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 19:51:43 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="002149000000003f0000000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:43 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:51:43 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, 0x0, 0x0) connect$netrom(r2, &(0x7f0000000000)={{0x6, @default}, [@rose, @rose, @default, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose, @null]}, 0x48) listen(r0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0xac00, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) getsockopt$CAN_RAW_RECV_OWN_MSGS(r4, 0x65, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) prctl$PR_GET_NAME(0x10, &(0x7f0000000140)=""/55) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$SIOCX25SCUDMATCHLEN(r4, 0x89e7, &(0x7f0000000100)={0x36}) 19:51:43 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2506c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:43 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000001000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:43 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0x0) flistxattr(r1, &(0x7f0000000080)=""/91, 0x5b) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r2, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 19:51:43 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2507c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:46 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, 0x0, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=@bridge_delneigh={0x28, 0x1d, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r6, 0x0, 0x4}, [@NDA_LLADDR={0xa, 0x2, @multicast}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x44080}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r3, 0x2, 0x70bd2c, 0x25dfdbfd, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r6}]}, 0x24}, 0x1, 0x0, 0x0, 0x4040800}, 0x4) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) 19:51:46 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x60ff, 0x0) 19:51:46 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2509c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:46 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000002000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:46 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:51:46 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x0) r4 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADD(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r4, 0xa00, 0x70bd2b, 0x25dfdbfd, {}, [@NLBL_MGMT_A_DOMAIN={0x18, 0x1, 'wlan1lolo\'#security\x00'}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @loopback}]}, 0x40}, 0x1, 0x0, 0x0, 0x20048041}, 0x20040800) 19:51:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:51:46 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="d4f92195813fcf9ca0d1be856146b4e3e43bc188cbf1da14ade4d444c185bae3502ce006", 0x24}, {&(0x7f0000000240)="4d0d080099cc3b637e031824df894417522b017855e0a7612262476da86e22e7fb3c729253fce49627915429bface650702320451e695bf31d32b2999612cdaa1a7bfc33769c5c7debf0ce4d035aa3ff93e78d8d75b974202398c7397a8ae63c5ebdc305c025fa5ca6ee79185fa3349ac27812a838566560628c87ee931647e27c7dfb1870ccef99e6484d8d6e473446bd544298f441998f83db75cfc6d8ea28aa6c228868d87e42db8181caa1d87190a1ffe1b188699022b12e30b31bd3bb2d2376f934f5d107d6577e049966de8d172dc278b5514e5329b6cd3fb841114a46ce00ee890fe92cf119221e0f8d228f70030d", 0xf2}, {&(0x7f0000000480)="cd073ac51b5fd551f9bc56c417f5b13c400ca907ac3d4503dca4ef133d12d67c65445f0ebed1e08808c1e0f32c0eea25224e4ff308c5c626941fb70b66a7c9b3d91e5317a0ecba5fec3a450036186bf1341b5de62971d02c1dcca4a86e0e48ca18ee193d718ecc219cb8a45c077108c20e73880cbe137f713cbd3884e7d5163edf48b3629dca91640d6810c0d19db402d439f20afefc6e2e65a9df866cb7a76b4bd8eb9f55b7959ebb0fcd1cb5915b5d64d6966498d56024e2d5f49826bd5dac8ff36223c3ad0553400fce61b0732e5a306d958ad94fecfe57370304eed1998a4f442802c3cedaab4be25503ee66", 0xee}, {&(0x7f0000000040)}, {&(0x7f0000000580)="c5fa933f325603a16c630e3b5e961542f344c567c4e44b584de3133a8fc288ad9008e3ed9eae0ca6a8c66cb6e746b7bd71a9f88145790f3653196e9c2d0e9366f509b404734bea7d6e97d3264a307224ec2a5b476663bc57dd252c2bfa8d01375262748650c74ff3e40a5c2d77efffae130a78e9e90f19b1b16fa714057c6c1d56966d5665b40bd05d80c7e9697095ea542cbbed9323b875f679291322757045b7c68a3d4b5dd934e017bb1d5ec75625bc979280fc10c35b839f2d43c7c9c4dc6ea2baf041baa2b4a9430615d184f92e2cd250eb0b1e34b15c2b7d82a7ec99519ddb0ca987dad2", 0xe7}], 0x5, 0xfffffffffffff801) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:51:46 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000016000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:46 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r2 = dup(r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, 0x0, 0x0) connect$netrom(r2, &(0x7f00000000c0)={{0x6, @rose}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @netrom, @bcast, @rose, @rose, @bcast]}, 0x48) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f0000000080)=@req={0xfe, 0xc0000000, 0x5b, 0x40}, 0x10) shutdown(r2, 0x0) listen(r0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 19:51:46 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c250ac519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:46 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose, @default, @netrom, @bcast, @rose, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:51:46 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) ioctl$VIDIOC_PREPARE_BUF(r3, 0xc058565d, &(0x7f0000000000)={0x3f, 0x7, 0x4, 0x8, 0xf2, {}, {0x4, 0x1, 0x81, 0x5, 0x42, 0x7, "de4424b7"}, 0x43, 0x2, @userptr=0x4, 0xf38}) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:51:49 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x7900, 0x0) 19:51:49 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000000003f000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:49 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @null}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose, @default, @null, @bcast, @null, @null, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 19:51:49 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c250bc519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:49 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x4000, 0x0) 19:51:49 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:51:49 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000020000000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:49 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose, 0x3}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = dup(0xffffffffffffffff) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x406, r3) ioctl$DRM_IOCTL_MODE_CURSOR(r4, 0xc01c64a3, &(0x7f0000000080)={0x2, 0x6, 0x0, 0x4, 0x7fff, 0x4, 0xd936}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsu\x00', 0x8080, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r5, 0x800442d2, &(0x7f0000000180)={0x4, &(0x7f0000000100)=[{0x0, 0x0, 0x0, @multicast}, {0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @remote}]}) 19:51:49 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c250cc519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:49 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000160000000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:49 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900003f00000000000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:49 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r4 = dup(r3) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, 0x0, 0x0) r5 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r6 = dup(r5) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r6, 0x10e, 0x1, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r6, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040)={0xffffffffffffffff}, 0x3, {0xa, 0x4e23, 0x6, @mcast1, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r4, &(0x7f00000000c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000000), r7}}, 0x18) r8 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r8, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r9}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000001c0)={r9, 0x484, 0x3, [0x7, 0x7f, 0x1f]}, &(0x7f0000000240)=0xe) 19:51:52 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0xb900, 0x0) 19:51:52 executing program 5 (fault-call:1 fault-nth:0): r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff014}, {0x6}]}, 0x10) 19:51:52 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000001600000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:52 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c250dc519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:52 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00') ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) [ 1342.237523] FAULT_INJECTION: forcing a failure. [ 1342.237523] name failslab, interval 1, probability 0, space 0, times 0 [ 1342.264152] CPU: 1 PID: 2620 Comm: syz-executor.5 Not tainted 4.19.121-syzkaller #0 [ 1342.271965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1342.281318] Call Trace: [ 1342.283922] dump_stack+0x188/0x20d [ 1342.287566] should_fail.cold+0xa/0x1b [ 1342.291463] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1342.296567] ? __lock_is_held+0xad/0x140 [ 1342.300643] __should_failslab+0x115/0x180 [ 1342.304882] should_failslab+0x5/0xf [ 1342.308594] kmem_cache_alloc_node_trace+0x272/0x750 [ 1342.313705] ? mark_held_locks+0xf0/0xf0 [ 1342.317770] ? mark_held_locks+0xf0/0xf0 [ 1342.321835] ? mark_held_locks+0xf0/0xf0 [ 1342.325903] __get_vm_area_node+0x128/0x3a0 [ 1342.330228] __vmalloc_node_range+0xd8/0x770 [ 1342.334638] ? bpf_prog_alloc+0x5f/0x290 [ 1342.338714] __vmalloc+0x40/0x50 [ 1342.342083] ? bpf_prog_alloc+0x5f/0x290 [ 1342.346148] bpf_prog_alloc+0x5f/0x290 [ 1342.350041] __get_filter+0xe2/0x270 [ 1342.353761] sk_attach_filter+0x19/0xa0 [ 1342.357741] sock_setsockopt+0x1a04/0x1e30 [ 1342.361978] ? sock_enable_timestamp+0xd0/0xd0 [ 1342.366577] ? selinux_socket_setsockopt+0x6a/0x80 [ 1342.371512] __sys_setsockopt+0x203/0x240 [ 1342.375659] ? kernel_accept+0x310/0x310 [ 1342.379722] ? fput+0x2b/0x190 [ 1342.382916] ? ksys_write+0x1c8/0x2a0 [ 1342.386721] ? __ia32_sys_read+0xb0/0xb0 [ 1342.390779] ? __ia32_sys_clock_settime+0x260/0x260 [ 1342.395799] __x64_sys_setsockopt+0xba/0x150 [ 1342.400214] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1342.404799] do_syscall_64+0xf9/0x620 [ 1342.408607] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1342.413797] RIP: 0033:0x45c829 [ 1342.416992] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1342.435882] RSP: 002b:00007f95343c9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1342.443568] RAX: ffffffffffffffda RBX: 0000000000502260 RCX: 000000000045c829 [ 1342.450817] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000003 [ 1342.458064] RBP: 000000000078bf00 R08: 0000000000000010 R09: 0000000000000000 [ 1342.465312] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000004 [ 1342.472562] R13: 0000000000000a5a R14: 00000000004cd039 R15: 00007f95343ca6d4 19:51:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:51:52 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c250ec519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) [ 1342.489723] syz-executor.5: vmalloc: allocation failure: 4096 bytes, mode:0x6080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 1342.502551] syz-executor.5 cpuset=/ mems_allowed=0-1 [ 1342.521531] CPU: 0 PID: 2620 Comm: syz-executor.5 Not tainted 4.19.121-syzkaller #0 [ 1342.529339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1342.538686] Call Trace: [ 1342.541282] dump_stack+0x188/0x20d [ 1342.544924] warn_alloc.cold+0x7b/0x173 [ 1342.548906] ? zone_watermark_ok_safe+0x260/0x260 [ 1342.553771] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1342.558800] ? mark_held_locks+0xf0/0xf0 [ 1342.562864] ? mark_held_locks+0xf0/0xf0 [ 1342.566931] ? __get_vm_area_node+0x2df/0x3a0 [ 1342.571434] __vmalloc_node_range+0x479/0x770 [ 1342.575936] __vmalloc+0x40/0x50 [ 1342.579309] ? bpf_prog_alloc+0x5f/0x290 [ 1342.583372] bpf_prog_alloc+0x5f/0x290 [ 1342.587267] __get_filter+0xe2/0x270 [ 1342.590988] sk_attach_filter+0x19/0xa0 [ 1342.594968] sock_setsockopt+0x1a04/0x1e30 [ 1342.599208] ? sock_enable_timestamp+0xd0/0xd0 [ 1342.603834] ? selinux_socket_setsockopt+0x6a/0x80 [ 1342.608773] __sys_setsockopt+0x203/0x240 [ 1342.612923] ? kernel_accept+0x310/0x310 [ 1342.616993] ? fput+0x2b/0x190 [ 1342.620193] ? ksys_write+0x1c8/0x2a0 [ 1342.624001] ? __ia32_sys_read+0xb0/0xb0 [ 1342.628069] ? __ia32_sys_clock_settime+0x260/0x260 [ 1342.633088] __x64_sys_setsockopt+0xba/0x150 [ 1342.637498] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1342.642083] do_syscall_64+0xf9/0x620 [ 1342.645889] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1342.651077] RIP: 0033:0x45c829 [ 1342.654267] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1342.673170] RSP: 002b:00007f95343c9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1342.680883] RAX: ffffffffffffffda RBX: 0000000000502260 RCX: 000000000045c829 19:51:52 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r1) r2 = dup2(r1, r0) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r3) ioctl$FS_IOC_ENABLE_VERITY(r3, 0x40806685, &(0x7f0000000480)={0x1, 0x1, 0x1000, 0xe5, &(0x7f0000000000)="1064f2f98aa796d1d1f1d163d41eed7cffc0d0a5146be1c81e27f88d8f99628a018f69046964e0a5a316520c1a7c7c4dd7210f6f4e3f72c42b8cabccf82aecf5809ee0e1a78be9e82b6820569edf45a4ae8af245ac2a94cf6f7809b31fd48279790ef1162d8c0913af265dd1f85f31be679b1ad4730d6e8c17ef67023c50048250b5e33e967edfa415b1db26023e0c89a2ba8b0ae3e3bb41441341a7ef43e54782217750c778af662ab341b4a306d99dc9d82df8b4c63afd622fb0389d5d01d79770155a7091cbfad3f8f48dced07d8e87f1eb42f46629c200286902c05691de26a44aaa94", 0xb6, 0x0, &(0x7f0000000240)="a0dba07b6a0a27937b698c1ce80893a380472f19184b36ab62c3812962e9622cf252b8133604bfcd8ae8f2610ab6ae158f49d872348de3dfe92e1c1df1c60e641ed9911dfa6dd67d203a51871e8b5b5ac22f7c7a7ec371640aec6d9f4305de5f880d8b6edbc07edd911e119e6a0a04175862073f53d905c44da2a810cf63eaf1b8a697dae9d8e2dc0a5a20b2bbc2eb26d78d281ca74f4562d706681f2293ed04ccee20c48e519ede089ee4b954652d6efd269d486032"}) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000380)=""/230) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = fcntl$dupfd(r0, 0x0, r4) ioctl$PPPIOCSMAXCID(r5, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r2, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:51:52 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c250fc519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) [ 1342.688156] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000003 [ 1342.695422] RBP: 000000000078bf00 R08: 0000000000000010 R09: 0000000000000000 [ 1342.702691] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000004 [ 1342.709961] R13: 0000000000000a5a R14: 00000000004cd039 R15: 00007f95343ca6d4 19:51:52 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r5 = dup(r4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r5, 0x10e, 0x1, 0x0, 0x0) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000040)=0x14) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) [ 1342.770082] Mem-Info: [ 1342.775559] active_anon:359623 inactive_anon:20450 isolated_anon:0 [ 1342.775559] active_file:7479 inactive_file:36100 isolated_file:0 [ 1342.775559] unevictable:0 dirty:92 writeback:0 unstable:0 [ 1342.775559] slab_reclaimable:19673 slab_unreclaimable:123480 [ 1342.775559] mapped:60461 shmem:20635 pagetables:8786 bounce:0 [ 1342.775559] free:945693 free_pcp:1291 free_cma:0 [ 1342.840046] Node 0 active_anon:1422156kB inactive_anon:60892kB active_file:28688kB inactive_file:144208kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:241944kB dirty:360kB writeback:0kB shmem:61632kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 450560kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1342.879544] Node 1 active_anon:16536kB inactive_anon:22808kB active_file:1228kB inactive_file:192kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:8kB writeback:0kB shmem:22808kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1342.910023] Node 0 DMA free:10384kB min:220kB low:272kB high:324kB active_anon:4300kB inactive_anon:0kB active_file:8kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:64kB pagetables:124kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 19:51:52 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000003f00000601004000000000000100", 0x16}], 0x1, 0x0) [ 1342.956875] lowmem_reserve[]: 0 2531 2533 2533 2533 [ 1342.977431] Node 0 DMA32 free:59660kB min:36048kB low:45060kB high:54072kB active_anon:1415608kB inactive_anon:58992kB active_file:28680kB inactive_file:144208kB unevictable:0kB writepending:360kB present:3129332kB managed:2595340kB mlocked:0kB kernel_stack:12512kB pagetables:27536kB bounce:0kB free_pcp:2400kB local_pcp:1332kB free_cma:0kB [ 1343.018327] lowmem_reserve[]: 0 0 1 1 1 19:51:52 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2510c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) [ 1343.022526] Node 0 Normal free:8kB min:20kB low:24kB high:28kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1652kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1343.051804] lowmem_reserve[]: 0 0 0 0 0 [ 1343.067380] Node 1 Normal free:3715276kB min:53816kB low:67268kB high:80720kB active_anon:16536kB inactive_anon:22808kB active_file:1228kB inactive_file:192kB unevictable:0kB writepending:8kB present:3932160kB managed:3870168kB mlocked:0kB kernel_stack:3904kB pagetables:7632kB bounce:0kB free_pcp:2820kB local_pcp:1464kB free_cma:0kB [ 1343.102615] lowmem_reserve[]: 0 0 0 0 0 [ 1343.122492] Node 0 DMA: 16*4kB (ME) 18*8kB (UME) 8*16kB (ME) 8*32kB (UME) 7*64kB (UME) 7*128kB (UME) 5*256kB (UME) 4*512kB (UME) 3*1024kB (UME) 1*2048kB (M) 0*4096kB = 10384kB [ 1343.162327] Node 0 DMA32: 146*4kB (UEH) 337*8kB (UMEH) 646*16kB (UMEH) 233*32kB (UMEH) 66*64kB (UMEH) 21*128kB (UMH) 33*256kB (UMH) 18*512kB (UM) 4*1024kB (UM) 0*2048kB 0*4096kB = 49744kB [ 1343.201084] Node 0 Normal: 0*4kB 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 8kB [ 1343.213704] Node 1 Normal: 569*4kB (UME) 2397*8kB (UME) 2857*16kB (UME) 2149*32kB (UME) 1558*64kB (UME) 955*128kB (UM) 409*256kB (UM) 165*512kB (UME) 38*1024kB (UM) 2*2048kB (U) 763*4096kB (M) = 3715324kB [ 1343.275463] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1343.286941] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1343.302366] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1343.312768] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1343.327641] 64214 total pagecache pages [ 1343.331777] 0 pages in swap cache [ 1343.335388] Swap cache stats: add 0, delete 0, find 0/0 [ 1343.342789] Free swap = 0kB [ 1343.346585] Total swap = 0kB [ 1343.349876] 1965979 pages RAM [ 1343.352967] 0 pages HighMem/MovableOnly [ 1343.358372] 345212 pages reserved [ 1343.361823] 0 pages cma reserved 19:51:55 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x307400, 0x0) 19:51:55 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000010601004000000000000100", 0x16}], 0x1, 0x0) 19:51:55 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r1) r2 = dup2(r1, r0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0)={r4, 0x6, 0x3, 0xaec}, &(0x7f00000001c0)=0x10) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000380)=""/230) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r7 = dup(r6) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r7, 0x10e, 0x1, 0x0, 0x0) ioctl$SOUND_MIXER_INFO(r7, 0x805c4d65, &(0x7f0000000000)) r8 = fcntl$dupfd(r0, 0x0, r5) ioctl$PPPIOCSMAXCID(r8, 0x40047451, &(0x7f0000000100)) setsockopt$RDS_CANCEL_SENT_TO(r7, 0x114, 0x1, &(0x7f0000000080)={0x2, 0x4e22, @empty}, 0x10) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r2, &(0x7f0000000180)=[{&(0x7f0000000340)="0021050000d80002441be092000100000600", 0x12}], 0x1, 0x0) 19:51:55 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2511c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:55 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff014}, {0x6}]}, 0x10) 19:51:55 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:51:55 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x400000, 0x0) 19:51:55 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x2, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff014}, {0x6}]}, 0x10) 19:51:55 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000020601004000000000000100", 0x16}], 0x1, 0x0) 19:51:55 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2512c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:55 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x3, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff014}, {0x6}]}, 0x10) 19:51:55 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x6, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff014}, {0x6}]}, 0x10) 19:51:55 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x13, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff014}, {0x6}]}, 0x10) 19:51:55 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000000160601004000000000000100", 0x16}], 0x1, 0x0) 19:51:56 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x29, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff014}, {0x6}]}, 0x10) 19:51:56 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2514c519f87f", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:56 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r5 = dup(r4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r5, 0x10e, 0x1, 0x0, 0x0) ioctl$TIOCMGET(r5, 0x5415, &(0x7f0000000000)) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:51:58 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:51:58 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x53b000, 0x0) 19:51:58 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="002149000000000000003f0601004000000000000100", 0x16}], 0x1, 0x0) 19:51:58 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x8b, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff014}, {0x6}]}, 0x10) 19:51:58 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f8ff", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:51:58 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = dup(r0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, 0x0, 0x0) sendmsg$IPSET_CMD_DEL(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)={0x74, 0xa, 0x6, 0x101, 0x0, 0x0, {0x5, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x30, 0x7, 0x0, 0x1, [@IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x9}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x80}, @IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}]}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0xfff}, @IPSET_ATTR_DATA={0x10, 0x7, 0x0, 0x1, [@IPSET_ATTR_NAME={0x9, 0x12, 'syz2\x00'}]}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x4}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x2}]}, 0x74}}, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000040)={r4, 0x1, 0x8, [0xfff7, 0x1000, 0x1, 0xfff, 0x100, 0x7, 0x5, 0x2]}, 0x18) r5 = dup2(r2, r2) ioctl$EVIOCGPROP(r5, 0xc004743e, &(0x7f0000000380)=""/230) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = fcntl$dupfd(r2, 0x0, r6) ioctl$PPPIOCSMAXCID(r7, 0x40047451, &(0x7f0000000100)) r8 = gettid() setpgid(r8, 0x0) sched_setscheduler(r8, 0x1, &(0x7f0000000000)=0x4671) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r5, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:51:58 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x17e, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff014}, {0x6}]}, 0x10) 19:51:58 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x300, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff014}, {0x6}]}, 0x10) 19:51:58 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000200000601004000000000000100", 0x16}], 0x1, 0x0) 19:51:58 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x18bb1f, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff014}, {0x6}]}, 0x10) 19:51:58 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0xffffff1f, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff014}, {0x6}]}, 0x10) 19:51:58 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff014}, {0x6}]}, 0x10) 19:52:01 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:52:01 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f8ff", 0x23, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:52:01 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000001600000601004000000000000100", 0x16}], 0x1, 0x0) 19:52:01 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff014}, {0x6}]}, 0x10) 19:52:01 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r3) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r5 = dup(r4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r5, 0x10e, 0x1, 0x0, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, r8, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x1}]}, 0x1c}}, 0x0) sendmsg$FOU_CMD_DEL(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0x14, r8, 0xe7a035cf4856fee5}, 0x14}}, 0x0) sendmsg$FOU_CMD_ADD(r5, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x24, r8, 0x400, 0x70bd2a, 0x25dfdbff, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @initdev={0xac, 0x1e, 0x1, 0x0}}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e23}]}, 0x24}}, 0x10) fsetxattr$security_selinux(r3, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000040)='system_u:object_r:klogd_exec_t:s0\x00', 0x22, 0x1) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:52:01 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x73a000, 0x0) 19:52:01 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x6, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff014}, {0x6}]}, 0x10) [ 1351.662368] audit: type=1400 audit(1588967521.573:38): avc: denied { relabelto } for pid=2878 comm="syz-executor.2" name="AX25" dev="sockfs" ino=186239 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:klogd_exec_t:s0 tclass=socket permissive=1 19:52:01 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x7, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff014}, {0x6}]}, 0x10) 19:52:01 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="00214900000000000016000601004000000000000100", 0x16}], 0x1, 0x0) 19:52:01 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x8, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff014}, {0x6}]}, 0x10) 19:52:01 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0x3ffff, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:52:01 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pipe(&(0x7f0000000000)) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r5 = dup(r4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r5, 0x10e, 0x1, 0x0, 0x0) pwritev(r5, &(0x7f0000000900), 0x1, 0x0) 19:52:04 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc33760036", 0xd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 19:52:04 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x9, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff014}, {0x6}]}, 0x10) 19:52:04 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x5c5064) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000000003f000601004000000000000100", 0x16}], 0x1, 0x0) 19:52:04 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000240)="3b97f42a7bf5f6ec2c77c6705c56a65f230f845c570eead745bf3ce9a27523f78735d3a9de1907b4fe9a9ff0c12d93f8f8f3bcbef98a96e6c81c18ffc9b59096e763c121019dca992dbb85418ae4acca64050f42a476f0e90b5191eb16b21eb690373df140b3ac35f3374a5bdac6e724c9d8036a8aaaccd782788cf073c5f335b8280115401c273a675b8adb46244f98165da12a0dcf8e27000d9c1d10b90077ab5be6d201ff79948505741e", 0xac, 0x4}, {&(0x7f0000000300)="65f79326023393cb5a0c279c266863c8a92869a09797c10958264c3919e676bed82e8ead35109ab834e36061a5d06a9b2b88f016ecea0d8e6a025be62d2aa6a69c05e7667892b2a357f4a43590f7b494031f1794771c2ebe2437addeb4821c1cdae8ef244c3c78aa2563c2b7f43d7506c208e9dbce0d152bf915edcff98cc6d4141c2fb6c5865e3e2e29107290d3adcaf59de9502ed2d959575c18202aa8bb407e40f5f8cffc78ac25789d41ee8da6ca98af", 0xb2, 0x609b9bfe}, {&(0x7f00000003c0)="d2f2461209d3dfba28a116c556739a5b8c666972c9e1361a5f4242685c2508c519f87f", 0xffffffffffffffff, 0x2}, {&(0x7f0000000400)="bb6be936bf3339710cd1f9464ac9f9efe7845b3b375457005f7e6da2", 0x1c, 0x9}, {&(0x7f0000000600)="d566d4b74210136d75e0e0be7f84ddbe1538a2f3878d5c92cd1e1681aabbcb10356e09e283da4a9455c28a2908fe224dde094aa85eb8b269e561e27cfeee17ea4b4fa95f88cf3fe048cd4478dd63cf90a6202a197d2b68be1ca0d86ec60ad40a4adecf365c4f6919204705ac46e5a0a73e646e078cfc30f584d43b5b6d1f32fca412690c7b89e1ebc5ab2707c57eb1641adaa2ac044732ce22269fdbd4ae991c28c45bc19ce5bb7336e22446c3e9097b1ffd64fd120221a79a280409d7367e5821709559a59c242c1088dd54c892d7f3ea6c934f482463fc5fc7ff3677410c1dedbcf028db1a81e9b1ace555135e455095", 0xf1, 0x7}, {&(0x7f0000000700)="ea2f551a8adbfd3779f2c78c94f1a03219d855e3bebe2ce9d9f930adbaad9abe394c63594a70f7a3b14af1cbf59ccd79b90885720c8602ef5fce856783aee719227cc398c5250e", 0x47, 0x7}, {&(0x7f0000000780)="b9b1e37ae6e7f11c87b4f5e13b3911eec7d2074b01d744386ff72ccd898ee12653d15fb3379a771e30214364c546f435", 0x30, 0xe52}, {&(0x7f00000007c0)='\t', 0xfffffffffffffffb, 0x5bf}, {&(0x7f0000000800)="48ead8228de3d23c0fb3188fc9513e3edaab1c72569aabd25740086749629a42ce99f8e547fbdd4778de76ceaa98831e9df0e84ccb33143bda04d40a0b8268361a34d14c6c271bfd5b2dbab853e2d60f3b93f7bbe8657a3f41193ec14c4d8e99d890cf9d243e1764ab685a5a76e280a95d0138d7e391838eca03e163010634caa2f66dd976459dc4bad2a7fb7411d301f6f984149f83358696172c767cf553aba59bb2cd1dac7764e94b4183e1315395a22e776f38af9307f67354a72e63eb", 0xbf, 0x7}], 0x2000000, &(0x7f00000009c0)={[{@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@cruft='cruft'}, {@nocompress='nocompress'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'quiet'}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid'}}]}) 19:52:04 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000380)=""/230) socket$inet6(0xa, 0x4, 0x0) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = dup(r2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000040)={r5}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={r5, 0x0, 0x2}, 0x8) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, &(0x7f0000000100)) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000140)=0x65c4064) r6 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup(r6) fremovexattr(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="62747266732e276465762f70707000d5c45734fb73c3242419230a5a70398c58e945bec198285874f8cd054c15fce70ab5ea2af2b671c129eccf7efe06cdf2d0e493f246190829c245a99d1249819a37f5cb3cb4d48a5421515c6216a6eefc334fc9c2584aa318fabf8945946c4dbd3621b1ca4042f02f2a9056e6e10e9ad10c9f70736d37085ec5167d50d1c2dda2a2d41dc8161e767361debd889a36989228d9c450607263689aaeb917327399d6d12e058e6b831414f6908a06fb582f1d6b877dc2e3361f77e672798a433ad12b822e09a80696f4f6598d6d3e46622eac1f5d7a25f58e618b10ef7ed2d25d0cf8a52eb0d49b1e1851a961"]) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000340)="0021490000000002441be09200010000060100400000", 0x16}], 0x1, 0x0) 19:52:04 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc3376003639405cb4aed12f0000001500ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffc}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x743000, 0x0) 19:52:04 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0xa, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff014}, {0x6}]}, 0x10) [ 1354.735107] INFO: task syz-executor.3:30425 blocked for more than 140 seconds. [ 1354.748408] Not tainted 4.19.121-syzkaller #0 [ 1354.772702] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. 19:52:04 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0xb, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff014}, {0x6}]}, 0x10) [ 1354.798598] syz-executor.3 D29872 30425 30423 0x00000000 [ 1354.816292] Call Trace: [ 1354.822627] ? __schedule+0x866/0x1d80 [ 1354.831099] ? __lock_sock+0x138/0x260 [ 1354.840014] ? firmware_map_remove+0x19a/0x19a 19:52:04 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0xc, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff014}, {0x6}]}, 0x10) [ 1354.849032] ? lock_downgrade+0x740/0x740 [ 1354.859412] ? __local_bh_enable_ip+0x159/0x270 [ 1354.869844] schedule+0x8d/0x1b0 [ 1354.878166] __lock_sock+0x13d/0x260 [ 1354.895001] ? sock_rfree+0x170/0x170 [ 1354.901281] ? finish_wait+0x260/0x260 [ 1354.909803] lock_sock_nested+0xf1/0x110 [ 1354.924153] ax25_accept+0x122/0x700 [ 1354.932184] ? lock_downgrade+0x740/0x740 [ 1354.943857] ? ax25_getname+0x780/0x780 19:52:04 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0xd, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff014}, {0x6}]}, 0x10) [ 1354.953008] ? finish_wait+0x260/0x260 19:52:04 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0xe, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff014}, {0x6}]}, 0x10) [ 1354.982330] ? _raw_spin_unlock+0x29/0x40 [ 1354.992350] ? selinux_socket_accept+0x58/0x200 [ 1355.009893] __sys_accept4+0x322/0x5f0 [ 1355.025367] ? __ia32_sys_listen+0x70/0x70 [ 1355.040916] sock: process `syz-executor.5' is using obsolete setsockopt SO_BSDCOMPAT [ 1355.041714] ? put_timespec64+0xcb/0x120 19:52:05 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0xf, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff014}, {0x6}]}, 0x10) [ 1355.084154] ? nsecs_to_jiffies+0x30/0x30 [ 1355.104372] ? __x64_sys_clock_gettime+0x165/0x240 [ 1355.127567] ? __ia32_sys_clock_settime+0x260/0x260 [ 1355.132613] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1355.137967] ? trace_hardirqs_off_caller+0x55/0x210 [ 1355.143001] __x64_sys_accept+0x71/0xb0 [ 1355.147343] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1355.151976] do_syscall_64+0xf9/0x620 [ 1355.156100] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1355.161479] RIP: 0033:0x45c829 [ 1355.164977] Code: Bad RIP value. [ 1355.168342] RSP: 002b:00007f1d89423c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002b [ 1355.176109] RAX: ffffffffffffffda RBX: 00000000004d8d60 RCX: 000000000045c829 [ 1355.183378] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000005 [ 1355.190701] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1355.198067] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1355.205400] R13: 0000000000000006 R14: 00000000004c2a8d R15: 00007f1d894246d4 [ 1355.212712] [ 1355.212712] Showing all locks held in the system: [ 1355.219375] 1 lock held by khungtaskd/1079: [ 1355.223831] #0: 0000000015e54ef3 (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 [ 1355.233491] 1 lock held by in:imklog/6178: [ 1355.237811] 1 lock held by syz-executor.2/8841: [ 1355.242473] #0: 000000007f247898 (&pipe->mutex/1){+.+.}, at: pipe_lock+0x63/0x80 [ 1355.250236] 1 lock held by syz-executor.3/30160: [ 1355.255033] #0: 000000006ed8eb29 (sk_lock-AF_AX25){+.+.}, at: ax25_recvmsg+0xbb/0x810 [ 1355.263108] 1 lock held by syz-executor.3/30423: [ 1355.267923] #0: 000000001c54f02a (sk_lock-AF_AX25){+.+.}, at: ax25_recvmsg+0xbb/0x810 [ 1355.276056] 1 lock held by syz-executor.3/30490: [ 1355.280797] #0: 000000003fe41743 (sk_lock-AF_AX25){+.+.}, at: ax25_recvmsg+0xbb/0x810 [ 1355.289030] 1 lock held by syz-executor.3/31404: [ 1355.293777] #0: 00000000183aed51 (sk_lock-AF_AX25){+.+.}, at: ax25_recvmsg+0xbb/0x810 [ 1355.301933] 1 lock held by syz-executor.3/32202: [ 1355.306768] #0: 00000000903052f4 (sk_lock-AF_AX25){+.+.}, at: ax25_recvmsg+0xbb/0x810 [ 1355.315041] 1 lock held by syz-executor.3/32387: [ 1355.319781] #0: 00000000677aab64 (sk_lock-AF_AX25){+.+.}, at: ax25_recvmsg+0xbb/0x810 [ 1355.327883] 1 lock held by syz-executor.3/32498: [ 1355.332627] #0: 00000000250b389b (sk_lock-AF_AX25){+.+.}, at: ax25_recvmsg+0xbb/0x810 [ 1355.340741] 1 lock held by syz-executor.3/546: [ 1355.345367] #0: 000000002d3a4c9d (sk_lock-AF_AX25){+.+.}, at: ax25_recvmsg+0xbb/0x810 [ 1355.353433] 1 lock held by syz-executor.3/653: [ 1355.358746] #0: 00000000630b5702 (sk_lock-AF_AX25){+.+.}, at: ax25_recvmsg+0xbb/0x810 [ 1355.366890] 2 locks held by kworker/0:2/2471: [ 1355.371379] #0: 0000000028be9c1f ((wq_completion)"rcu_gp"){+.+.}, at: process_one_work+0x81a/0x1640 [ 1355.380762] #1: 000000006602e3b4 ((work_completion)(&rew.rew_work)){+.+.}, at: process_one_work+0x84e/0x1640 [ 1355.390892] 1 lock held by syz-executor.0/3016: [ 1355.395618] #0: 000000007cfb57e4 (rtnl_mutex){+.+.}, at: sock_do_ioctl+0x24e/0x2f0 [ 1355.403426] 2 locks held by syz-executor.3/2955: [ 1355.408223] #0: 000000007cfb57e4 (rtnl_mutex){+.+.}, at: ppp_release+0x11d/0x1e0 [ 1355.415920] #1: 000000003ef44820 (rcu_preempt_state.exp_mutex){+.+.}, at: _synchronize_rcu_expedited+0x54d/0x750 [ 1355.426406] [ 1355.428029] ============================================= [ 1355.428029] [ 1355.444369] NMI backtrace for cpu 0 [ 1355.448425] CPU: 0 PID: 1079 Comm: khungtaskd Not tainted 4.19.121-syzkaller #0 [ 1355.455888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1355.465231] Call Trace: [ 1355.467850] dump_stack+0x188/0x20d [ 1355.471474] nmi_cpu_backtrace.cold+0x63/0xa2 [ 1355.475976] ? lapic_can_unplug_cpu.cold+0x44/0x44 [ 1355.480908] nmi_trigger_cpumask_backtrace+0x1a6/0x1eb [ 1355.486183] watchdog+0x962/0xe40 [ 1355.489622] ? reset_hung_task_detector+0x30/0x30 [ 1355.494464] kthread+0x34a/0x420 [ 1355.497836] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1355.503380] ret_from_fork+0x24/0x30 [ 1355.507196] Sending NMI from CPU 0 to CPUs 1: [ 1355.512033] NMI backtrace for cpu 1 [ 1355.512039] CPU: 1 PID: 3690 Comm: systemd-journal Not tainted 4.19.121-syzkaller #0 [ 1355.512045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1355.512049] RIP: 0010:debug_check_no_obj_freed+0x104/0x42e [ 1355.512060] Code: 4c 8b 28 4d 85 ed 0f 84 2a 02 00 00 31 db 4c 89 e8 48 c1 e8 03 80 3c 28 00 0f 85 40 02 00 00 49 8d 7d 18 83 c3 01 4d 8b 7d 00 <48> 89 f8 48 c1 e8 03 80 3c 28 00 0f 85 31 02 00 00 49 8b 45 18 48 [ 1355.512064] RSP: 0018:ffff888093e1fb90 EFLAGS: 00000006 [ 1355.512071] RAX: 1ffff110118f1a54 RBX: 0000000000000003 RCX: ffffffff8150969b [ 1355.512076] RDX: 1ffffffff1742f2b RSI: 0000000000000004 RDI: ffff88808c78d2b8 [ 1355.512081] RBP: dffffc0000000000 R08: 0000000000007dc2 R09: fffffbfff1742f2a [ 1355.512086] R10: fffffbfff1742f29 R11: ffffffff8ba1794b R12: 0000000000000082 [ 1355.512090] R13: ffff88808c78d2a0 R14: ffffffff8ba17948 R15: ffff88808886ac40 [ 1355.512096] FS: 00007f40f34dd8c0(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 [ 1355.512100] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1355.512105] CR2: 00007f40f0b29000 CR3: 0000000094263000 CR4: 00000000001406e0 [ 1355.512110] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1355.512114] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1355.512117] Call Trace: [ 1355.512120] __free_pages_ok+0x241/0xd80 [ 1355.512123] slab_destroy+0x1f/0x50 [ 1355.512126] slabs_destroy+0x6a/0x90 [ 1355.512129] ___cache_free+0x277/0x380 [ 1355.512133] qlist_free_all+0x79/0x140 [ 1355.512136] quarantine_reduce+0x164/0x1a0 [ 1355.512139] kasan_kmalloc+0x95/0xe0 [ 1355.512142] kmem_cache_alloc+0x114/0x710 [ 1355.512146] ? selinux_is_enabled+0x3f/0x60 [ 1355.512149] ? creds_are_invalid+0x53/0x140 [ 1355.512153] ? __validate_process_creds+0x268/0x2f0 [ 1355.512156] prepare_creds+0x39/0x410 [ 1355.512159] do_faccessat+0x94/0x7a0 [ 1355.512162] ? __ia32_sys_fallocate+0xf0/0xf0 [ 1355.512166] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1355.512169] ? trace_hardirqs_off_caller+0x55/0x210 [ 1355.512172] ? do_syscall_64+0x21/0x620 [ 1355.512176] do_syscall_64+0xf9/0x620 [ 1355.512179] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1355.512183] RIP: 0033:0x7f40f27999c7 [ 1355.512193] Code: 83 c4 08 48 3d 01 f0 ff ff 73 01 c3 48 8b 0d c8 d4 2b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 b8 15 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d a1 d4 2b 00 f7 d8 64 89 01 48 [ 1355.512197] RSP: 002b:00007ffdbc83f628 EFLAGS: 00000246 ORIG_RAX: 0000000000000015 [ 1355.512205] RAX: ffffffffffffffda RBX: 00007ffdbc842540 RCX: 00007f40f27999c7 [ 1355.512210] RDX: 00007f40f320aa00 RSI: 0000000000000000 RDI: 000055e7c60c59a3 [ 1355.512215] RBP: 00007ffdbc83f660 R08: 0000000000000000 R09: 0000000000000000 [ 1355.512220] R10: 0000000000000069 R11: 0000000000000246 R12: 0000000000000000 [ 1355.512224] R13: 0000000000000000 R14: 00007ffdbc842540 R15: 00007ffdbc83fb50 [ 1355.514265] Kernel panic - not syncing: hung_task: blocked tasks [ 1355.790577] CPU: 0 PID: 1079 Comm: khungtaskd Not tainted 4.19.121-syzkaller #0 [ 1355.798003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1355.807341] Call Trace: [ 1355.809910] dump_stack+0x188/0x20d [ 1355.813524] panic+0x26a/0x50e [ 1355.816706] ? __warn_printk+0xf3/0xf3 [ 1355.820583] ? lapic_can_unplug_cpu.cold+0x44/0x44 [ 1355.825506] ? ___preempt_schedule+0x16/0x18 [ 1355.829891] ? watchdog+0x962/0xe40 [ 1355.833506] ? nmi_trigger_cpumask_backtrace+0x15e/0x1eb [ 1355.838947] watchdog+0x973/0xe40 [ 1355.842389] ? reset_hung_task_detector+0x30/0x30 [ 1355.847212] kthread+0x34a/0x420 [ 1355.850557] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1355.856082] ret_from_fork+0x24/0x30 [ 1355.861194] Kernel Offset: disabled [ 1355.864813] Rebooting in 86400 seconds..